Precursor Security
Open Source Intelligence (OSINT) | CREST Accredited

OSINT Assessment

Before an attacker targets your organisation, they build a complete picture of your exposure: leaked credentials on dark web forums, sensitive code on public repositories, and employee data that makes spear-phishing trivial. Our OSINT assessment finds exactly what they find, then tells you how to remove it from the picture.

From £3,000 fixed price
CREST-accredited analysts
Delivered in 5 to 10 business days
Full attack scenario report included
Dark web, deep web, and surface web coverage
Urgent 48-hour engagement available
Scroll
Methodology

Dark Web Monitoring &
Digital Footprint Analysis

Manual OSINT investigation goes further than automated dark web monitoring tools. We search private Telegram channels, emerging criminal forums, and public code repositories, correlating findings across sources to build attack scenarios your board can act on. Every assessment applies the MITRE ATT&CK Reconnaissance phase (TA0043) as our operational framework.

Dark Web

Dark Web Intelligence

Our analysts access the closed-access underground forums, ransomware leak sites, initial access broker (IAB) listings, and Telegram threat actor channels where your data actually circulates. We cover credential dumps, stealer log repositories from Redline, Raccoon, and Vidar malware, and underground marketplaces that automated dark web monitoring services routinely miss.

Footprint

Digital Footprint Assessment

A complete digital footprint assessment using certificate transparency log analysis, passive DNS enumeration, and WHOIS records. We identify forgotten subdomains, orphaned campaign microsites, decommissioned marketing sites, and shadow IT assets that your internal CMDB does not record. Attackers target assets you have forgotten about. We find them first.

Personnel

Employee Exposure Profiling

Identifying key personnel and their exposure across LinkedIn, GitHub, and technical forums to assess social engineering and spear-phishing risk. We assess whether technical staff are inadvertently revealing your technology stack, internal tooling, or network architecture in public profiles and job postings.

Source Code

Code Repository Analysis

Scanning public code repositories (GitHub, GitLab, Bitbucket) for accidentally committed API keys, hardcoded secrets, internal IP addresses, and proprietary source code. Code repositories are one of the most consistently productive OSINT sources in our assessments.

Credentials

Credential Breach Correlation

Scanning breach databases, deep web forums, and paste sites for leaked corporate credentials. We identify compromised email and password pairs from combolists and stealer log dumps, correlate findings against your employee directory and privileged accounts, and build attack scenarios showing how those credentials could be used for initial access.

Reconnaissance

Passive Cyber Reconnaissance

Passive reconnaissance using Shodan, Censys, SpiderFoot, theHarvester, and Maltego. We gather deep intelligence without sending a single packet to your infrastructure. Completely undetectable by your SOC or firewalls. This phase applies MITRE ATT&CK TA0043 Reconnaissance as our operational framework.

Executive Summary

Your External Exposure, Documented

OSINT assessment findings satisfy ISO 27001 Annex A.5, NIST CSF Identify function, and GDPR Article 32 obligations, giving your risk register the evidence it needs.

High Risk
72h

Credential Sale Window

Stolen credentials are typically listed for sale within 72 hours of a breach. Without active dark web monitoring, the first sign is the breach itself.

Credential Risk
80%

Credential-Based Breaches

Of data breaches involve compromised credentials. OSINT identifies exactly which of your credentials are exposed before attackers use them.

Full Coverage
5+

Intelligence Categories

Dark web, digital footprint, employee exposure, code repositories, and passive reconnaissance. Every source an attacker uses, checked by our analysts.

Mapped
Controls
ISO 27001Annex A.5.7
NIST CSF 2.0ID.RA-1
GDPRArticle 32
DORAArt. 13
Engagement Pipeline

Engagement Workflow

Structured to minimise operational friction and maximise the value of the testing window.

Step 01

Scoping & Requirements

You provide domains, brands, subsidiary names, and key executive names. We confirm what is in scope and excluded. Common triggers: breach notification, upcoming penetration test, M&A due diligence, or regulatory requirement under NIS2, DORA, or the UK Cyber Security Resilience Bill.

OutputSigned Engagement Agreement
Step 02

Data Gathering

Automated tooling (Shodan, Censys, SpiderFoot, Maltego) combined with manual investigation. Surface, deep, and dark web sources queried in parallel across breach databases, dark web forums, stealer log repositories, code repositories, and social media profiles.

OutputRaw Intelligence Corpus
Step 03

Analysis & Verification

Raw intelligence analysed to remove false positives. Credential findings verified for currency and confirmed as relating to your organisation. Every finding validated by a CREST-accredited analyst before inclusion in the final report.

OutputValidated Findings Set
Step 04

Intelligence Report

A structured report with risk-rated findings, attack scenario narratives showing how findings combine into breach paths, and a prioritised remediation roadmap. Results typically delivered within 5 to 10 business days for standard scope.

OutputAttack Scenario Report (PDF)
Deliverables

What You Receive

Every OSINT assessment produces a structured intelligence report formatted for both security teams and board-level stakeholders.

Executive summary: board-ready, single page overview of exposure posture
Dark web findings: credential exposure, forum mentions, IAB listings, stealer log presence
Digital footprint map: domains, subdomains, shadow IT, forgotten infrastructure
Employee exposure analysis: social media profiling, VIP targeting risk assessment
Code repository findings: hardcoded secrets, API keys, internal architecture leaks
Attack scenario narratives: how findings combine into realistic breach paths
Remediation roadmap: prioritised actions with risk ratings and takedown guidance

Reports delivered via encrypted portal. Executive summary designed for direct board submission. Technical findings formatted for risk register integration.

Common Triggers

When Do Organisations Commission OSINT?

An OSINT assessment is typically triggered by one of these six scenarios. If any of these apply, you are in the right place.

Breach Notification Received

Credentials from your domain appeared in a breach alert. You need to know: how bad is it? and what else is out there?

Pre-Penetration Test Reconnaissance

Running OSINT before an external penetration test tightens scope and surfaces forgotten assets. Most external pen test findings in credentials are OSINT findings, not vulnerabilities.

M&A Due Diligence

Your acquiring or acquired company needs a digital footprint assessment. Unknown assets, leaked credentials, and dark web exposure are material risks during integration.

Compliance Audit Gap

Your auditor flagged threat intelligence or attack surface awareness as a control gap under ISO 27001, NIS2, DORA, or the UK Cyber Security Resilience Bill.

Board Directive

The board or CISO has mandated demonstrable attack surface awareness. You need a structured intelligence report, not a dashboard nobody checks.

Third-Party Breach Response

A supplier or SaaS provider has been breached. You need to assess whether your credentials, data, or infrastructure were affected before the exposure window closes.

Pricing

Fixed-Price Engagements

All tiers include dark web monitoring, credential exposure analysis, digital footprint mapping, and a structured intelligence report with attack scenario narratives.

Standard

Single domain, dark web + credential exposure

From £3,000

Comprehensive

Multiple domains, code repos, employee exposure

From £5,000

Enterprise

Multi-brand, M&A scope, executive exposure

From £8,000
CREST-accredited analysts
5 to 10 business day delivery
Attack scenario report
Service Catalogue

Full Penetration Testing Catalogue

Comprehensive penetration testing services tailored to your environment.

Ready to Secure

The best time to test your defences is now.

Join the high-growth companies relying on Precursor for continuous offensive and defensive security.

CREST Triple Accredited|Fixed Price Quotes|Free Scoping Call|UK Based Team

Frequently Asked Questions

Common questions about this service, methodologies, and deliverables.

An OSINT (Open Source Intelligence) assessment is a structured, passive security exercise that maps your organisation's exposure across the surface, deep, and dark web. Conducted by UK-based CREST-accredited analysts, it identifies leaked credentials, dark web monitoring targets, shadow IT assets, and publicly exposed technical details that attackers use during the passive reconnaissance phase of a breach. Unlike a penetration test, no active exploitation is performed. The assessment applies MITRE ATT&CK Reconnaissance techniques (TA0043) as its operational framework.

Dark web monitoring is the process of searching criminal forums, dark web marketplaces, paste sites, and Telegram channels for your organisation's compromised data, including leaked employee credentials, internal documents, and breach database entries. Businesses need dark web monitoring services because attackers actively buy and sell stolen credentials before using them to access corporate systems. A manual OSINT assessment goes further than automated dark web monitoring tools: we identify which credentials are actively being traded, correlate findings with your employee directory and admin accounts, and build an attack scenario showing how those credentials could be used to breach your environment. We provide UK dark web monitoring as part of every OSINT assessment from £3,000.

OSINT assessment pricing typically ranges from £3,000 to £10,000 depending on scope and complexity. Standard OSINT for a single domain (dark web monitoring, credential exposure, digital footprint) averages £3,000 to £5,000. Comprehensive assessments covering multiple domains, code repository analysis, and executive exposure profiling typically cost £5,000 to £8,000. Enterprise-scope OSINT for multi-brand organisations, M&A due diligence, or regulatory compliance requirements typically costs £8,000 to £10,000 or more. All engagements are fixed-price with no hidden charges. We provide a formal quote after understanding your scope requirements.

Dark web monitoring is one component of an OSINT assessment, and typically the most commercially valuable one. An automated dark web monitoring service continuously scans a fixed set of indexed sources for your email domains and sends alerts when credentials appear. An OSINT assessment is broader: it covers dark web monitoring, digital footprint analysis, employee exposure profiling, code repository scanning, and passive reconnaissance, all performed manually by experienced analysts who correlate findings into attack scenarios. The key difference is depth and context. A dark web monitoring alert tells you a credential was found. An OSINT assessment tells you which credential, who it belongs to, what systems they have access to, and how an attacker would use it to breach your environment.

Finding leaked credentials is a trigger event that requires immediate action. First: scope the exposure before acting. Our OSINT assessment investigates the full extent of the leak, identifying which credentials are confirmed compromised, whether they are being actively traded, and whether any other data (documents, code, personal data) was included in the same breach. Second: we provide a prioritised remediation plan that sequences password resets, account lockdowns, and dark web scan follow-up actions correctly. We can begin an urgent OSINT investigation within 48 hours of engagement.

Yes, particularly for organisations with a significant number of remote workers, SaaS dependencies, or a history of third-party data breaches. Credentials stolen in a breach are typically listed for sale within 72 hours. Without active dark web monitoring, the first indication that your credentials are compromised is often the breach itself. An OSINT assessment providing a one-time dark web intelligence snapshot is also valuable as a baseline before deploying continuous monitoring tooling, ensuring you understand your current exposure before investing in ongoing coverage.

Attack surface management (ASM) platforms continuously scan your known and discoverable external assets using automated tooling. OSINT assessments are expert-led, one-time (or periodic) exercises that go further: our analysts access human-curated underground sources, closed-access forums, and dark web marketplaces that automated tools cannot index. An OSINT assessment is also typically the recommended baseline before deploying an ASM platform, since it identifies the unknown assets the platform needs to be configured to monitor. For continuous monitoring, see our managed Attack Surface Management service.

A penetration test involves actively probing and attempting to exploit your systems. An OSINT assessment is entirely passive: we look at your organisation from the outside using only public sources, without touching your infrastructure. Most external penetration tests include a brief OSINT phase. A dedicated OSINT assessment goes significantly deeper, spending the full engagement on reconnaissance rather than treating it as a preliminary step. The two services are complementary: OSINT runs first to tighten pen test scope and surface forgotten assets.

Yes. OSINT relies entirely on publicly accessible information and open-source data sources. We do not access systems without authorisation or break any laws to obtain data. The assessment is passive reconnaissance: we find what is already visible, often in locations you were not aware to look. All work is conducted under a signed engagement agreement defining the precise scope.

Our findings typically fall into five categories: (1) Compromised credentials, including employee email and password pairs from breach databases, combolists, and stealer logs; (2) Dark web intelligence, including data for sale, IAB listings, and ransomware operator communications mentioning your organisation; (3) Shadow IT and forgotten assets, including orphaned subdomains, unapproved cloud instances, and infrastructure from past M&A activity; (4) Code repository leakage, including API keys, hardcoded secrets, and internal architecture details committed to public repositories; (5) Employee exposure, including social engineering-ready intelligence gathered from LinkedIn, technical forums, and public profiles.

We cannot directly delete data from the internet. Our report provides specific guidance on how to issue takedown requests, invalidate leaked credentials, remove sensitive information from code repositories, and configure systems to stop leaking information in future. For active credential exposures, we provide immediate remediation steps to close the risk before attackers exploit the findings.

Standard-scope OSINT assessments are typically delivered within 5 to 10 business days from engagement start. Urgent engagements triggered by breach notifications or active credential exposure can be scoped and started within 48 hours. Enterprise-scope assessments covering multiple brands, subsidiaries, or M&A targets may take 10 to 15 business days depending on the breadth of investigation required.