{"id":3863,"date":"2025-11-25T15:47:37","date_gmt":"2025-11-25T15:47:37","guid":{"rendered":"https:\/\/phishia.fr\/?p=3863"},"modified":"2025-12-11T01:05:03","modified_gmt":"2025-12-11T01:05:03","slug":"what-is-the-dark-web-and-why-can-your-data-be-found-there","status":"publish","type":"post","link":"https:\/\/phishia.fr\/en\/blog\/monitoring\/what-is-the-dark-web-and-why-can-your-data-be-found-there\/","title":{"rendered":"What is the dark web, and why can your data end up there?"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"3863\" class=\"elementor elementor-3863\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1eb1413 e-flex e-con-boxed e-con e-parent\" data-id=\"1eb1413\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ce9efd0 elementor-widget elementor-widget-text-editor\" data-id=\"ce9efd0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We often hear about\u00a0<em>dark web<\/em>\u00a0as a mysterious place reserved for pirates. In reality, it's a\u00a0<strong>where stolen sensitive information is sold or displayed<\/strong>, sometimes for months without the organizations even knowing it.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7ad6625 e-flex e-con-boxed e-con e-parent\" data-id=\"7ad6625\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bd126eb elementor-widget elementor-widget-heading\" data-id=\"bd126eb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The web iceberg: surface, depth and dark zones<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-437aa3b e-flex e-con-boxed e-con e-parent\" data-id=\"437aa3b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-46c750a elementor-widget elementor-widget-image\" data-id=\"46c750a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"450\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/11\/iceberg2-1024x576.png\" class=\"attachment-large size-large wp-image-3865\" alt=\"\" srcset=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/11\/iceberg2-1024x576.png 1024w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/11\/iceberg2-300x169.png 300w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/11\/iceberg2-768x432.png 768w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/11\/iceberg2-1536x864.png 1536w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/11\/iceberg2-18x10.png 18w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/11\/iceberg2.png 1920w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b0544be elementor-widget elementor-widget-text-editor\" data-id=\"b0544be\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"54\" data-end=\"250\"><strong data-start=\"54\" data-end=\"87\">Clear Web - the visible part<\/strong><br data-start=\"87\" data-end=\"90\" \/>The \u201cabove the surface\u201d layer: public websites, media, blogs, social networks, all just a few clicks away via Google or other search engines.<\/p><p data-start=\"252\" data-end=\"475\"><strong data-start=\"252\" data-end=\"286\">Deep Web - hidden but legitimate<\/strong><br data-start=\"286\" data-end=\"289\" \/>Beneath the surface: private spaces (messaging systems, extranets, internal portals), documents and reports accessible only by link or account. Not indexed, but perfectly legal.<\/p><p data-start=\"477\" data-end=\"700\"><strong data-start=\"477\" data-end=\"508\">Dark Web - the danger zone<\/strong><br data-start=\"508\" data-end=\"511\" \/>Access via specific tools like Tor, with closed forums, marketplaces and private groups often used for reselling data, attack tools or compromised access.<\/p><p>It is precisely on these deeper layers that the\u00a0<strong>Cyber Threat Intelligence (CTI)<\/strong>\u00a0will look for weak signals and leaks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5d8ad66 e-flex e-con-boxed e-con e-parent\" data-id=\"5d8ad66\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d66bbb6 elementor-widget elementor-widget-heading\" data-id=\"d66bbb6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What sensitive information is sold or exposed on the dark web?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-65e8c44 e-flex e-con-boxed e-con e-parent\" data-id=\"65e8c44\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2e4dddb elementor-widget elementor-widget-text-editor\" data-id=\"2e4dddb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>On the dark web, attackers don't sell \u201cfiles\u201d in the abstract. Above all, they sell\u00a0<strong>access<\/strong>\u00a0and\u00a0<strong>elements of confidence<\/strong>\u00a0to build an attack.<\/p><p>Here are a few concrete examples from the cases we encounter at Phishia:\u00a0<\/p><h5><strong> Login credentials<\/strong><\/h5><p>These are the couples\u00a0<strong>login \/ password<\/strong>\u00a0for :<\/p><ul><li>internal portals (intranets, agent portals, donor spaces, etc.),<\/li><li>business services (CRM, HR tools, payment and donation solutions),<\/li><li>mailboxes or administrator accounts.<\/li><\/ul><p>These identifiers can come from :<\/p><ul><li>from a compromised workstation (malware, phishing),<\/li><li>reuse of a password already stolen elsewhere,<\/li><li>negligent service provider.<\/li><\/ul><p>In our analyses, we regularly see\u00a0<strong>lists of hundreds of credentials<\/strong>\u00a0associated with a single domain name, with very different levels of criticality depending on the account concerned: from \u201cnon-sensitive\u201d access to accounts that can modify financial data or access confidential information.\u00a0<\/p><h5><strong> Personal and financial data<\/strong><\/h5><p>For associations and public bodies alike, we find, for example :<\/p><ul><li>donor data (contact details, donation history, sometimes SEPA mandate),<\/li><li>user or beneficiary data,<\/li><li>information used to impersonate a person or organization.\u00a0<\/li><\/ul><p>Possible consequences: fraud, misappropriation of donations, loss of trust, regulatory sanctions.<\/p><h5><strong> Technical access and infrastructure elements<\/strong><\/h5><p>On dark web forums and marketplaces, you can also find :<\/p><ul><li>access to\u00a0<strong>Internal VPNs<\/strong>,<\/li><li>RDP sessions (remote control of a server or workstation),<\/li><li>information on unpatched vulnerabilities,<\/li><li>sale of malware targeting a specific type of organization or technology.<\/li><\/ul><p>These elements are used to prepare a larger attack (e.g. ransomware).<\/p><h5><strong> Raw\u201c leaks to be sorted<\/strong><\/h5><p>The leak lists are not always neat and tidy. They include:<\/p><ul><li>real identifiers that are still valid,<\/li><li>obsolete identifiers,<\/li><li>duplicates,<\/li><li>false positives.<\/li><\/ul><p>One of the key roles of a CTI cell is precisely to\u00a0<strong>sort and qualify<\/strong>\u00a0to distinguish the real threat from the background noise.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-153b940 e-flex e-con-boxed e-con e-parent\" data-id=\"153b940\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f5f735b elementor-widget elementor-widget-heading\" data-id=\"f5f735b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why is this problematic for an organization?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f563f63 e-flex e-con-boxed e-con e-parent\" data-id=\"f563f63\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-66f2711 elementor-widget elementor-widget-text-editor\" data-id=\"66f2711\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This information is used to :<\/p><ul><li>d\u2019<strong>enter your systems<\/strong>\u00a0without triggering an alarm,<\/li><li>to prepare a\u00a0<strong>targeted scam<\/strong>\u00a0(phishing, president fraud, donation scams),<\/li><li>from\u00a0<strong>resell your data<\/strong>\u00a0to other criminal groups,<\/li><li>tarnish your image if the leak becomes public.<\/li><\/ul><p>Worst-case scenario: your login details and data have been circulating for months or even years on specialist forums, and\u00a0<strong>you don't know<\/strong>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-01734c3 e-flex e-con-boxed e-con e-parent\" data-id=\"01734c3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-595e0a4 elementor-widget elementor-widget-heading\" data-id=\"595e0a4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How Phishia's CTI offer can help you<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-df48a7e e-flex e-con-boxed e-con e-parent\" data-id=\"df48a7e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-32470f3 elementor-widget elementor-widget-text-editor\" data-id=\"32470f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"0\" data-end=\"551\">Visit <strong data-start=\"3\" data-end=\"38\">Cyber Threat Intelligence (CTI)<\/strong> is to proactively monitor everything that's happening around your organization on the surface web, the deep web, the dark web and within certain private cybercriminal groups.<\/p><p data-start=\"0\" data-end=\"551\">At <strong data-start=\"242\" data-end=\"253\">Phishia<\/strong>, we rely on <strong data-start=\"288\" data-end=\"297\">Flare<\/strong>, our web\/deep\/dark sensor, which automatically tracks leaks linked to your credentials (domain names, e-mail addresses, IP addresses, logins, passwords, etc.), and on our <strong data-start=\"477\" data-end=\"500\">analysis expertise<\/strong> to qualify, prioritize and treat each leak.<\/p><p data-start=\"553\" data-end=\"1315\">In concrete terms, our CTI approach combines several building blocks: a <strong data-start=\"618\" data-end=\"643\">continuous monitoring<\/strong> useful sources (access sales, data leaks, compromised accounts, malware), from <strong data-start=\"733\" data-end=\"758\">targeted audits<\/strong> to test the validity of certain identifiers within the legal framework, a <strong data-start=\"833\" data-end=\"859\">OSINT contextualization<\/strong> to understand which services are affected and what impact this may have, then a <strong data-start=\"945\" data-end=\"975\">criticality assessment<\/strong> with immediate warning in the event of a serious leak and a <strong data-start=\"1026\" data-end=\"1049\">remediation plan<\/strong>(password reset, access blocking, configuration hardening, new SIEM\/EDR rules, etc.). All consolidated in a <strong data-start=\"1198\" data-end=\"1220\">regular reporting<\/strong> Detailed reports, activity indicators and monitoring of threat trends aimed at you.<\/p><p data-start=\"1317\" data-end=\"1540\" data-is-last-node=\"\" data-is-only-node=\"\">The objective is simple: <strong data-start=\"1341\" data-end=\"1378\">alert you as soon as possible<\/strong> when your information appears on the dark web or in high-risk areas, and <strong data-start=\"1461\" data-end=\"1539\">help you correct the situation before it becomes a major incident<\/strong>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d52f0ea e-flex e-con-boxed e-con e-parent\" data-id=\"d52f0ea\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a636138 elementor-widget elementor-widget-text-editor\" data-id=\"a636138\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u00a0<\/p><p>Want to know more? Visit <span style=\"text-decoration: underline;\"><a href=\"https:\/\/phishia.fr\/en\/cti\/\">our CTI offer :<\/a><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>We often hear the dark web referred to as a mysterious place reserved for hackers. In reality, it's a place where stolen sensitive information is sold or exposed, sometimes for months on end, without organizations even knowing it. The web's iceberg: surface, depth and dark zones Clear Web - the visible partThe layer \u201cabove the [...]<\/p>","protected":false},"author":3,"featured_media":3899,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[24],"tags":[31],"class_list":["post-3863","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-surveillance","tag-darkweb"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Qu\u2019est-ce que le dark web, et pourquoi vos donn\u00e9es peuvent s\u2019y retrouver ? - Phishia<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/phishia.fr\/en\/blog\/monitoring\/what-is-the-dark-web-and-why-can-your-data-be-found-there\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Qu\u2019est-ce que le dark web, et pourquoi vos donn\u00e9es peuvent s\u2019y retrouver ? - Phishia\" \/>\n<meta property=\"og:description\" content=\"On entend souvent parler du\u00a0dark web\u00a0comme d\u2019un endroit myst\u00e9rieux r\u00e9serv\u00e9 aux pirates. En r\u00e9alit\u00e9, c\u2019est surtout un\u00a0espace o\u00f9 des informations sensibles vol\u00e9es sont revendues ou expos\u00e9es, parfois pendant des mois sans que les organisations le sachent. L\u2019iceberg du web : surface, profondeur et zones obscures Clear Web \u2013 la partie visibleLa couche \u201cau-dessus de la [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/phishia.fr\/en\/blog\/monitoring\/what-is-the-dark-web-and-why-can-your-data-be-found-there\/\" \/>\n<meta property=\"og:site_name\" content=\"Phishia\" \/>\n<meta property=\"article:published_time\" content=\"2025-11-25T15:47:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-11T01:05:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/11\/P6nR5BjdpHEUspxkCwTxdc-1200-80.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Enzo Debosque, consultant junior en CyberS\u00e9curit\u00e9\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Enzo Debosque, consultant junior en CyberS\u00e9curit\u00e9\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/quest-ce-que-le-dark-web-et-pourquoi-vos-donnees-peuvent-sy-retrouver\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/quest-ce-que-le-dark-web-et-pourquoi-vos-donnees-peuvent-sy-retrouver\\\/\"},\"author\":{\"name\":\"Enzo Debosque, consultant junior en CyberS\u00e9curit\u00e9\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/person\\\/ab1f38ad06f750da69863e8f06e86528\"},\"headline\":\"Qu\u2019est-ce que le dark web, et pourquoi vos donn\u00e9es peuvent s\u2019y retrouver ?\",\"datePublished\":\"2025-11-25T15:47:37+00:00\",\"dateModified\":\"2025-12-11T01:05:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/quest-ce-que-le-dark-web-et-pourquoi-vos-donnees-peuvent-sy-retrouver\\\/\"},\"wordCount\":928,\"publisher\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/quest-ce-que-le-dark-web-et-pourquoi-vos-donnees-peuvent-sy-retrouver\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/P6nR5BjdpHEUspxkCwTxdc-1200-80.jpg\",\"keywords\":[\"Darkweb\"],\"articleSection\":[\"Surveillance\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/quest-ce-que-le-dark-web-et-pourquoi-vos-donnees-peuvent-sy-retrouver\\\/\",\"url\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/quest-ce-que-le-dark-web-et-pourquoi-vos-donnees-peuvent-sy-retrouver\\\/\",\"name\":\"Qu\u2019est-ce que le dark web, et pourquoi vos donn\u00e9es peuvent s\u2019y retrouver ? - Phishia\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/quest-ce-que-le-dark-web-et-pourquoi-vos-donnees-peuvent-sy-retrouver\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/quest-ce-que-le-dark-web-et-pourquoi-vos-donnees-peuvent-sy-retrouver\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/P6nR5BjdpHEUspxkCwTxdc-1200-80.jpg\",\"datePublished\":\"2025-11-25T15:47:37+00:00\",\"dateModified\":\"2025-12-11T01:05:03+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/quest-ce-que-le-dark-web-et-pourquoi-vos-donnees-peuvent-sy-retrouver\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/quest-ce-que-le-dark-web-et-pourquoi-vos-donnees-peuvent-sy-retrouver\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/quest-ce-que-le-dark-web-et-pourquoi-vos-donnees-peuvent-sy-retrouver\\\/#primaryimage\",\"url\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/P6nR5BjdpHEUspxkCwTxdc-1200-80.jpg\",\"contentUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/P6nR5BjdpHEUspxkCwTxdc-1200-80.jpg\",\"width\":1200,\"height\":675},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/quest-ce-que-le-dark-web-et-pourquoi-vos-donnees-peuvent-sy-retrouver\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/phishia.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Surveillance\",\"item\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/category\\\/surveillance\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Qu\u2019est-ce que le dark web, et pourquoi vos donn\u00e9es peuvent s\u2019y retrouver ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#website\",\"url\":\"https:\\\/\\\/phishia.fr\\\/\",\"name\":\"Phishia\",\"description\":\"Cabinet de Conseil IT, Cybers\u00e9curit\u00e9, Durabilit\u00e9\",\"publisher\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/phishia.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\",\"name\":\"Phishia\",\"url\":\"https:\\\/\\\/phishia.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Logotype.png\",\"contentUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Logotype.png\",\"width\":512,\"height\":128,\"caption\":\"Phishia\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/phishia\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/person\\\/ab1f38ad06f750da69863e8f06e86528\",\"name\":\"Enzo Debosque, consultant junior en CyberS\u00e9curit\u00e9\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is the dark web, and why can your data end up there? - Phishia","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/phishia.fr\/en\/blog\/monitoring\/what-is-the-dark-web-and-why-can-your-data-be-found-there\/","og_locale":"en_US","og_type":"article","og_title":"Qu\u2019est-ce que le dark web, et pourquoi vos donn\u00e9es peuvent s\u2019y retrouver ? - Phishia","og_description":"On entend souvent parler du\u00a0dark web\u00a0comme d\u2019un endroit myst\u00e9rieux r\u00e9serv\u00e9 aux pirates. En r\u00e9alit\u00e9, c\u2019est surtout un\u00a0espace o\u00f9 des informations sensibles vol\u00e9es sont revendues ou expos\u00e9es, parfois pendant des mois sans que les organisations le sachent. L\u2019iceberg du web : surface, profondeur et zones obscures Clear Web \u2013 la partie visibleLa couche \u201cau-dessus de la [&hellip;]","og_url":"https:\/\/phishia.fr\/en\/blog\/monitoring\/what-is-the-dark-web-and-why-can-your-data-be-found-there\/","og_site_name":"Phishia","article_published_time":"2025-11-25T15:47:37+00:00","article_modified_time":"2025-12-11T01:05:03+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/11\/P6nR5BjdpHEUspxkCwTxdc-1200-80.jpg","type":"image\/jpeg"}],"author":"Enzo Debosque, consultant junior en CyberS\u00e9curit\u00e9","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Enzo Debosque, consultant junior en CyberS\u00e9curit\u00e9","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/phishia.fr\/blog\/surveillance\/quest-ce-que-le-dark-web-et-pourquoi-vos-donnees-peuvent-sy-retrouver\/#article","isPartOf":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/quest-ce-que-le-dark-web-et-pourquoi-vos-donnees-peuvent-sy-retrouver\/"},"author":{"name":"Enzo Debosque, consultant junior en CyberS\u00e9curit\u00e9","@id":"https:\/\/phishia.fr\/#\/schema\/person\/ab1f38ad06f750da69863e8f06e86528"},"headline":"Qu\u2019est-ce que le dark web, et pourquoi vos donn\u00e9es peuvent s\u2019y retrouver ?","datePublished":"2025-11-25T15:47:37+00:00","dateModified":"2025-12-11T01:05:03+00:00","mainEntityOfPage":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/quest-ce-que-le-dark-web-et-pourquoi-vos-donnees-peuvent-sy-retrouver\/"},"wordCount":928,"publisher":{"@id":"https:\/\/phishia.fr\/#organization"},"image":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/quest-ce-que-le-dark-web-et-pourquoi-vos-donnees-peuvent-sy-retrouver\/#primaryimage"},"thumbnailUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/11\/P6nR5BjdpHEUspxkCwTxdc-1200-80.jpg","keywords":["Darkweb"],"articleSection":["Surveillance"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/phishia.fr\/blog\/surveillance\/quest-ce-que-le-dark-web-et-pourquoi-vos-donnees-peuvent-sy-retrouver\/","url":"https:\/\/phishia.fr\/blog\/surveillance\/quest-ce-que-le-dark-web-et-pourquoi-vos-donnees-peuvent-sy-retrouver\/","name":"What is the dark web, and why can your data end up there? - Phishia","isPartOf":{"@id":"https:\/\/phishia.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/quest-ce-que-le-dark-web-et-pourquoi-vos-donnees-peuvent-sy-retrouver\/#primaryimage"},"image":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/quest-ce-que-le-dark-web-et-pourquoi-vos-donnees-peuvent-sy-retrouver\/#primaryimage"},"thumbnailUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/11\/P6nR5BjdpHEUspxkCwTxdc-1200-80.jpg","datePublished":"2025-11-25T15:47:37+00:00","dateModified":"2025-12-11T01:05:03+00:00","breadcrumb":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/quest-ce-que-le-dark-web-et-pourquoi-vos-donnees-peuvent-sy-retrouver\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/phishia.fr\/blog\/surveillance\/quest-ce-que-le-dark-web-et-pourquoi-vos-donnees-peuvent-sy-retrouver\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/phishia.fr\/blog\/surveillance\/quest-ce-que-le-dark-web-et-pourquoi-vos-donnees-peuvent-sy-retrouver\/#primaryimage","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/11\/P6nR5BjdpHEUspxkCwTxdc-1200-80.jpg","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/11\/P6nR5BjdpHEUspxkCwTxdc-1200-80.jpg","width":1200,"height":675},{"@type":"BreadcrumbList","@id":"https:\/\/phishia.fr\/blog\/surveillance\/quest-ce-que-le-dark-web-et-pourquoi-vos-donnees-peuvent-sy-retrouver\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/phishia.fr\/"},{"@type":"ListItem","position":2,"name":"Surveillance","item":"https:\/\/phishia.fr\/blog\/category\/surveillance\/"},{"@type":"ListItem","position":3,"name":"Qu\u2019est-ce que le dark web, et pourquoi vos donn\u00e9es peuvent s\u2019y retrouver ?"}]},{"@type":"WebSite","@id":"https:\/\/phishia.fr\/#website","url":"https:\/\/phishia.fr\/","name":"Phishia","description":"IT Consulting, Cybersecurity, Sustainability","publisher":{"@id":"https:\/\/phishia.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/phishia.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/phishia.fr\/#organization","name":"Phishia","url":"https:\/\/phishia.fr\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","width":512,"height":128,"caption":"Phishia"},"image":{"@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/phishia\/"]},{"@type":"Person","@id":"https:\/\/phishia.fr\/#\/schema\/person\/ab1f38ad06f750da69863e8f06e86528","name":"Enzo Debosque, Junior CyberSecurity Consultant"}]}},"_links":{"self":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts\/3863","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/comments?post=3863"}],"version-history":[{"count":10,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts\/3863\/revisions"}],"predecessor-version":[{"id":3979,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts\/3863\/revisions\/3979"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/media\/3899"}],"wp:attachment":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/media?parent=3863"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/categories?post=3863"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/tags?post=3863"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}