Domain Exposure Intelligence — Company-Wide Email-Exposure Analysis

Company-wide assessment of your email domain(s) for data-breach exposure, infostealer traces, and compromised corporate emails—your foundation for security measures and audits.

We correlate multiple professional breach and infostealer sources to surface every exposure tied to your email domain(s)—with a breach timeline, risk scoring, and prioritized actions. In a single engagement, you get complete visibility into your company's email exposure.

Company-Wide Coverage

Covers all email addresses across your domain(s)—not just spot checks

Correlated Breach + Infostealer Data

Consolidated view with timelines, risk levels, and sources

Transparent Pricing After Pre-Check

Final price set once scope and data volume are confirmed

⏱️ Timeline: 15+ business days (scope-dependent)
💰 Price: From €4,500 (final price set after pre-check)
🎯 Scope: Corporate email domain(s) company-wide

Access provided after client authentication and verification of legitimate interest (lawful purpose).

Trusted by leading technology and automotive corporations, DAX companies, and renowned global brands

What Is Domain Exposure Intelligence?

A comprehensive OSINT analysis to systematically check your corporate email domain(s) for exposure in data breaches and infostealer databases. Unlike individual checks, this service examines all email addresses associated with your domain company-wide.

The analysis includes:

Data Breaches & Leaks:

All documented breaches and leaks connected to email addresses on your domain

Infostealer Logs:

Compromised logins to your email domain from infostealer malware (browser passwords, session cookies, stored credentials)

Affected Email Addresses:

Complete overview of all corporate emails appearing in breaches or infostealer databases

Contextual Intelligence:

Context & risk scoring (timestamps, affected services, breach details)

Challenges We Solve

🏢

Company-Wide Security Assessment

Security leaders lack visibility into how many corporate emails appear in breaches or infostealer logs. Individual checks are too resource-intensive for enterprise-wide analysis.

→ We deliver: Complete domain analysis – get a consolidated view of all exposed accounts.

🚨

Ransomware Prevention

Industry research indicates many later ransomware victims first appear in infostealer logs. Companies don't know which employee accounts are compromised and could serve as entry points.

→ We deliver: Systematic infostealer check – we flag these as high-risk and prioritize remediation.

💼

Compliance & Risk Management

Compliance audits, certifications, or due diligence require documented overview of compromised corporate data.

→ We deliver: Structured compliance report – meet documentation requirements and demonstrate protective measures.

🛡️

Incident Response & Post-Breach Assessment

After security incidents, it's unclear which additional corporate emails were historically compromised and represent potential vulnerabilities.

→ We deliver: Historical breach timeline – identify patterns and close long-term security gaps.

What You'll Receive

Domain Exposure Intelligence Report

The report is delivered as Word document with Excel exports.

Executive Summary:

Overview of key findings, risk assessment, and action recommendations

KPIs & Scorecards:

  • → Exposed corporate emails (total & unique)
  • → High-risk exposures (≤90 days)
  • → Top affected services/domains
  • → 12/24-month trendline

Breach Analysis:

  • → Number of affected email addresses per breach
  • → Timeline of all identified breaches
  • → Affected platforms and services
  • → Data fields (password hashes, personal data, etc.)

Infostealer Intelligence:

  • → Identified infostealer logs with email domain connection
  • → Compromised logins and session data
  • → Browser passwords and stored credentials
  • → Cryptocurrency wallet data (if present)

Delivery Note: If a source contains plaintext secrets, we always deliver them partially masked and do not store them in production. Full traceability is preserved via source IDs.

Prioritized Action Plan:

  • → Account-reset waves by risk tier
  • → MFA/SSO enforcement & posture check
  • → Password-policy updates (length/manager)
  • → Browser-credential hygiene guidance
  • → Targeted awareness comms to affected users

Excel Exports:

  • → Complete list of all affected email addresses
  • → Breach details with metadata
  • → Infostealer findings in structured format
  • → Risk assessment per email address
  • SIEM/EDR enrichment CSV (Columns: email | source | first_seen | last_seen | data_types | risk_level)

Languages: English or German (other languages upon request)

Delivery: Secure download via our end-to-end encrypted customer portal (Tresorit)

Our Investigation Approach

1

Pre-Check & Scoping

Initial analysis to estimate investigation scope. Identification of all relevant email domains and data volume assessment. Creation of binding quote.

2

Multi-Source Queries

Parallel queries across multiple professional breach and infostealer intelligence databases. Systematic search for all email addresses on the corporate domain(s).

3

Data Consolidation & Analysis

Export and consolidation of all findings from various sources. Risk assessment and prioritization by criticality. Creation of breach timeline and infostealer overview.

4

Documentation & Reporting

Structured preparation in Word report with executive summary. Creation of Excel exports with all affected email addresses and details.

Total Duration: Starting at 15 business days (dependent on scope and data volume)

Investigation Scope – Our Data Sources

We use multiple professional breach and infostealer intelligence solutions in parallel – for maximum database coverage:

Professional Leak Databases

Access to over 100 billion continuously updated records from documented data breaches worldwide

Infostealer Databases

Over 20 million infostealer logs with data from compromised systems:

  • → Browser passwords (plaintext)
  • → Session cookies
  • → Stored credentials
  • → Cryptocurrency wallet data
  • → Autofill information

Why Infostealers Are Critical: They provide a current picture of compromised systems – often months before traditional breaches become public. Industry research indicates many later ransomware victims first appear in infostealer logs.

Specialized OSINT Platforms

Professional tools with breach query modules and domain intelligence functions

Dark Web Intelligence Sources

Check for presence in dark web leak sites and underground databases

Source Documentation: All utilized databases are documented in the report.

When You Need This Analysis

Domain Exposure Intelligence is ideal for company-wide security assessments:

Company-Wide Security Audits

Complete overview of all exposed corporate emails

Ransomware Prevention

Early detection of compromised accounts (industry-recognized risk factor)

Compliance & Risk Management

Documented breach analysis for audits

Incident Response

Post-breach assessment after security incidents

Executive Protection

Identification of exposed executive accounts

M&A Due Diligence

Digital risk assessment for acquisitions

Cyber Insurance Requirements

Documentation for insurance mandates

The analysis delivers a solid foundation for company-wide security measures.

Pricing & Guarantees

Pricing

Custom Pricing Based on Pre-Check

PhaseDescriptionPrice
Pre-CheckFree scope assessmentFree
Domain Exposure AnalysisComplete investigationStarting at €4,500*

**All prices plus VAT**

*Final price determined after pre-check and depends on:

  • → Number of email domains to check
  • → Volume of data to analyze
  • → Scope of identified breaches and infostealer logs
  • → Required investigation effort

Why No Fixed Price?

Domain Exposure Intelligence is a company-wide check. Effort varies significantly based on:

  • → Company size (number of email addresses)
  • → Number of corporate domains
  • → Historical breach exposure
  • → Data volume in infostealer databases

The pre-check provides transparent, binding pricing with no hidden costs.

Our Guarantees

Transparent Pricing

Fixed price after pre-check. No hidden costs.

Data Deletion Guaranteed

After delivery of results, all data is completely deleted from our systems.

GDPR-Compliant

EU data protection, exclusively legal sources, verification of legitimate interest.

Discreet

Confidential handling, no visible traces.

Frequently Asked Questions

Data Protection & Confidentiality

Secure Data Processing

Encrypted Transmission

All results are provided via our end-to-end encrypted customer portal.

Strict Confidentiality

All received and investigated data is treated strictly confidentially and not shared with third parties.

Data Deletion

After service completion and invoicing, all investigated data is completely and securely deleted.

Authentication Required

Access to sensitive breach and infostealer databases only after clear authentication and proof of legitimate interest.

Investigations exclusively in legally accessible databases.

Multilingual: Reports can be created in other common languages upon request.

Why corma

Jörn Weber - Founder and Managing Director corma GmbH

Jörn Weber

Founder & Managing Director

  • Nearly 20 years as Criminal Chief Inspector
  • OSINT pioneer since 1995
  • Certified Maltego & SNH Trainer
  • Over 5,000 successful investigations since 1999

Over 25 Years of Experience (since 1999)

Professional OSINT investigations

Premium Client References

Leading technology corporations, premium automotive manufacturers, DAX companies, international gaming companies, and renowned fashion & sports brands

ISO 27001 & SOC 2 Platforms

AES-256 encryption, EU hosting

GDPR-Compliant Processes

EU data protection, legal certainty

Ready for Domain Exposure Intelligence?

Contact us for a free pre-check. We analyze the scope and create a transparent, binding quote – free and confidential.

To Get Started, We Need:

  • → Primary and secondary email domain(s)
  • → Alias/sub-domains (if applicable)
  • → Subsidiaries (if applicable)
  • → Approximate employee count
  • → SSO/MFA status (if known)

✓ Confidential Consultation • ✓ Free Pre-Check • ✓ 24-Hour Response Time

Online Appointment Booking

Book Now →

Check domains. Identify risks. Protect your company.

We look deeper – Never wonder, always know.