Attacks

Monetization of Cybercrime: It’s All About the Money

Table of Contents

Over the last year, there has been a marked increase in activity on dark web forums that sell access to compromised networks. A new report released by Lumu titled “Flashcard Report: Monetization of Cybercrime” shows how this increase is more sinister than it appears at first glance.

The Credential-selling Business is Booming

Individual sales of access to compromised networks have increased by 50% in 2021. What’s more, the market has diversified a lot. A couple of years ago, these markets were primarily just selling credit card details; now you can purchase access to remote desktop connections, mail servers, and much more. The already-compromised networks of businesses representing every country and industry can be bought and sold.

Your Network Means Money

Cybercriminals will monetize access to your network however they can, depending on their skills and resources. Among the techniques for turning your network into elicit gains, the easiest is to deploy a cryptomining botnet. But as the cybercriminal digs deeper into your network, they will try to develop an attack that can be more lucrative for them and more damaging for the victim, such as a ransomware attack. If they are not able to develop such an attack themselves, then the access can be sold to another APT group that does have the skills and resources to do so. 

Lumu’s Take on the Monetization of Cybercrime

We’ve seen at Lumu that ransomware attacks never happen in isolation. There is always another type of threat like malware or a botnet that shows up first. The result is that there is no such thing as a ‘minor threat’. One type of compromise can easily turn into another. As Lumu CEO Ricardo Villadiego points out in his article on DarkReading, cryptomining botnets are the ‘canary in the mine’: an early indication that something is very wrong.

We invite you to download the full report “Flashcard Report: Monetization of Cybercrime” for a more detailed look into this phenomenon.

Recent Posts

  • Stories

Cybersecurity Trends 2025 and Beyond: Navigating AI-Driven Evasion Techniques and Autonomous Threats for Resilient Defense

Reading Time: 2 minsAs we move into 2025, AI-driven evasion and autonomous threats will redefine…

3 days ago
  • Trends

CISA Reveals How 12 Ransomware Gangs are Bypassing EDRs

Reading Time: 7 minsEndpoint Detection and Response (EDR) has a critical role in most companies’…

3 weeks ago
  • Trends

Does Infostealer Malware Have US Organizations Under Siege?

Reading Time: 5 minsLumu’s Compromise Report for 2024 uncovers surprising information about how infostealer malware…

1 month ago
  • Trends

Lumu Compromise Report 2024: 2 Essential Tips for MSPs to Protect Clients

Reading Time: 4 minsFor MSPs to proactively protect their clients they need good intelligence, such…

1 month ago
  • Technical

The Hidden Pitfalls of Deep Packet Inspection

Reading Time: 6 minsExplore DPI's limitations in network security and discover how Lumu’s cloud-native, metadata-driven…

1 month ago
  • Trends

3 Cybersecurity Trends From the Lumu Compromise Report 2024

Reading Time: 3 minsLumu’s new Compromise Report 2024 reveals the greatest current cybersecurity trends and…

2 months ago