Initial access brokers (IAB) are sophisticated, focused, and specialized threat actors that focus on finding and gaining access to corporate environments. Once they compromise these environments, they auction off or sell the access on dark web forums.
To date in 2023, more than 100 companies across 18 industries had access to their IT infrastructure, cloud environments, networks, or applications sold on Russian hacking forums.
For this analysis Flare reviewed 3 months of IAB posts on the Russian hacking forum Exploit to identify trends around:
Read our full report, Initial Access Brokers, Russian Hacking Forums, and the Underground Corporate Access Economy and/or keep reading for the highlights.
While most cybercrime activity focuses on consumer fraud, a small group of more sophisticated actors target corporate environments or enable others who target those environments. IABs actively operating on Russian hacking forums XSS and Exploit, reselling initial access to IT environments to ransomware gangs, affiliates, nation states, and other IABs.
Other categories of threat actors who target corporate environments and may purchase from IABs include:
While IAB posts often mix English and Russian, they use specific terminology that can include and or all of the following information:
Post advertising RDP access for a U.S.-based organization
Threat actors do not consider all access equally valuable, as evidenced by auction pricing variances.
While roughly 33% of all auctions have a blitz price below $1,000, the distribution across the data provides insight into the impact that outliers have:
Higher-priced listings typically offered access to unique environments or particularly sensitive files.
Although most IAB posts focused on US companies, these threat groups also targeted several other countries:
Generally, US access sales align with global averages. Despite threat actors focusing on US companies, these listings did not fetch a higher price than their global counterparts.
To gain insight into the proliferation of IABs, we reviewed how many threat actors were actively selling access to corporate networks on Exploit during this period. We identified 31 unique usernames selling access to corporate IT environments; however, the top seven actors were responsible for the majority (55.6%) of listings.
These findings suggest that gaining access to IT environments requires specially developed tactics, techniques, and procedures.
Industry greatly impacts the pricing in our sample data, with some industries selling for a much higher average prices than others.
After classifying organizations into 18 industries, we reviewed reviews the average blitz prices across them noting the following approximate values:
Access to the U.S. Critical Infrastructure is routinely sold on Exploit but not overrepresented compared to other industries. However, Construction and Business Services industries were the most affected.
Threat actors typically list the attack vector in their posts rather than the access type. The two most common attack vectors, making up 60% of the overall listings, were:
When reviewing the limited data, the access types most commonly listed were:
Additionally, listings around non-standard access typically included references to:
In addition to typical security controls like multi-factor authentication (MFA) and user training, organizations should consider:
When planning and executing the research, we made some important decisions that impacted the outcomes:
Flare’s proactive cyber threat exposure management solution constantly scans the online world, including the clear & dark web. With 4,000 cybercrime communities monitored, our platform provides data from 14 million stealer logs and 2 million threat actor profiles.
Since our platform automatically collects, analyzes, structures, and contextualizes dark web data, you gain the high-value intelligence specific to your organization for 10x faster dark web investigations.
Sign up for our free trial to test Flare yourself.
The post Threat Spotlight: Initial Access Brokers on Russian Hacking Forums appeared first on Flare | Cyber Threat Intel | Digital Risk Protection.
*** This is a Security Bloggers Network syndicated blog from Flare | Cyber Threat Intel | Digital Risk Protection authored by Flare. Read the original post at: https://flare.io/learn/resources/blog/threat-spotlight-initial-access-brokers-on-russian-hacking-forums/