Demo of the CyCognito Platform

See the CyCognito platform in action to understand how it can help you identify, prioritize and eliminate your most critical risks. 

State of External Exposure Management, Summer 2024 Edition

Download the report now to stay ahead of emerging threats and strengthen your organization’s security posture for 2024. 

The Total Economic Impact™ of The CyCognito Platform

Read The Total Economic Impact™ of The CyCognito Platform — a Forrester study. Cost Savings And Business Benefits Enabled By The CyCognito Platform. 

 

The hacker economy has emerged as a multi-billion dollar criminal industry formed by individual and organized hacking networks.

Hackers use a variety of methods to extort, steal, and defraud targeted institutions as well as individuals, including:

  • Direct ransomware - threat attackers utilize ransomware to encrypt systems and data. They hold the ability to unlock the systems as hostage for ransom, usually in the form of relatively untraceable cryptocurrency like Bitcoin.
  • Supply-chain ransom - when a threat actor has stolen data or gained privileged access to threaten the disclosure as ransom against affected parties.
  • Selling malware - a B2B/B2C solution selling malware to other hackers. This is growing as a highly developed and advanced black market operation. Learn more about commonly used techniques on MITRE ATT&CK's malware page.
  • Selling access - a B2B/B2C solution selling credentials to other hackers. Learn more about purchasing technical data from MITRE ATT&CK.
  • Selling credit card numbers or personally identifiable information (PII) - these are used to set up fraudulent personas for committing crime or espionage.
  • Automated phishing software-as-a-service - developed and sold on the darkweb to improve the efficiency of phishing operations.
  • Infiltrating financial accounts - using details from compromised financial accounts to appropriate funds for purchasing stocks. This is often done to raise the price of a stock and sell them for profit.
  • Cryptojacking - malware is inserted on a victim's system(s) to surreptitiously lend computational processing to a crypto-mining operation.
  • Botnet/DDOS for hire - a B2B/B2C SaaS operation where systems that have been compromised by hackers called ‘bot herders’ are rented out as a service to other hackers to be used for nefarious purposes. Learn more about botnet techniques on botnet techniques from MITRE ATT&CK.
The hacker economy is more than just the hackers trying to attack and infiltrate sites and systems. It’s also the SaaS and B2B market that has grown to support hacking operations due to the high return on investment.

See Also