Advertisement
Top
image credit: Adobe Stock

How much does access to corporate infrastructure cost?

June 15, 2022

Division of labor

Money has been and remains the main motivator for cybercriminals. The most widespread techniques of monetizing cyberattacks include selling stolen databases, extortion (using ransomware) and carding. However, there is demand on the dark web not only for data obtained through an attack, but also for the data and services necessary to organize one (e.g., to perform specific steps of a multiphase attack).

Read More on Securelist