{"id":15976,"date":"2014-02-13T09:10:32","date_gmt":"2014-02-13T16:10:32","guid":{"rendered":"https://www.webroot.com/blog/?p=15976"},"modified":"2023-12-08T07:19:26","modified_gmt":"2023-12-08T14:19:26","slug":"hacking-hire-teams-occupy-multiple-underground-market-segments-monetize-malicious-know","status":"publish","type":"post","link":"https://www.webroot.com/blog/2014\/02\/13\/hacking-hire-teams-occupy-multiple-underground-market-segments-monetize-malicious-know\/","title":{"rendered":"&#8216;Hacking for hire&#8217; teams occupy multiple underground market segments, monetize their malicious &#8216;know how&#8217;"},"content":{"rendered":"<p>In a <a href=\"https://www.webroot.com/blog/2012\/01\/05\/email-hacking-for-hire-going-mainstream\/\"><strong>series of blog posts<\/strong><\/a> published throughout 2012, we&#8217;ve been highlighting the existence of a <a href=\"https://www.webroot.com/blog/2012\/04\/02\/email-hacking-for-hire-going-mainstream-part-two\/\"><strong>vibrant underground market segment<\/strong><\/a>, namely, that of &#8216;hacking for hire&#8217; services, <a href=\"https://www.webroot.com/blog/2013\/01\/21\/email-hacking-for-hire-going-mainstream-part-three\/\"><strong>email hacking<\/strong><\/a> in particular. Commercially <a href=\"http:\/\/ddanchev.blogspot.com\/2008\/07\/email-hacking-going-commercial.html\"><strong>available as a service for years<\/strong><\/a>, the <a href=\"http:\/\/ddanchev.blogspot.com\/2008\/08\/email-hacking-going-commercial-part-two.html\"><strong>practice&#8217;s growth was once largely fueled<\/strong><\/a> by the release of DIY Web-based popular email provider hacking tools, which once acquired by prospective cybercriminals, quickly became the foundation for a successful business model. How have things changed nowadays, in terms of <a href=\"https://www.webroot.com/blog/2013\/12\/27\/cybercrime-trends-2013-year-review\/\"><strong>tactics, techniques and procedures<\/strong><\/a>? Profoundly.<\/p>\n<p>Case in point, we&#8217;ve been tracking two such &#8216;hacking for hire&#8217; services, both of which offer a diversified portfolio of malicious services to prospective customers, such as email hacking,\u00a0<a href=\"https://www.webroot.com/blog/2013\/07\/31\/diy-commercially-available-automatic-web-site-hacking-as-a-service-spotted-in-the-wild\/\"><strong>Web site hacking<\/strong><\/a>,\u00a0DDoS for hire, DDoS protection, and grade modification. What type of tactics, tools and procedures do they rely on? Let&#8217;s find out.<\/p>\n<p><!--more--><\/p>\n<p><a href=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/02\/Hacking_Team_Vertical_Integration_DDoS_Email_Hacking_Web_Site_Hacking_DDoS_Protection.png\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"238\" class=\"size-large wp-image-15983 aligncenter\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/02\/Hacking_Team_Vertical_Integration_DDoS_Email_Hacking_Web_Site_Hacking_DDoS_Protection-1024x238.png\" alt=\"Hacking_Team_Vertical_Integration_DDoS_Email_Hacking_Web_Site_Hacking_DDoS_Protection\" srcset=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/02\/Hacking_Team_Vertical_Integration_DDoS_Email_Hacking_Web_Site_Hacking_DDoS_Protection-1024x238.png 1024w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/02\/Hacking_Team_Vertical_Integration_DDoS_Email_Hacking_Web_Site_Hacking_DDoS_Protection-300x69.png 300w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/02\/Hacking_Team_Vertical_Integration_DDoS_Email_Hacking_Web_Site_Hacking_DDoS_Protection.png 1156w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<p>Thanks to the persistent supply of CAPTCHA-solving capable brute-forcing tools, commercially available DIY malware\/botnet generating tools<strong>,\u00a0<\/strong>as well as custom coded phishing pages as a service type of underground market propositions, cybercriminals have everything they need at their disposal to monetize their &#8216;know how&#8217; through this type of service. Among the key success factors for their campaigns, email hacking in particular remains the &#8216;first hand&#8217; intelligence that they obtain from their prospective customers, in respect to the potential targets, to be later on used in successful social engineering campaigns.<\/p>\n<p>The first &#8216;hacking for hire&#8217; service charges $50 for a single day of persistent DDoS attack, $300 for a week, and $1000 for a month. Web site hacking is pitched at $500. Email hacking is offered at $200, and $500 for corporate users, followed by $35 for a day worth of DDoS protection, and $150 for a month worth of DDoS protection. The service also offers a free test of its DDoS capabilities. The availability of the rest of the services offered through the portfolio, such as \u00a0<a href=\"https://www.webroot.com/blog/2013\/11\/01\/peek-inside-google-dorks-based-mass-sql-injecting-tool\/\"><strong>Web site hacking<\/strong><\/a>, is largely made possible due to the <a href=\"https://www.webroot.com/blog/2013\/09\/24\/cybercriminals-experiment-android-based-sql-injecting-python-based-releases\/\"><strong>public\/commercial availability<\/strong><\/a> of <a href=\"https://www.webroot.com/blog/2013\/05\/06\/new-version-of-diy-google-dorks-based-mass-website-hacking-tool-spotted-in-the-wild\/\"><strong>DIY Web site hacking tools<\/strong><\/a>\u00a0like the ones we&#8217;ve extensively profiled in the past. In terms of DDoS for hire, the commercial availability is made possible not just due to the ease of &#8216;generating&#8217; a botnet in 2014, but also through a cost-effective acquisition approach relying on the <a href=\"https://www.webroot.com/blog/2013\/05\/13\/newly-launched-e-shop-for-hacked-pcs-charges-based-on-malware-executions\/\"><strong>outsourcing of the botnet generation process<\/strong><\/a>, then monetizing the (outsourced) botnet&#8217;s infected population through a variety of schemes, all of which result in the cybercriminals&#8217; successfully &#8216;breaking-even&#8217; out of their initial investment. We expect that these types of services &#8212; email hacking in particular due to its volume-based driven business model &#8212; will continue proliferating, with the cybercriminals behind them continuing to professionalize, standardize, and ultimately aiming to further streamline the customer acquisition process.<\/p>\n<p>As always, we&#8217;re keeping an eye on this market segment, and will be posting updates as soon as new developments emerge.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In a series of blog posts published throughout 2012, we&#8217;ve been highlighting the existence of a vibrant underground market segment, namely, that of &#8216;hacking for hire&#8217; services, email hacking in particular. Commercially available as a service for years, the practice&#8217;s growth was once largely fueled by the release of DIY Web-based popular email provider hacking [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17052,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[5653,17203,9383,17197,3765,10641,13085,17207,17209,13095,6045,15627,5977,4621,15623,17205,17199],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/15976"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=15976"}],"version-history":[{"count":21,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/15976\/revisions"}],"predecessor-version":[{"id":32483,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/15976\/revisions\/32483"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17052"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=15976"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=15976"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=15976"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=15976"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}