{"id":9892,"date":"2013-02-28T01:06:14","date_gmt":"2013-02-28T08:06:14","guid":{"rendered":"http:\/\/blog.webroot.com\/?p=9892"},"modified":"2018-01-30T12:25:41","modified_gmt":"2018-01-30T19:25:41","slug":"how-much-does-it-cost-to-buy-10000-u-s-based-malware-infected-hosts","status":"publish","type":"post","link":"https://www.webroot.com/blog/2013\/02\/28\/how-much-does-it-cost-to-buy-10000-u-s-based-malware-infected-hosts\/","title":{"rendered":"How much does it cost to buy 10,000 U.S.-based malware-infected hosts?"},"content":{"rendered":"<p>Earlier this month, we profiled and exposed <strong><a href=\"http:\/\/blog.webroot.com\/2013\/02\/12\/new-underground-service-offers-access-to-thousands-of-malware-infected-hosts\/\">a newly launched underground service offering access to tens of thousands of malware-infected hosts<\/a><\/strong>, with an emphasis on the fact that U.S.-based hosts were relatively more expensive to acquire, largely due to the fact that U.S.-based users are known to have a higher online purchasing power. How much does it cost to buy 10,000 U.S.-based malware-infected hosts? Let&#8217;s find out.<\/p>\n<p>In this post, I&#8217;ll profile yet another service offering access to malware-infected hosts internationally, that&#8217;s been operating since the middle of 2012, and despite the fact that it&#8217;s official Web site is currently offline, remains in operation until present day.<\/p>\n<p>More details:<\/p>\n<p><!--more--><\/p>\n<p><strong>Sample screenshot of the underground E-shop selling access to malware-infected hosts:<\/strong><\/p>\n<p style=\"text-align:center;\"><a href=\"http:\/\/webrootblog.files.wordpress.com\/2013\/02\/malware_infected_hosts_as_a_service_international_europe_usa1.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter  wp-image-9902\" alt=\"Malware_Infected_Hosts_as_a_Service_International_Europe_USA\" src=\"http:\/\/webrootblog.files.wordpress.com\/2013\/02\/malware_infected_hosts_as_a_service_international_europe_usa1.jpg\" width=\"362\" height=\"327\" \/><\/a><\/p>\n<p>The service is yet another example of a trend that&#8217;s been evident since the early days of the first Malware-as-a-Service underground market offerings, namely, the segmentation and use of perceived pricing schemes when it comes to U.S.-based malware-infected hosts. Naturally, purchasing access to U.S.-based malware-infected hosts is more expensive than, for instance, purchasing access to hosts based in Germany, Canada or the U.K., largely thanks to the fact that a U.S.-based user has a higher online purchasing power compared to the rest of the world.<\/p>\n<p>If a potential cybercriminal wants to spread his fully undetectable piece of malware online, all he has to do is purchase access to the malware-infected hosts offered by such services, allowing virtually anyone access to &#8220;managed malware propagation&#8221; capabilities. The service that I&#8217;m profiling in this post is also attempting to &#8220;<a href=\"http:\/\/blog.webroot.com\/2013\/01\/08\/black-hole-exploit-kit-authors-vertical-market-integration-fuels-growth-in-malicious-web-activity\/\"><strong>vertically integrate<\/strong><\/a>&#8221; within the cybercrime ecosystem by offering related &#8220;value added&#8221; services such as access to Socks5 servers, which are in reality <a href=\"http:\/\/blog.webroot.com\/2012\/03\/02\/new-service-converts-malware-infected-hosts-into-anonymization-proxies\/\"><strong>malware-hosts converted to be used as anonymization proxies<\/strong><\/a>.<\/p>\n<p>The prices are as follows:<\/p>\n<ul>\n<li><span style=\"line-height:16px;\">1,000 hosts World Mix go for $25, 5,000 hosts World Mix go for $110, and 10,000 hosts World Mix go for $200<\/span><\/li>\n<li>1,000 hosts EU Mix go for $50, 5,000 hosts EU Mix go for $225, and 10,000 hosts EU Mix go for $400<\/li>\n<li>1,000 hosts DE, CA and GB, go for $80, 5,000 hosts go for $350, and 10,000 hosts go for $600<\/li>\n<li>Naturally, access to a U.S.-based host is more expensive compared to the rest of the world. A 1,000 U.S. hosts go for $120, 5,000 U.S. hosts go for $550 and 10,000 U.S hosts go for $1,000<\/li>\n<\/ul>\n<p>Thanks to the rise of <a href=\"http:\/\/blog.webroot.com\/tag\/diy\/\"><strong>DIY (do it \u00a0yourself)<\/strong><\/a> underground market propositions, as well as managed services allowing novice cybercriminals to outsource the entire host acquisition, retention through QA (Quality Assurance), and dissemination of malicious campaigns to third-parties offering these capabilities as a service, we expect to see more of these services offering access to malware-infected hosts.<\/p>\n<p><em>You can find more about Dancho Danchev at his\u00a0<a href=\"http:\/\/linkedin.com\/in\/danchodanchev\"><strong>LinkedIn Profile<\/strong><\/a>. You can also\u00a0<a href=\"http:\/\/www.twitter.com\/danchodanchev\"><strong>follow him on \u00a0Twitter<\/strong><\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Earlier this month, we profiled and exposed a newly launched underground service offering access to tens of thousands of malware-infected hosts, with an emphasis on the fact that U.S.-based hosts were relatively more expensive to acquire, largely due to the fact that U.S.-based users are known to have a higher online purchasing power. How much [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17052,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[13677,13661,13445,13443,13675,13659,13651,13681,13669,13655,13667,13665,13663,9887,13671,13657,13673,11959,13679,13653],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/9892"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=9892"}],"version-history":[{"count":1,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/9892\/revisions"}],"predecessor-version":[{"id":23723,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/9892\/revisions\/23723"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17052"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=9892"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=9892"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=9892"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=9892"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}