centristic
  • Solutions
    • Governance, Risk and Compliance Services
    • Identity and Access Management Service
    • Data Protection & Privacy
    • Cyber & Information Security
    • Attack Simulation
    • Office 365 & Azure Security
  • Services
    • Attack Simulation
    • Cyber & Information Security
    • Data Protection & Privacy
    • Governance, Risk and Compliance Services
    • Identity and Access Management Service
    • Office 365 & Azure Security
  • Support
    • Contact Us
  • Company
+1 (954) 488-2643
  • Solutions
    • Governance, Risk and Compliance Services
    • Identity and Access Management Service
    • Data Protection & Privacy
    • Cyber & Information Security
    • Attack Simulation
    • Office 365 & Azure Security
  • Services
    • Attack Simulation
    • Cyber & Information Security
    • Data Protection & Privacy
    • Governance, Risk and Compliance Services
    • Identity and Access Management Service
    • Office 365 & Azure Security
  • Support
    • Contact Us
  • Company
centristic
  • Solutions
    • Governance, Risk and Compliance Services
    • Identity and Access Management Service
    • Data Protection & Privacy
    • Cyber & Information Security
    • Attack Simulation
    • Office 365 & Azure Security
  • Services
    • Attack Simulation
    • Cyber & Information Security
    • Data Protection & Privacy
    • Governance, Risk and Compliance Services
    • Identity and Access Management Service
    • Office 365 & Azure Security
  • Support
    • Contact Us
  • Company
Blog
Home Data Breach Business Booming for Hackers and Cyber-Criminals: The Dark Economy
Data BreachNEWSRansomwareSecurity

Business Booming for Hackers and Cyber-Criminals: The Dark Economy

Roland Rodriguez August 26, 2020 0 Comments

“This pandemic is great for my business!” said very few people.

Unless you’re a hacker or professional cyber-criminal. And then it’s likely that business is booming. We don’t think of cyber criminals as business people. We tend to think they are individuals lurking about in hoodies in their basement. Quite the opposite – or so we have found through investigations and the exposure of organizations that steal our information. These are well organized and structured businesses that thrive within their own economies. That means that supply and demand dictate prices and demand. Stolen credentials, compromised accounts, credit card information, identification details, and the list goes on – they all hold a value that will rise and fall as dictated by their economy.

Recently the Dark Web Price Index 2020 revealed the menu of cybercrime options and their current value. Starting at just $15, you can acquire a cloned Mastercard WITH the PIN. And over here, for the low, low price of $20, you can be hooked up with credit card details that include an available balance of up to $5000!

“These are well organized and structured businesses that thrive”

It is very disheartening to think that one quick mistake can lead to hours and hours – days in fact, of lost time trying to recover what was stolen from you so quickly and sold at such a minuscule amount, comparatively speaking. And that is just on the personal identification front. Imagine if those credentials came linked to a business? The damage that is incurred goes beyond one individual and can destroy multiple lives with job loss, lawsuits, and so on.

Supply and Demand

There has been a move away from certain types of cyber criminal activity based on the economy of the dark web. For instance, the cost to obtain someone’s full identity has decreased from recent years because of a surplus in available credentials due to the success of several large breaches. Yes, just like sugar and wheat, if there is too much, the cost goes down.

DDoS attacks have risen in popularity. Why? It seems that the low cost of $10 per hour to deploy one offers a discount that can’t be passed up. The scale and bandwidth of the damage is greater as well, offering more ‘bang for your buck’.

Sadly, It is unlikely that punishment will occur, if the cyber-criminals are ever even caught. Low risk, high payout. You can see how the rise in cyber crime isn’t going away anytime soon. OK, let’s be honest, it’s never going away.

How to Deal

You deal with the rise and the risk by not ignoring it. Take action AHEAD of time. Acknowledge that the danger is present, the damage may not be repairable, and you need to make a plan to be proactive as well as reactive. We say it over and over and again, but you can’t wait for the ‘one day’ – you need to take action today and train, inform, remind, educate, protect – utilize ALL of the ways to make the point to your employees, your clients, and your family and friends. It matters.

80
974 Views
AboutRoland Rodriguez
IT security analyst with Centristic since 2014.
In Socials:
An Eruption of Zoom Meeting Phishing AttacksPrevAn Eruption of Zoom Meeting Phishing AttacksAugust 17, 2020
BEC Scams are BackSeptember 2, 2020BEC Scams are BackNext

Related Posts

NEWSRansomwareTips and Tricks

Forget Me Not!

Remember your MySpace account? Or when your significant other wanted you to create a...

Roland Rodriguez August 13, 2020
Data BreachEmail ScamsNEWSPhishingRansomwareSecurityTips and Tricks

Attackers are using Scare Tactics to Take Advantage of People in 2020.

With the onset of COVID-19, there were a plethora of new opportunities for...

Roland Rodriguez August 4, 2020
Recent Posts
  • A zero-day vulnerability was discovered in Google Chrome 
  • Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability
  • Cybersecurity Threat Advisory: BlackMatter Ransomware
  • CISA Launches Campaign to Reduce the Risk of Ransomware – Centristic Launches Campaign to Eliminate the Risk
  • 9 Cybersecurity Tips to Keep Your Device and Data Safe
Categories
  • Data Breach
  • tipsEmail Scams
  • HIPAA
  • newsNEWS
  • tipsPhishing
  • phishRansomware
  • Security
  • Tips and Tricks
  • Uncategorized
Search our Site

Centristic delivers the industry’s most complete IT security and secured solutions to small cap business. Whatever your IT security needs and goals, and wherever you’re starting,

Quick Links
  • Solutions
  • Services
  • Support
  • Company
  • Blog
Get In Touch

Adress:
5645 Coral Ridge Dr #230 Coral Springs, FL 33076-3124
Phone:
+1 (954) 488-2643
Business Hours:
Monday – Friday: 9am to 6pm
Saturday – Sunday: Closed

Copyright © 2020 Centristic. All Rights Reserved