Cyber-Bedrohungsdaten: Licht in den tiefen, dunklen Untergrund der Cyberkriminalität bringen

Teilen:

Learn about critical threats that can impact your organization and the bad actors behind them from Cybersixgill’s threat experts. Each story shines a light on underground activities, the threat actors involved, and why you should care, along with what you can do to mitigate risk.

The deep and dark web, otherwise known as the cybercriminal underground, is where malicious actors gather to exchange plans, sell goods or services, and recruit others to help in their illicit activities. Grasping how it functions and the intelligence it offers is crucial for proactively safeguarding your environment against attacks, as it is in these spaces that threat actors frequently reveal their intentions prior to launching an attack.

The State of the Underground 2024

Our annual State of the Underground 2024 is a detailed report that sheds light on the evolving underworld of cybercrime, exploring trends and behaviors observed within the deep, dark web during 2023. This comprehensive analysis, compiled by Cybersixgill’s cyber threat intelligence experts, provides valuable insights into the tactics, techniques, and technologies employed by threat actors worldwide. Topics addressed in the report include:

  • Compromised credit card trends
  • Physical products on the underground
  • Messaging platforms and underground forums
  • Initial access trends
  • Malware and ransomware trends

The report completes its analysis with a look back at Cybersixgill’s 2023 predictions, assessing whether those predictions came true (or not) and the impact they had on the cybersecurity landscape.

Click here to learn more

Take a guided tour of the underground

Because the dark web is a hub for cybercriminals to exchange tools, information, and services, dark web threat intelligence is crucial for companies, as it offers an uncensored view into the current cybercrime landscape and trends. Accessing deep and dark web sources is challenging since they are not indexed and require exact URLs. These underground sites constantly post data, from credit card information and data dumps to compromised endpoints, malicious programs, and narcotics. Join Cybersixgill’s Cyber Threat Intelligence Analyst Michael-Angelo Zummo as he demonstrates how to access the dark web and provides a tour of this hidden world.

Click here to watch

Inside the mind of a hacker

If you’ve ever wondered what life as a threat actor on the cybercriminal underground is like, you’ll want to watch this webinar. In it, our experts provide a rare glimpse into the mind of a hacker and the tools they use to undertake malicious activities. Using the Cyber Kill Chain framework to map the stages of successful cyber attacks, the discussion delves into how hackers think, their methods for infiltrating and exploiting networks, and their motivations for doing so.

Discover more here

Wholesale Access Markets: a feeding ground for ransomware The first stage of an active cyberattack is gaining initial access to establish a foothold within a network. This step is challenging, so many aspiring attackers buy network access from skilled threat actors. There are two main types of access-as-a-service available on the underground: initial access brokers (IABs) and wholesale access markets (WAMs). IABs auction access to companies for hundreds to thousands of dollars, while WAMs sell access to compromised endpoints for about $10.

WAMs are like flea markets with low prices, a vast inventory, and poor quality (since listings could belong to random individual users or enterprise endpoints). Still, they can play a big role in how threat actors launch ransomware attacks. Our research provides an analysis of SaaS logins in WAM listings and describes how threat actors might attribute the listing to an enterprise. In other words, WAM posts often list the resources into which the compromised endpoint is connected, which can reveal a major vulnerability for enterprises. For-sale systems that are logged onto enterprise software (for example, Slack or Jira) presumably belong to the organization whose name is often mentioned in the URL.

The Hacker News

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
11:40 am, Juni 29, 2025
Wetter-Symbol 25°C
L: 23° | H: 26°
aufgelockerte Bewölkung
Luftfeuchtigkeit: 64 %
Druck: 1025 mb
Wind: 3 mph E
Windböe: 3 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 34%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 4:46 am
Sonnenuntergang: 9:21 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 10:00 pm
Wetter-Symbol
23° | 26°°C 0 mm 0% 5 mph 64 % 1025 mb 0 mm/h
Tomorrow 10:00 pm
Wetter-Symbol
20° | 35°°C 0 mm 0% 8 mph 71 % 1021 mb 0 mm/h
Di. Juli 01 10:00 pm
Wetter-Symbol
22° | 33°°C 0 mm 0% 12 mph 70 % 1017 mb 0 mm/h
Mi. Juli 02 10:00 pm
Wetter-Symbol
16° | 22°°C 1 mm 100% 11 mph 94 % 1017 mb 0 mm/h
Do. Juli 03 10:00 pm
Wetter-Symbol
14° | 20°°C 1 mm 100% 12 mph 95 % 1026 mb 0 mm/h
Today 1:00 pm
Wetter-Symbol
25° | 26°°C 0 mm 0% 5 mph 64 % 1025 mb 0 mm/h
Today 4:00 pm
Wetter-Symbol
26° | 29°°C 0 mm 0% 3 mph 56 % 1024 mb 0 mm/h
Today 7:00 pm
Wetter-Symbol
26° | 27°°C 0 mm 0% 4 mph 44 % 1022 mb 0 mm/h
Today 10:00 pm
Wetter-Symbol
22° | 22°°C 0 mm 0% 3 mph 54 % 1021 mb 0 mm/h
Tomorrow 1:00 am
Wetter-Symbol
21° | 21°°C 0 mm 0% 3 mph 65 % 1021 mb 0 mm/h
Tomorrow 4:00 am
Wetter-Symbol
20° | 20°°C 0 mm 0% 4 mph 71 % 1020 mb 0 mm/h
Tomorrow 7:00 am
Wetter-Symbol
22° | 22°°C 0 mm 0% 4 mph 62 % 1020 mb 0 mm/h
Tomorrow 10:00 am
Wetter-Symbol
28° | 28°°C 0 mm 0% 5 mph 43 % 1019 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€92,236.89
0.69%
Ethereum(ETH)
€2,093.75
1.04%
Fesseln(USDT)
€0.85
0.00%
XRP(XRP)
€1.87
0.10%
Solana(SOL)
€129.25
2.86%
USDC(USDC)
€0.85
0.01%
Dogecoin(DOGE)
€0.140321
0.93%
Shiba Inu(SHIB)
€0.000010
1.51%
Pepe(PEPE)
€0.000009
1.59%
Nach oben scrollen