Hackers Can Buy Tools To Attack Your Business For $40

Cyber threats and attacks are continuing to increase, according to a recent study by Positive TechnologiesMajor cyber incidents have increased by 32% between Q1 2017 and Q1 2018, according to another Positive Technologies post. Through their analysis, the organisation found that the rise in attacks can be attributed to ready-made malware.

Positive Technologies then analyzed 25 dark web sites to examine the costs of cybercrime services across the Dark Web, from simple to more complex attacks.

With remote desktop protocol (RDP) access to businesses being sold on the dark web for  10 bucks, users have already seen how easily they can be compromised. However, the inexpensive hacking tactics don't stop at RDP, and some of them are shockingly low.

Here are the costs of different cybercrime services, according to Positive Technologies:

  • Hacking email: $40
  • DDoS attack: $50
  • Hacking website: $150
  • Stealing payment data $270
  • Infecting with Trojan for mining: $300
  • Infecting with ransomware Trojan: $750
  • Stealing from ATM: $1,500
  • Targeted attack: $4,500

Starting at $40, hackers can infiltrate a business' email and steal sensitive information. With the price of attacks starting so low, cybercrime isn't directed only at big business.  Some 71% of SMBs are not prepared for cybersecurity risks, and with how cheap it is to attack, they need to shore up their defenses.

Big businesses aren't safe either. Since costs are so low, hackers could purchase multiple attack services to target large enterprises from different angles. If hackers can't afford the larger, more dangerous attacks, they can still do damage with a slew of smaller attacks.

TechRepublic

You Might Also Read: 

For Sale: Access To Airport Security:

Data About Your Company On The Dark Web:

« Malware – The Hateful Eight
The Impact Of Economic Espionage »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Exclusive Networks

Exclusive Networks

Exclusive Networks accelerate market entry and growth for innovative cybersecurity, networking and infrastructure technologies.

FDM Group

FDM Group

FDM Group is an international Professional services company with a focus on IT. Services offered include Software Testing, and Information Security with a focus on operational security and compliance.

Applause

Applause

Applause provides real-world software testing for functionality, usability, accessibility, load, localization and security.

Chainalysis

Chainalysis

Chainalysis provides blockchain analysis software to prevent, detect and investigate cryptocurrency money laundering, fraud and compliance violations.

Greenwave Systems

Greenwave Systems

Greenwave's AXON Platform enables IoT and M2M network service providers to address security, interoperability, flexibility and scalability from a single IoT platform.

Threatspan

Threatspan

Threatspan is a cybersecurity firm helping shipping and maritime enterprises achieve and maintain nautical resilience in an age of increasing cyber threats.

Ksmartech

Ksmartech

Ksmartech provide services related to security and authentication in all areas where the connection of people to objects, and objects and objects is necessary.

High Security Center (HSC)

High Security Center (HSC)

High Security Center provide real-time threat protection. We protect your company from targeted and persistent attacks using technologies such as Machine Learning and Behavioral Analysis.

Spohn Solutions

Spohn Solutions

Spohn combines highly-experienced staff with a vendor neutral approach to deliver optimal solutions for IT Security and Compliance.

JFrog

JFrog

JFrog is on a mission to enable continuous updates through Liquid Software, empowering developers to code high-quality applications that securely flow to end-users with zero downtime.

Cymune

Cymune

At Cymune we help businesses to fight against cybercrime, protect patented data and diminish security risks.

VLC Solutions

VLC Solutions

VLC Solutions is an independent solutions and technology service provider offering Cloud Services, Cybersecurity, ERP Services, Network Management Services, and Compliance Solutions.

Space Hellas

Space Hellas

Space Hellas is a dynamic, established System Integrator and Value Added Solutions Provider, holding a leading position in the high technology arena.

PixelQA

PixelQA

Are you looking for a security testing company to cross-check whether your software or mobile app has a possible security threat or not?

Triskele Labs

Triskele Labs

Triskele Labs deliver services including Penetration Testing, Compliance and Risk Management through to 24*7*365 Security Operations and outsourced Cybersecurity Managers.