Hackers Can Buy Tools To Attack Your Business For $40

Cyber threats and attacks are continuing to increase, according to a recent study by Positive TechnologiesMajor cyber incidents have increased by 32% between Q1 2017 and Q1 2018, according to another Positive Technologies post. Through their analysis, the organisation found that the rise in attacks can be attributed to ready-made malware.

Positive Technologies then analyzed 25 dark web sites to examine the costs of cybercrime services across the Dark Web, from simple to more complex attacks.

With remote desktop protocol (RDP) access to businesses being sold on the dark web for  10 bucks, users have already seen how easily they can be compromised. However, the inexpensive hacking tactics don't stop at RDP, and some of them are shockingly low.

Here are the costs of different cybercrime services, according to Positive Technologies:

  • Hacking email: $40
  • DDoS attack: $50
  • Hacking website: $150
  • Stealing payment data $270
  • Infecting with Trojan for mining: $300
  • Infecting with ransomware Trojan: $750
  • Stealing from ATM: $1,500
  • Targeted attack: $4,500

Starting at $40, hackers can infiltrate a business' email and steal sensitive information. With the price of attacks starting so low, cybercrime isn't directed only at big business.  Some 71% of SMBs are not prepared for cybersecurity risks, and with how cheap it is to attack, they need to shore up their defenses.

Big businesses aren't safe either. Since costs are so low, hackers could purchase multiple attack services to target large enterprises from different angles. If hackers can't afford the larger, more dangerous attacks, they can still do damage with a slew of smaller attacks.

TechRepublic

You Might Also Read: 

For Sale: Access To Airport Security:

Data About Your Company On The Dark Web:

« Malware – The Hateful Eight
The Impact Of Economic Espionage »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Echelon

Echelon

Echelon Company is a provider of information security services specializing in certification of security software and hardware products in Russia.

CloudHesive

CloudHesive

CloudHesive provides cloud solutions through consulting and managed services with a focus on security, reliability, availability and scalability.

National Cyber Security Centre (NCSC) - United Kingdom

National Cyber Security Centre (NCSC) - United Kingdom

The NCSC acts as a bridge between industry and government, providing a unified source of advice, guidance and support on cyber security, including the management of cyber security incidents.

TrustArc

TrustArc

TrustArc provide privacy compliance and risk management with integrated technology, consulting and TRUSTe certification solutions – addressing all phases of privacy program management.

Futurex

Futurex

Futurex is a globally recognized provider of enterprise-class data encryption solutions.

BlueVoyant

BlueVoyant

BlueVoyant's Cyber Defense Platform is security operations platform that provides real-time threat monitoring for networks, endpoints, and supply chains.

Digital Fingerprints

Digital Fingerprints

Digital Fingerprints provides continuous authentication with behavioural biometrics. Protection against account takeover and session takeover. Compliant with GDPR and PSD2.

CyberClan

CyberClan

CyberClan’s carefully selected team of experts is capable of solving complex cyber security challenges – keeping your data secure and your businesses running as usual.

PricewaterhouseCoopers (PwC)

PricewaterhouseCoopers (PwC)

PricewaterhouseCoopers is a multinational professional services network of firms headquartered in London, United Kingdom and operating in 157 countries.

Alias Robotics

Alias Robotics

Alias Robotics is a robot cyber security company. We deliver cyber security solutions for robots and robot components.

Trusted Cyber Solutions

Trusted Cyber Solutions

Trusted Cyber Solutions is an independent Cyber Security and Risk Management consultancy.

ATSG

ATSG

ATSG is a global leader in transformational technology solutions for today’s digital enterprise. Cybersecurity ranging from Advisory & Assessment to Fully Managed Detection and Response Services.

ZAG Technical Services

ZAG Technical Services

ZAG Technical Services is an award-winning information technology consulting firm delivering digital transformation solutions, IT assessments, managed services, security, and support.

Harmonic Security

Harmonic Security

Harmonic Security helps companies to adopt Generative AI without risking the security and privacy of their data.

ModelOp

ModelOp

ModelOp is the leading AI Governance software for enterprises and helps safeguard all AI initiatives.

Consortium

Consortium

Consortium goes beyond products and promises by working with enterprises to identify, acquire, and deploy cybersecurity solutions that matter.