Hackers Can Buy Tools To Attack Your Business For $40

Cyber threats and attacks are continuing to increase, according to a recent study by Positive TechnologiesMajor cyber incidents have increased by 32% between Q1 2017 and Q1 2018, according to another Positive Technologies post. Through their analysis, the organisation found that the rise in attacks can be attributed to ready-made malware.

Positive Technologies then analyzed 25 dark web sites to examine the costs of cybercrime services across the Dark Web, from simple to more complex attacks.

With remote desktop protocol (RDP) access to businesses being sold on the dark web for  10 bucks, users have already seen how easily they can be compromised. However, the inexpensive hacking tactics don't stop at RDP, and some of them are shockingly low.

Here are the costs of different cybercrime services, according to Positive Technologies:

  • Hacking email: $40
  • DDoS attack: $50
  • Hacking website: $150
  • Stealing payment data $270
  • Infecting with Trojan for mining: $300
  • Infecting with ransomware Trojan: $750
  • Stealing from ATM: $1,500
  • Targeted attack: $4,500

Starting at $40, hackers can infiltrate a business' email and steal sensitive information. With the price of attacks starting so low, cybercrime isn't directed only at big business.  Some 71% of SMBs are not prepared for cybersecurity risks, and with how cheap it is to attack, they need to shore up their defenses.

Big businesses aren't safe either. Since costs are so low, hackers could purchase multiple attack services to target large enterprises from different angles. If hackers can't afford the larger, more dangerous attacks, they can still do damage with a slew of smaller attacks.

TechRepublic

You Might Also Read: 

For Sale: Access To Airport Security:

Data About Your Company On The Dark Web:

« Malware – The Hateful Eight
The Impact Of Economic Espionage »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Asavie

Asavie

Asavie provide solutions for Enterprise Mobility Management and secure IoT Connectivity.

Securi-Tay

Securi-Tay

Securi-Tay is an information Security conference held by the Ethical Hacking Society at Abertay University, Dundee.

Organization for Security and Co-operation in Europe (OSCE)

Organization for Security and Co-operation in Europe (OSCE)

OSCE is the world's largest security-oriented intergovernmental organization. Areas of activity include Cyber/ICT security.

Evolve Secure Solutions

Evolve Secure Solutions

Evolve Secure Solutions is a security focused managed services provider serving private and public customers across the UK.

Comarch

Comarch

Comarch is a provider of IT business solutions to optimize operational and business processes. Cyber security solutions are focused on Identity Management and Security Assessment services.

Physec

Physec

Physec offers innovative security products and solutions for the Internet of Things ecosystem.

Cycode

Cycode

Cycode is the industry’s first source code control, detection, and response platform.

IdentityIQ

IdentityIQ

IdentityIQ is a US-based identity theft and credit protection company designed to help users stay on top identity thieves and data breaches.

Zero Networks

Zero Networks

With Zero Network, you can achieve affordable, airtight network access security at scale.

Deepnet Security

Deepnet Security

Deepnet Security is a leading vendor in Multi-Factor Authentication (MFA) and Identity & Access Management (IAM).

Crypto International

Crypto International

Crypto International offers comprehensive services for the operation of our customers’ IT and communication infrastructure, with a focus on cybersecurity and encryption solutions.

Samurai Digital Consulting

Samurai Digital Consulting

Samurai Digital Security are a cyber and Information security services provider, specialising in penetration testing, incident response, user awareness and information governance solutions.

Arqit Quantum

Arqit Quantum

Arqit's mission is to use transformational quantum encryption technology to keep safe the data of our governments, enterprises and citizens.

ActiveFence

ActiveFence

ActiveFence enables Trust & Safety teams to be proactive about online integrity so they can keep their users safe from online harm – across content formats, languages, and abuse areas.

CaseMatrix

CaseMatrix

Discover a new era of legal intelligence with CaseMatrix. We identify potential class action cases arising from cyber incidents and data breaches.

AKIPS

AKIPS

AKIPS develops the world's most scalable network and infrastructure monitoring software, delivered as a turn-key software appliance.