Mercenary Cyber Spies For Hire

It was once the case that only governments had the technical ability to penetrate secure data, telecoms networks and the devices connected to them. Today, the threat posed by private firms with cyber capabilities that rival the world’s most skilled spy agencies, is not widely known. 

The spy-for-hire industry targets people and organisations and aims to collect their intelligence information and monitor them to infiltrate their technology devices. These operations silently get their victims to unwittingly reveal information and often compromise their devices and accounts. 

One such as these is an emerging cyber crime organisation called the Atlantis Cyber-Army or the  Atlas Intelligence Group (AIG), which is offering a range of services, including exclusive data leaks, DDoS attacks, and Remote Desktop Protoctol (RDP) exploits. 

This criminal group operates on a for-hire basis and seeks to recruit cyber mercenaries that conduct specific illicit activities that are pieces of larger cyber campaigns. 

Organised threat groups tend to follow a similar path in which they recruit individuals with certain desirable capabilities that can benefit the group’s agenda. AIG strays from this model by outsourcing specific aspects of an attack to mercenaries, who are not responsible or involved in the rest of the attack. Each actor focuses on a specific piece of the attack and multiple different individuals may be involved. Their activities include Ransomware-as-a-Service exploits which can involve multiple threat actors, each being paid a percentage of any extorted funds or digital assets stolen.

What makes AIG different is it outsources specific aspects of an attack to mercenaries who have no further involvement in an attack.

The group is understood to have targeted various sectors, including education, finance, government entities, manufacturing and technology, and published leaked databases for sale on the Dark Web, with a starting price from little as 15 Euros.

AIG offers premium services that demand more skill and demonstrate the group’s sophistication, researchers said. One of these products is hacked panels and initial access to organisations, with prices for these services starting from about $1,000. The group also offers “VIP services” that claim ties to people in law-enforcement positions across Europe that can give customers access to sensitive information about specific individuals.

Meta:   Theatpost:   Oodaloop:   PSBE News Group:    Spiceworks:    Heal Security:   The Cipehr Brief:    

Techmonitor:     Reddit

You Might Also Read: 

Revealed: Top Secret Israeli Hackers For Hire:

 

« Building a Threat-Ready Ransomware Response Plan
Cyber Attacks On Port of Los Angeles Have Doubled »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

SQA Service

SQA Service

SQA Service provide independent software and process Quality Assurance services.

PFP Cybersecurity

PFP Cybersecurity

PFP provides a SaaS solution for life-cycle protection based on our IoT security platform and power usage analytics.

Global Learning Systems (GLS)

Global Learning Systems (GLS)

Global Learning Systems provides security awareness and compliance training programs for employees that effectively promote behavior change and protect your organization.

Oppida

Oppida

Oppida provides tailored IT security services to help you identify security gaps and assist in finding the most effective remediation.

Software Engineering Institute (SEI)

Software Engineering Institute (SEI)

At the CERT Division of SEI we study and solve cybersecurity problems, research security vulnerabilities in software, and develop information and training to help improve cybersecurity.

National Cyber Summit (NCS)

National Cyber Summit (NCS)

The National Cyber Summit is the preeminent event for cyber training, education and workforce development aimed at protecting our nation's infrastructure from the ever-evolving cyber threat.

mPrest

mPrest

mPrest is a global provider of mission-critical monitoring and control solutions for the defense, security, utility and Industrial Internet of Things (IoT) sectors.

Sphonic

Sphonic

Sphonic provides regulated institutions of any size a powerful compliance & risk platform to quickly and securely onboard new customers and manage ongoing AML and Fraud & Risk trends.

River Loop Security

River Loop Security

River Loop Security specialize in solving complex cybersecurity challenges in the IoT and embedded devices space.

AaDya

AaDya

AaDya provide smart, simple, affordable and effective cybersecurity software solutions for small and medium businesses.

TRU Staffing Partners

TRU Staffing Partners

TRU Staffing Partners is an award-winning contract staffing and executive search firm for cybersecurity, eDiscovery and privacy companies and professionals.

World Cyber Security Summit

World Cyber Security Summit

World Cyber Security Summit, by Trescon, is a thought-leadership driven platform for CISOs who are looking to explore new-age threats and the technologies/strategies that can help mitigate them.

TPx Communications

TPx Communications

TPx is a leading managed services provider offering a full suite of managed IT, unified communications, network connectivity and security services.

Oregon Systems

Oregon Systems

Oregon Systems is a Regional Leader & Distributor with value added services for OT, IoT, IIoT & IT Cybersecurity products, Solutions & professional services throughout the middle-east region.

Nuke From Orbit

Nuke From Orbit

Nuke's mission is to put you back in control of your digital identity when your smartphone gets stolen.

Hydden

Hydden

Hydden gives security teams the ability to create a solid foundation to build a truly next-gen identity security practice by bridging the gaps between siloed teams and technologies.