Mercenary Cyber Spies For Hire

It was once the case that only governments had the technical ability to penetrate secure data, telecoms networks and the devices connected to them. Today, the threat posed by private firms with cyber capabilities that rival the world’s most skilled spy agencies, is not widely known. 

The spy-for-hire industry targets people and organisations and aims to collect their intelligence information and monitor them to infiltrate their technology devices. These operations silently get their victims to unwittingly reveal information and often compromise their devices and accounts. 

One such as these is an emerging cyber crime organisation called the Atlantis Cyber-Army or the  Atlas Intelligence Group (AIG), which is offering a range of services, including exclusive data leaks, DDoS attacks, and Remote Desktop Protoctol (RDP) exploits. 

This criminal group operates on a for-hire basis and seeks to recruit cyber mercenaries that conduct specific illicit activities that are pieces of larger cyber campaigns. 

Organised threat groups tend to follow a similar path in which they recruit individuals with certain desirable capabilities that can benefit the group’s agenda. AIG strays from this model by outsourcing specific aspects of an attack to mercenaries, who are not responsible or involved in the rest of the attack. Each actor focuses on a specific piece of the attack and multiple different individuals may be involved. Their activities include Ransomware-as-a-Service exploits which can involve multiple threat actors, each being paid a percentage of any extorted funds or digital assets stolen.

What makes AIG different is it outsources specific aspects of an attack to mercenaries who have no further involvement in an attack.

The group is understood to have targeted various sectors, including education, finance, government entities, manufacturing and technology, and published leaked databases for sale on the Dark Web, with a starting price from little as 15 Euros.

AIG offers premium services that demand more skill and demonstrate the group’s sophistication, researchers said. One of these products is hacked panels and initial access to organisations, with prices for these services starting from about $1,000. The group also offers “VIP services” that claim ties to people in law-enforcement positions across Europe that can give customers access to sensitive information about specific individuals.

Meta:   Theatpost:   Oodaloop:   PSBE News Group:    Spiceworks:    Heal Security:   The Cipehr Brief:    

Techmonitor:     Reddit

You Might Also Read: 

Revealed: Top Secret Israeli Hackers For Hire:

 

« Building a Threat-Ready Ransomware Response Plan
Cyber Attacks On Port of Los Angeles Have Doubled »

Quartz Conference
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

iLand

iLand

iland is a global cloud service provider of secure and compliant hosting for infrastructure (IaaS), disaster recovery (DRaaS), and backup as a service (BaaS).

Hitachi Systems Security

Hitachi Systems Security

Hitachi Systems Security provides customized services for monitoring and protecting the most critical and sensitive IT assets in our clients’ infrastructures 24/7.

Auxilium Cyber Security

Auxilium Cyber Security

Auxilium Cyber Security is independent information security consultancy company.

Cycura

Cycura

Cycura provide advanced, customized, and confidential cyber security services, cyber investigation services, and digital forensic services to governments, companies, and organizations.

LEPL Cyber ​​Security Bureau - Georgia

LEPL Cyber ​​Security Bureau - Georgia

The aim of the LEPL Cyber Security Bureau is to create and strengthen stable, efficient and secure systems of information and communications technologies.

Callsign

Callsign

Callsign’s mission is to seamlessly power the identification of every web, mobile and physical interaction.

Confluera

Confluera

Confluera's Real-time Cyber Attack Interception and Defense Platform helps security teams detect & intercept sophisticated cyber attacks.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

HUB Security

HUB Security

Hub Security provide Ultra Secure, Military Grade HSM (Hardware Security Module) Solutions for Blockchain and Digital Assets.

German Israeli Partnership Accelerator (GIPA)

German Israeli Partnership Accelerator (GIPA)

GIPA is based on two pillars: it is an incubator aimed at young academics and a program to transfer cybersecurity expertise to corporate partners.

AUREA Technology

AUREA Technology

The photon counter SPD_OEM_NIR from AUREA Technology is designed for quantum key distribution at telecom wavelengths.

Kinnami Software

Kinnami Software

Kinnami is a data security company that equips organizations with the tools they need to secure and protect highly confidential documents and data.

Intellias

Intellias

Intellias is a trusted technology partner to top-tier organizations and digital natives helping them accelerate their pace of sustainable digitalization.

Gray Analytics

Gray Analytics

Gray Analytics is a Cybersecurity Risk Management company providing best-practice services across a broad spectrum of cyber scenarios for both government and commercial customers.

Ghost Security

Ghost Security

Ghost is a venture backed, product-led startup building the new standard in application security for the modern enterprise.

Aceiss

Aceiss

Aceiss empowers access security, providing unprecedented visibility and insights into user access.