Mercenary Cyber Spies For Hire

It was once the case that only governments had the technical ability to penetrate secure data, telecoms networks and the devices connected to them. Today, the threat posed by private firms with cyber capabilities that rival the world’s most skilled spy agencies, is not widely known. 

The spy-for-hire industry targets people and organisations and aims to collect their intelligence information and monitor them to infiltrate their technology devices. These operations silently get their victims to unwittingly reveal information and often compromise their devices and accounts. 

One such as these is an emerging cyber crime organisation called the Atlantis Cyber-Army or the  Atlas Intelligence Group (AIG), which is offering a range of services, including exclusive data leaks, DDoS attacks, and Remote Desktop Protoctol (RDP) exploits. 

This criminal group operates on a for-hire basis and seeks to recruit cyber mercenaries that conduct specific illicit activities that are pieces of larger cyber campaigns. 

Organised threat groups tend to follow a similar path in which they recruit individuals with certain desirable capabilities that can benefit the group’s agenda. AIG strays from this model by outsourcing specific aspects of an attack to mercenaries, who are not responsible or involved in the rest of the attack. Each actor focuses on a specific piece of the attack and multiple different individuals may be involved. Their activities include Ransomware-as-a-Service exploits which can involve multiple threat actors, each being paid a percentage of any extorted funds or digital assets stolen.

What makes AIG different is it outsources specific aspects of an attack to mercenaries who have no further involvement in an attack.

The group is understood to have targeted various sectors, including education, finance, government entities, manufacturing and technology, and published leaked databases for sale on the Dark Web, with a starting price from little as 15 Euros.

AIG offers premium services that demand more skill and demonstrate the group’s sophistication, researchers said. One of these products is hacked panels and initial access to organisations, with prices for these services starting from about $1,000. The group also offers “VIP services” that claim ties to people in law-enforcement positions across Europe that can give customers access to sensitive information about specific individuals.

Meta:   Theatpost:   Oodaloop:   PSBE News Group:    Spiceworks:    Heal Security:   The Cipehr Brief:    

Techmonitor:     Reddit

You Might Also Read: 

Revealed: Top Secret Israeli Hackers For Hire:

 

« Building a Threat-Ready Ransomware Response Plan
Cyber Attacks On Port of Los Angeles Have Doubled »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Chertoff Group

Chertoff Group

The Chertoff Group provide security advice and risk management services covering cyber security, insider threat, physical security and asset protection.

Information Security Systems (ISSCOM)

Information Security Systems (ISSCOM)

ISSCOM provide services to help companies implement Information Security Management Systems (ISMS) by providing consultancy and hands-on assistance.

Vectra Networks

Vectra Networks

Vectra provides real-time attack visibility and non-stop automated threat hunting powered by artificial intelligence.

Australian Cyber Security Growth Network (AustCyber)

Australian Cyber Security Growth Network (AustCyber)

AustCyber brings together businesses and researchers to develop the next generation of cyber security products and services.

Thinkst Applied Research

Thinkst Applied Research

Thinkst is an Applied Research company with a deep focus on information security.

CipherMail

CipherMail

CipherMail provides email security products which allow organizations world wide to automatically protect their email against unauthorized access both in transit and at rest.

Approachable Certification

Approachable Certification

Approachable Certification is a UKAS accredited certification body offering down-to-earth and competitively priced audits against ISO Management Systems standards.

PeckShield

PeckShield

PeckShield is a blockchain security company which aims to elevate the security, privacy, and usability of entire blockchain ecosystem by offering top-notch, industry-leading services and products.

Cyber Range Solutions (CRS)

Cyber Range Solutions (CRS)

CRS provides cyber security training and improve security team performance by providing a hyper realistic, virtual training environment.

Wavex Technology

Wavex Technology

Wavex Technology is an award winning IT Services firm offering clients a secure and fully managed IT service.

DatChat

DatChat

DatChat Inc. is a blockchain, cybersecurity, and social media company that focuses on protecting privacy on our devices and also protecting our information after we have shared it with others.

NI Cyber Security Centre

NI Cyber Security Centre

NI Cyber Security Centre works to make Northern Ireland cyber safe, secure and resilient for its citizens and businesses.

Anonomatic

Anonomatic

Anonomatic’s mission is to make data privacy secure, simple and cost effective. We are Data and Privacy Experts who are passionate about helping organizations solve PII compliance.

KYND

KYND

KYND has created pioneering cyber risk technology that makes assessing, understanding, and managing business cyber risks easier and quicker than ever before.

SecureTeam

SecureTeam

SecureTeam are a UK-based information security practice, specialising in all areas of cybersecurity.

Recast Software

Recast Software

Recast Software exists to simplify the work of IT teams and enable them to create highly secure and compliant environments.