Cybercrime Markets & Underground Economy¶
Overview at a Glance
Category: Cybercrime Infrastructure / Supply Chain Function: Enables all cybercrime actors through specialization and commerce Scale: Estimated $1.5--10.5T annual cybercrime economy (Cybersecurity Ventures; World Economic Forum, 2024) Key Segments Impacted: All -- this is the supply chain that enables everything
Ecosystem Overview¶
The cybercrime underground is a mature, self-regulating economy with deep specialization, division of labor, and market dynamics that mirror legitimate commerce. Actors specialize in narrow functions -- malware development, initial access brokerage, payload delivery, data exfiltration, monetization, and cashout -- then trade their goods and services on forums, marketplaces, and encrypted messaging channels.
This supply chain architecture has a critical structural effect: it reduces barriers to entry and enables less-skilled actors to conduct sophisticated attacks. A ransomware affiliate no longer needs to write their own malware, build C2 infrastructure, acquire initial access, or launder cryptocurrency. Each component can be purchased from a specialist vendor operating in the underground economy.
The result is an adversary ecosystem that scales horizontally. Law enforcement takedowns of individual actors or platforms create temporary disruption, but the specialization model ensures rapid reconstitution -- new forums emerge, new MaaS platforms launch, and displaced actors migrate to alternatives within weeks.
Cybercrime Supply Chain¶
Dark Web Marketplaces & Forums¶
Underground forums serve as the primary coordination layer for the cybercrime economy. They function as marketplaces, recruitment boards, escrow services, and reputation systems simultaneously. Forum culture enforces norms through moderation, escrow requirements, and public dispute resolution -- mechanisms that reduce counterparty risk in an inherently trust-deficient environment.
Active Forums and Marketplaces¶
| Forum/Market | Type | Focus | Status | Notable Activity |
|---|---|---|---|---|
| XSS | Forum | Russian-language; exploits, malware, access sales | Active | Ransomware group recruitment, zero-day sales, IAB listings |
| Exploit | Forum | Russian-language; high-tier cybercrime | Active | Premium IAB sales, malware developer community, RaaS recruitment |
| BreachForums | Forum/Market | English-language; data breaches, credential dumps | Active (resurrected after seizure) | Largest English-language breach data marketplace, successor to RaidForums |
| RAMP | Forum | Russian-language; ransomware-focused | Active | Ransomware affiliate recruitment, initial access sales, China-language section added |
| Dread | Forum | English-language; dark web meta-forum | Active | Discussion of markets and services, successor to Reddit-style forums on Tor |
| Telegram Channels | Messaging | Multi-language; varies by channel | Active (growing) | Infostealer log sales, combolists, DDoS-for-hire, increasingly replacing forums for lower-tier activity |
| Discord Servers | Messaging | English-language; entry-level cybercrime | Active (frequently banned) | Script kiddie tooling, credential sharing, raid coordination |
Historical Forums (Seized or Defunct)¶
| Forum/Market | Type | Taken Down | Notes |
|---|---|---|---|
| RaidForums | Forum/Market | Seized (Apr 2022) | Operated 2015--2022; primary English-language breach data forum; founder (Omnipotent) arrested |
| BreachForums v1 | Forum/Market | Seized (Mar 2023) | Run by Pompompurin; successor to RaidForums; admin arrested; site resurrected under new management |
| BreachForums v2 | Forum/Market | Seized (May 2024) | Run by Baphomet; seized by FBI/DOJ; again resurrected |
| Genesis Market | Market | Seized (Apr 2023, Operation Cookie Monster) | Sold "bots" (full browser fingerprints with cookies/tokens); 1.5M+ bot listings at peak |
| Hydra Market | Market | Seized (Apr 2022) | Largest Russian-language darknet market; $5B+ in cryptocurrency transactions |
| AlphaBay | Market | Seized (Jul 2017) | Premier darknet marketplace; briefly relaunched 2021 under new admin, low traction |
| Hansa Market | Market | Seized (Jul 2017) | Dutch police operated it covertly for a month after AlphaBay takedown |
Forum Mechanics¶
Forums enforce trust through several mechanisms:
- Escrow systems -- Admins or automated escrow hold funds during transactions, releasing to the seller upon buyer confirmation. This reduces exit scam risk. Typical escrow fee: 2--5% of transaction value.
- Reputation scoring -- Forum members accumulate reputation through completed deals, positive feedback, and longevity. High-reputation accounts command premium pricing and are themselves traded (accounts with established history sell for $500--5,000+).
- Admin arbitration -- Forum administrators resolve disputes, ban scammers, and enforce community rules. Admins on major forums like Exploit and XSS wield significant influence over the ecosystem.
- Deposit requirements -- Some forums require new members to deposit cryptocurrency ($50--500) to register, filtering out casual observers and law enforcement personas.
- Guarantor services -- Trusted intermediaries vouch for transactions between parties, taking a commission (3--10%) for facilitating trust.
Knowledge Gap
Precise transaction volumes on underground forums are difficult to verify. Estimates from threat intelligence firms (Flashpoint, Recorded Future, Kela, Intel 471) rely on sampling and extrapolation. The figures cited in this section represent best available estimates, not audited data.
Malware-as-a-Service (MaaS)¶
The Malware-as-a-Service model has professionalized malware distribution. Developers create and maintain malware families, then license them to operators via subscription or one-time purchase models. Many MaaS operations include customer support, documentation, update channels, and builder tools that allow customers to generate customized payloads.
Infostealers¶
Infostealers are the single most impactful MaaS category by volume. They harvest credentials, session tokens, cryptocurrency wallets, and browser data from compromised endpoints, then transmit stolen data ("logs") to the operator. These logs feed credential markets and enable downstream attacks including account takeover, ransomware initial access, and corporate espionage.
| Malware | Type | Price | Capabilities | Status |
|---|---|---|---|---|
| RedLine | Infostealer | $150/month; $800 lifetime | Browser credentials, crypto wallets, Discord tokens, VPN/FTP credentials, system info | Active (despite 2024 disruption by Operation Magnus) |
| Raccoon Stealer | Infostealer | $200/month | Browser data, crypto wallets, email clients, system fingerprint | v2 active; operator arrested (Oct 2022), service resumed under new management |
| Vidar | Infostealer | $250/month | Browser data, 2FA software, crypto wallets, Telegram sessions | Active |
| Lumma Stealer | Infostealer | $250--1,000/month (tiered) | Browser data, crypto wallets, 2FA extensions, session cookies, advanced evasion | Active; rapidly growing market share (2024--2025) |
| StealC | Infostealer | $200/month | Browser data, crypto wallets, modular plugin architecture | Active; popular Vidar alternative |
| META Stealer | Infostealer | $125/month; $1,000 lifetime | Browser credentials, crypto wallets, system fingerprinting | Active |
| Mystic Stealer | Infostealer | $150/month | Browser data, crypto wallets, messaging app data | Active |
| Rhadamanthys | Infostealer | $250/month | Browser data, crypto wallets, AI-assisted OCR for seed phrase extraction | Active; rapidly evolving feature set |
| Atomic Stealer | Infostealer (macOS) | $1,000/month | macOS-specific: Keychain, browser data, crypto wallets | Active; notable for macOS targeting |
Key infostealer economics: a single operator running RedLine or Lumma can generate tens of thousands of logs per month. High-value logs containing corporate VPN credentials, cloud service tokens, or cryptocurrency wallet seed phrases sell for $10--500+ each. Bulk logs (consumer accounts) sell for $1--10 each. The total infostealer log ecosystem generates billions of compromised credentials annually (SpyCloud, 2024; Recorded Future, 2025).
Loaders and Botnets¶
Loaders provide the delivery mechanism for downstream payloads. They establish initial persistence on victim systems and then download additional malware (ransomware, infostealers, RATs) at the operator's direction. Loader operators sell "installs" -- successful infections -- to downstream customers.
| Malware | Type | Price | Delivery Methods | Status |
|---|---|---|---|---|
| BumbleBee | Loader | Per-install pricing ($50--300 per 1,000 installs depending on geo) | ISO/VHD attachments, Google Ads malvertising, SEO poisoning | Active; linked to former TrickBot/Conti operators |
| IcedID | Loader/Banking Trojan | Per-install; estimated $3,000--10,000/month for operator access | Phishing attachments, thread hijacking, OneNote abuse | Declining (operators shifting to other projects) |
| SmokeLoader | Loader | ~$400 for builder + per-install fees | Phishing, exploit kits, drive-by downloads | Active; one of the oldest active loaders (since 2011) |
| Pikabot | Loader | Per-install pricing | Phishing, thread hijacking | Active; emerged as QakBot replacement |
| Emotet | Loader/Botnet | Operated by core team, sells installs | Email thread hijacking, macro-laden documents, link-based delivery | Intermittent; repeatedly disrupted and rebuilt |
| QakBot/Qbot | Loader/Banking Trojan | Operated by core team, sells installs | Email thread hijacking, HTML smuggling, PDF lures | Rebuilding post-FBI takedown (Aug 2023) |
| Latrodectus | Loader | Per-install pricing | Phishing, impersonation of Azure/Cloudflare pages | Active; assessed as IcedID successor |
| DarkGate | Loader/RAT | $15,000/year or $100,000 lifetime (premium pricing) | Phishing, Microsoft Teams abuse, malvertising | Active; limited to small number of licensed operators |
Loader economics: operators typically charge per install, with pricing varying by victim geography (US/EU installs command 5--10x premium over developing markets), victim type (corporate installs are premium), and exclusivity.
Remote Access Trojans (RATs)¶
| Malware | Type | Price | Capabilities | Status |
|---|---|---|---|---|
| AsyncRAT | RAT | Free/Open-source | Remote desktop, keylogging, file management, plugin architecture | Active; widely used due to zero cost |
| QuasarRAT | RAT | Free/Open-source | Remote desktop, keylogging, file transfer, registry editor | Active |
| Remcos | RAT | $58--389 (licensed as "legitimate" tool) | Remote desktop, keylogging, webcam capture, file management | Active; sold as legitimate remote admin tool, heavily abused |
| DcRAT | RAT | $7--60 (cheap pricing) | Remote desktop, keylogging, crypto mining, ransomware module | Active |
| njRAT | RAT | Free | Remote desktop, keylogging, file management | Active; one of the most widely deployed RATs globally |
| Warzone RAT | RAT | $37.50/month | Remote desktop, password recovery, privilege escalation | Disrupted (operator arrested Feb 2024) |
| XWorm | RAT/Loader | $50--100 | Remote access, DDoS, ransomware deployment, clipboard hijacking | Active; growing adoption |
Banking Trojans -- Evolution¶
Traditional banking trojans (Zeus, SpyEye, Gozi, Dridex) targeted financial institutions through web injection to manipulate banking sessions. This category has largely evolved into general-purpose stealers and loaders. Modern descendants like IcedID, QakBot, and TrickBot became primarily known as loader/access platforms rather than banking fraud tools. Mobile banking trojans (Xenomorph, SharkBot, Anatsa/TeaBot) remain an active subcategory targeting Android devices, with per-campaign licensing at $3,000--7,000/month (ThreatFabric, 2024).
Exploit Brokers & Zero-Day Markets¶
The exploit market exists along a spectrum from legitimate vulnerability research through gray-market brokerage to fully criminal black markets. Pricing is driven by target value, exploit reliability, and exclusivity.
Pricing Landscape¶
| Target | Zero-Day Price Range | N-Day Availability (Disclosure to Weaponized PoC) | Key Buyers |
|---|---|---|---|
| iOS full chain (remote, no click) | $2M--5M+ | Weeks to months | Government agencies, surveillance vendors (NSO Group, Intellexa) |
| Android full chain (remote, no click) | $1.5M--3M+ | Weeks to months | Government agencies, surveillance vendors |
| Chrome RCE + sandbox escape | $500K--1M | Days to weeks | Government agencies, APT groups |
| Windows LPE (kernel) | $100K--500K | Days to weeks (often rapid weaponization) | Ransomware groups, APT groups, red teams |
| Windows RCE (remote, unauthenticated) | $500K--1M+ | Days to weeks | All buyer categories |
| Microsoft Exchange/Office 365 | $200K--600K | Days | APT groups, ransomware operators |
| Enterprise VPN (Fortinet, Palo Alto, Ivanti) | $100K--500K | Hours to days | IABs, ransomware affiliates, APT groups |
| WordPress/CMS plugins | $5K--50K | Hours to days | Spam operators, cryptomining, SEO fraud |
Market Segments¶
Legitimate/gray market brokers include Zerodium (public price list, buys from researchers, resells to government/defense customers), and various government contractors who acquire exploits for intelligence agencies. Zerodium's published prices effectively set a floor for the gray market. The 2023--2025 period saw Zerodium increase mobile exploit prices significantly, reflecting hardened mobile security.
Black market exploit sales occur on premium forums (Exploit, XSS) and through private channels. Prices typically match or exceed gray-market rates for high-value targets. Ransomware groups have become significant exploit buyers, particularly for enterprise VPN and edge device vulnerabilities that provide initial access at scale.
Exploit-as-a-Service is an emerging model where exploit developers retain ownership and charge per-use or per-campaign fees rather than selling outright. This allows developers to monetize a single exploit across multiple customers while maintaining operational security.
N-day weaponization timeline is accelerating. Analysis by Mandiant and Rapid7 shows the average time from vulnerability disclosure to observed exploitation has decreased from 32 days (2021) to under 5 days (2024) for widely-targeted vulnerabilities (Rapid7, 2024 Attack Intelligence Report). For high-value enterprise appliance vulnerabilities (VPN, firewall, file transfer), weaponization often occurs within hours of disclosure or even before a patch is available (zero-day to n-day window).
Knowledge Gap
Black market exploit pricing is inherently opaque. Published prices (including Zerodium's) represent the gray market. True black market prices -- particularly for state-sponsored buyers -- may significantly exceed published figures. The estimates above are compiled from threat intelligence reporting and should be treated as approximate ranges.
Credential Markets¶
Credential markets are the connective tissue between infostealers and downstream attacks. They aggregate, quality-sort, and sell stolen authentication data at scale.
Major Credential Markets¶
| Market | Type | Volume | Pricing | Status |
|---|---|---|---|---|
| Russian Market | Automated shop | 5M+ listings (estimated) | $1--50 per log (varies by target quality) | Active; largest active credential market |
| 2easy | Automated shop | 1M+ listings | $1--20 per log | Active |
| Genesis Market | Automated shop (browser fingerprints) | 1.5M+ bots at peak | $5--350 per bot (full browser profile) | Seized (Apr 2023, Operation Cookie Monster) |
| Telegram channels | Decentralized | Millions of logs shared daily | Free (bulk dumps) to $5--100 (curated sets) | Active; rapidly growing distribution channel |
| BreachForums | Forum-based sales | Varies by listing | $0 (reputation building) to $100K+ (major breach data) | Active |
| Combo lists | Aggregated dumps | Billions of credentials | $10--500 per collection (depending on freshness, deduplication) | Active; distributed across forums and Telegram |
| Corporate access | Premium/private sales | Low volume, high value | $500--100,000+ per organization (depending on target, access level, revenue) | Active; sold on Exploit, XSS, RAMP |
Credential Types and Pricing¶
Infostealer logs form the bulk of credential market inventory. A single log typically contains all credentials, cookies, and tokens from one compromised endpoint. Pricing follows clear quality tiers:
- Consumer accounts (streaming, gaming, social media): $1--5 per log
- Email accounts (Gmail, Outlook, Yahoo): $5--15 per log
- Financial services (banking, crypto exchanges): $15--50 per log
- Corporate credentials (VPN, RDP, SSO, cloud admin): $50--500+ per log
- Active session tokens (bypass MFA, already authenticated): 2--5x premium over static credentials
"Bot" markets (pioneered by Genesis Market) sell full machine fingerprints including browser cookies, saved passwords, session tokens, and browser configuration data. These allow buyers to impersonate the victim's browser environment, bypassing device fingerprinting and session-based authentication. Despite Genesis Market's seizure, the model has been replicated by Russian Market and others.
Session token and cookie markets have grown significantly as organizations deploy MFA. Stolen session tokens and authentication cookies allow attackers to bypass MFA entirely by importing already-authenticated sessions. This has driven the evolution of infostealers to prioritize cookie and token harvesting over static credential collection.
Freshness is critical. Credentials degrade in value rapidly as passwords are changed, sessions expire, and breaches are discovered. Markets differentiate by freshness:
- Real-time logs (harvested within 24 hours): Premium pricing
- Recent logs (1--7 days): Standard pricing
- Aged logs (7--30 days): Discounted 50--80%
- Stale logs (30+ days): Near-worthless for direct access, still useful for password reuse attacks
Bulletproof Hosting & Infrastructure¶
Bulletproof hosting (BPH) providers form the infrastructure backbone of cybercrime operations. These providers explicitly or implicitly ignore abuse complaints, law enforcement requests, and takedown notices, allowing criminal operations to persist.
Hosting Models¶
Traditional bulletproof hosts operate in jurisdictions with weak cybercrime enforcement or where operators have established relationships with local authorities. Key jurisdictions include Russia, Moldova, Romania (historically), and various offshore locations. These providers advertise on underground forums with explicit "abuse-tolerant" or "no logs" policies.
Legitimate hosting abuse is increasingly common. Criminal operators use compromised legitimate hosting accounts, stolen cloud credentials (AWS, Azure, GCP), or fraudulently registered accounts on mainstream providers. This approach provides better network quality and reputation than dedicated BPH, at the cost of shorter operational lifespans before suspension.
Residential proxy networks are built from compromised IoT devices, adware-bundled software, and hijacked consumer endpoints. These networks route malicious traffic through legitimate residential IP addresses, making detection and blocking significantly harder. Services like 911 S5 (seized May 2024, 19M+ IP addresses compromised) demonstrated the scale of this infrastructure. Successors continue to operate.
Infrastructure Services¶
| Service | Function | Pricing | Notes |
|---|---|---|---|
| Bulletproof VPS | Host C2 servers, phishing sites, malware distribution | $50--500/month | Priced 3--10x above legitimate hosting |
| Fast-flux DNS | Rapidly rotate DNS records across compromised hosts | Included with hosting or $100--300/month add-on | Hinders takedown by distributing across hundreds of IPs |
| Domain generation algorithms (DGA) | Generate pseudo-random C2 domains | Built into malware (not a service) | Complicates domain-based blocking |
| Residential proxies | Route traffic through legitimate residential IPs | $5--15 per GB or $200--500/month unlimited | 911 S5 successor services, hijacked IoT |
| Criminal VPN services | "No-log" VPN marketed to criminals | $5--30/month | Distinct from commercial VPNs; some specifically market to cybercriminals |
| C2-as-a-Service | Managed command-and-control infrastructure | $500--5,000/month | Turnkey C2 frameworks (Cobalt Strike, Sliver, Mythic) managed by provider |
| SMTP relay services | Send phishing and spam at scale | $50--300 per campaign or per 100K emails | Rotating sender infrastructure to evade email filtering |
| Traffic distribution systems (TDS) | Route and filter web traffic for exploit kits, malvertising | $100--1,000/month | Filter by geo, device, browser; redirect to appropriate payload |
Jurisdictional Arbitrage¶
BPH operators exploit jurisdictional gaps systematically:
- Russia -- Operators within Russia targeting non-CIS countries face minimal law enforcement risk. Many BPH providers operate openly from Russian datacenters.
- Moldova/Transnistria -- Weak governance and enforcement create safe harbor.
- Seychelles, Belize, Panama -- Offshore company formation combined with lax hosting oversight.
- Abuse of legitimate cloud providers -- Even when accounts are suspended, the cost of creating new accounts is negligible, creating an asymmetric takedown burden.
Phishing Kits & Social Engineering Tools¶
Phishing-as-a-Service (PhaaS) platforms have transformed phishing from a manual craft into a scalable, subscription-based operation. Modern phishing platforms include adversary-in-the-middle (AiTM) capabilities that defeat most forms of multi-factor authentication.
Phishing-as-a-Service Platforms¶
| Platform | Type | Capabilities | Price | Primary Targets |
|---|---|---|---|---|
| EvilProxy | PhaaS (AiTM) | Reverse proxy MFA bypass, session hijacking, targeting templates for M365, Google, Okta | $400/month (basic); $1,000+/month (enterprise targets) | Microsoft 365, Google Workspace, Okta |
| Evilginx | Open-source AiTM framework | Reverse proxy MFA bypass, customizable "phishlets," session token capture | Free (open-source); commercial kits built on top $100--500 | Any web application |
| Caffeine | PhaaS | Pre-built phishing pages, hosting, campaign management | $250/month | Microsoft 365, consumer email |
| NakedPages | PhaaS (AiTM) | Reverse proxy with AiTM, antibot, geo-filtering | $250--1,000/month | Microsoft 365, financial services |
| Greatness | PhaaS | Microsoft 365-focused, MFA bypass, pre-filled victim email | $120/month | Microsoft 365 |
| Tycoon 2FA | PhaaS (AiTM) | Advanced AiTM, Cloudflare Turnstile bypass, antibot | $200--600/month | Microsoft 365, Google Workspace |
| Robin Banks | PhaaS | Banking and financial institution templates | $50/month (basic); $200/month (full) | Financial services, consumer banking |
| Rockstar 2FA | PhaaS (AiTM) | AiTM with QR code phishing, Telegram integration | $200/month | Microsoft 365 |
AiTM Mechanics¶
Adversary-in-the-middle phishing kits operate as transparent reverse proxies between the victim and the legitimate service. When a victim enters credentials and completes MFA on the phishing page, the kit relays everything to the real service in real time, captures the authenticated session token, and passes it to the attacker. This defeats all MFA methods except hardware-bound phishing-resistant MFA (FIDO2/WebAuthn).
The proliferation of AiTM kits is a primary driver of demand for phishing-resistant MFA adoption and has significantly weakened the security value of SMS and app-based OTP methods.
Emerging Social Engineering Tools¶
SMS phishing (smishing) platforms provide bulk SMS delivery infrastructure, URL shortening, and landing page hosting. Pricing runs $200--800/month. Services target mobile users with package delivery, banking, and government impersonation lures.
Deepfake-as-a-Service is emerging as a commercial offering in underground markets (2025). Real-time voice cloning and face-swapping tools are being packaged for BEC operations. Reported pricing ranges from $200/month for basic voice cloning to $1,000+/month for real-time video deepfake capability. A February 2024 incident in Hong Kong saw a finance worker tricked into transferring $25M via deepfake video call impersonating company executives (CNN, Feb 2024).
Knowledge Gap
Deepfake-as-a-Service pricing and adoption is rapidly evolving and difficult to verify. The capabilities described here reflect reporting from threat intelligence firms through early 2026, but the market is moving quickly and specific pricing figures may not be current.
AI-generated phishing content using jailbroken or uncensored LLMs has improved the quality of phishing lures -- eliminating grammatical errors, enabling convincing multi-language campaigns, and generating context-aware pretexts. While the impact of "WormGPT" and "FraudGPT" specifically has been overstated, the broader use of mainstream LLMs (via jailbreaks or social engineering of the models) for phishing content generation is well-documented (Microsoft, 2024; Google TAG, 2024).
Money Laundering & Cashout¶
Converting illicit proceeds into usable funds is the final and often most vulnerable stage of cybercrime operations. Law enforcement has increased pressure on this segment, particularly through cryptocurrency enforcement actions and sanctions.
Methods and Services¶
| Method | Commission | Estimated Volume | Risk Level | Status |
|---|---|---|---|---|
| Cryptocurrency mixers/tumblers | 1--3% | Billions USD annually (aggregate) | High (regulatory/law enforcement targeting) | Active but under pressure; major services seized/sanctioned |
| Chain-hopping (cross-chain bridges) | 0.5--2% (bridge fees) | Growing | Moderate | Active; exploiting DeFi bridge anonymity |
| Mule networks | 10--20% of laundered amount | Tens of billions USD (global) | High (mules frequently arrested) | Active; core of fiat cashout |
| OTC desks (nested exchanges) | 3--8% | Billions USD annually | Moderate--High | Active; operating within legitimate exchange infrastructure |
| Gift card/prepaid card schemes | 20--40% loss (resale discount) | Moderate | Moderate | Active; common for lower-value fraud |
| Money laundering as a service | 10--20% | Significant | Varies by method | Active; full-service laundering offered on forums |
| Real estate/luxury goods | Varies | High for nation-state actors | Lower detection (traditionally) | Active; increasing regulatory scrutiny |
| NFT-based laundering | Variable (platform fees + wash trading costs) | Low--Moderate | Moderate (declining with market) | Declining with NFT market contraction |
Cryptocurrency Laundering -- Enforcement Pressure¶
Law enforcement has significantly disrupted cryptocurrency laundering infrastructure:
- Tornado Cash -- OFAC sanctioned (Aug 2022); founders indicted. Remained partially operational due to decentralized smart contract architecture, but usage dropped significantly.
- Sinbad -- Seized (Nov 2023) by FBI, with cooperation from Netherlands and Finland. Identified as successor to Blender.io (sanctioned May 2022). Linked to Lazarus Group laundering.
- ChipMixer -- Seized (Mar 2023) by German BKA and US DOJ. Processed over $3B in cryptocurrency.
- 911 S5 Proxy -- Seized (May 2024); administrator arrested. 19M+ residential IP addresses compromised, used to launder proceeds and commit fraud.
- Suex, Chatex, Garantex -- Russian-linked OTC desks sanctioned by OFAC for processing ransomware proceeds. Garantex seized (Feb 2025).
Despite enforcement, new mixing and tumbling services rapidly emerge to replace seized ones. The shift toward cross-chain bridges and decentralized protocols creates additional challenges for law enforcement, as these services may lack a central operator to target.
Mule Networks¶
Mule networks remain essential for converting cryptocurrency to fiat currency. Recruiters ("mule herders") use job scam advertisements, romance fraud, and direct recruitment on forums to acquire mules -- individuals who receive and forward funds through their personal bank accounts. Mule networks are organized in tiers:
- Tier 1 (Unknowing mules): Recruited through job scams ("payment processing agent"), often unaware of the criminal nature. Highest arrest risk, lowest cut (5--10%).
- Tier 2 (Knowing mules): Aware of the scheme, actively participate. Moderate risk, moderate cut (10--15%).
- Tier 3 (Mule herders/organizers): Recruit and manage mule networks. Lower direct arrest risk, higher cut (15--25%).
How It All Connects¶
The following diagram illustrates the full economic cycle of cybercrime, showing how specialized actors and markets interconnect.
Economics¶
Underground Economy Estimates¶
Knowledge Gap
Estimates of the total cybercrime economy vary by an order of magnitude depending on methodology, scope, and source. The $1.5T figure (Bromium/HP, 2018) includes direct criminal revenues. The $8--10.5T figure (Cybersecurity Ventures, 2024--2025) includes estimated total economic damage and costs. Neither figure is independently auditable. Treat all aggregate economic figures as order-of-magnitude indicators, not precise measurements.
Profit Margins by Specialization¶
| Specialization | Estimated Annual Revenue (Top Operators) | Profit Margin | Barrier to Entry | Risk Level |
|---|---|---|---|---|
| Ransomware operator (RaaS platform) | $10M--100M+ | 60--80% (after affiliate splits) | High (development, infrastructure, reputation) | High (law enforcement priority) |
| Ransomware affiliate | $500K--10M+ | 70--80% of ransom (minus RaaS cut) | Moderate (need access + RaaS subscription) | High |
| Infostealer developer | $1M--10M+ | 80--90% (subscription model, low marginal cost) | Moderate (development skill) | Moderate |
| Initial access broker | $100K--2M+ | 60--80% | Low--Moderate | Moderate |
| Credential market operator | $500K--5M+ | 70--85% (automated platform) | Moderate (platform development, trust) | Moderate--High |
| Phishing kit developer | $500K--5M+ | 80--90% | Moderate | Moderate |
| Bulletproof hosting provider | $200K--2M+ | 40--60% | Moderate (infrastructure + jurisdictional setup) | Moderate |
| Money mule herder | $100K--1M+ | 10--25% of laundered funds | Low | High (proximity to fiat system) |
| Exploit broker | Highly variable ($100K--10M+) | 30--60% (acquisition cost is high) | Very High (research capability or trust network) | Moderate |
Market Dynamics¶
Competition drives innovation. MaaS vendors compete on features, evasion capability, customer support, and pricing -- mirroring legitimate SaaS dynamics. When one infostealer adds a new capability (e.g., Rhadamanthys adding AI-assisted seed phrase OCR), competitors follow within weeks.
Law enforcement takedowns create temporary price shocks. The seizure of Genesis Market (April 2023) temporarily increased "bot" pricing on competing platforms by 30--50% before new supply normalized prices (Flashpoint, 2023). Similarly, disruption of QakBot (August 2023) increased pricing for alternative loader installs until Pikabot, DarkGate, and other alternatives filled the gap.
Consolidation is occurring at the top end. Major ransomware operations increasingly vertically integrate, developing proprietary tooling, running their own infostealer operations, and establishing direct cryptocurrency laundering channels rather than relying on third-party services.
Insurance drives ransomware economics. The presence of cyber insurance has been documented as a factor in ransomware targeting and pricing. Some ransomware groups specifically seek evidence of insurance coverage during intrusions to calibrate ransom demands. Conversely, tightening insurance requirements (particularly MFA mandates) are slowly raising the cost of initial access.
Defensive Implications¶
Understanding the cybercrime supply chain directly informs defensive strategy. Key implications:
Dark web monitoring and digital risk protection (DRP) -- Organizations should monitor underground forums and credential markets for mentions of their domains, employee credentials, and corporate assets. This enables proactive response before stolen data is weaponized.
Credential monitoring -- Continuous monitoring of infostealer log markets for corporate credentials is now a baseline security requirement. When corporate credentials appear in log markets, immediate forced password resets and session invalidation are necessary.
Infostealer detection -- Endpoint security must specifically detect infostealer execution and data exfiltration. Given the volume of infostealer infections globally, this is a high-probability threat for most organizations.
Phishing-resistant MFA -- The proliferation of AiTM phishing kits renders SMS, app-based OTP, and push-notification MFA insufficient for high-value accounts. FIDO2/WebAuthn hardware keys or passkeys are the only MFA methods that resist AiTM attacks at the protocol level.
Threat intelligence platforms -- Threat intel that monitors underground markets provides early warning of targeted campaigns, newly available exploits, and access sales affecting specific industries or organizations.
Brand protection -- Monitoring for phishing kits and impersonation campaigns targeting the organization's brand enables faster takedown and reduced customer impact.
Session management -- Given the prevalence of session token theft, organizations should implement token binding, conditional access policies with continuous evaluation, and aggressive session timeouts for sensitive applications.
Market Impact¶
The cybercrime underground economy is a primary driver of demand across multiple cybersecurity market segments.
Directly Driven Market Segments¶
| Segment | Estimated Market Size (2025) | Key Drivers from Underground Economy | Representative Vendors |
|---|---|---|---|
| Dark Web Monitoring / Digital Risk Protection | $1.2--2.5B | Credential markets, forum monitoring, brand impersonation | Recorded Future, Flashpoint, Intel 471, Kela, ZeroFox, Cyberint (acquired by Check Point), Digital Shadows (acquired by ReliaQuest) |
| Threat Intelligence | $4--6B (broader TI market) | Underground market monitoring, malware analysis, actor tracking | Recorded Future, Mandiant/Google, CrowdStrike, Intel 471, Group-IB, Kela |
| Credential Monitoring | Included in DRP and identity segments | Infostealer logs, credential dumps, session token markets | SpyCloud, Flare, Constella Intelligence, Enzoic, Have I Been Pwned |
| Anti-Phishing / Email Security | $5--8B (email security broader) | PhaaS platforms, AiTM kits, social engineering tools | Proofpoint, Mimecast, Abnormal Security, Cofense, Bolster, Area 1 (Cloudflare) |
| Phishing-Resistant MFA / Identity | $15--20B (IAM broader) | AiTM kit proliferation driving FIDO2 adoption | Yubico, Okta, Microsoft, Duo/Cisco, Beyond Identity, HYPR |
| Cryptocurrency Analytics / Blockchain Intelligence | $500M--1B | Ransomware payments, mixer/tumbler analysis, sanctions compliance | Chainalysis, Elliptic, TRM Labs, Crystal Blockchain, CipherTrace (Mastercard) |
Market Growth Drivers¶
The underground economy's maturation is driving cybersecurity spending in several ways:
- Democratization of attack capability -- MaaS lowers barriers, increasing attack volume, which drives demand for automated detection and response.
- MFA bypass proliferation -- AiTM kits drive enterprise migration to phishing-resistant MFA, benefiting FIDO2/passkey vendors and identity security platforms.
- Credential exposure scale -- Billions of credentials in circulation drive continuous monitoring, breach notification, and identity verification spending.
- Ransomware economics -- The ransomware supply chain drives spending across endpoint, backup, incident response, insurance, and negotiation services.
- Regulatory response -- Regulations like SEC incident disclosure rules, NIS2, and DORA create compliance-driven demand for monitoring and reporting capabilities.
Vendor Landscape Note
The digital risk protection segment is undergoing consolidation. Major acquisitions include Check Point's acquisition of Cyberint (2024), ReliaQuest's acquisition of Digital Shadows (2022), and Palo Alto Networks' acquisition of Cortex-adjacent threat intel assets. Standalone DRP vendors face platform pressure from large security vendors adding underground monitoring capabilities to existing threat intelligence products.
Sources & Further Reading¶
Primary Sources¶
- Mandiant / Google Threat Intelligence -- Annual M-Trends reports documenting underground market trends, infostealer activity, and initial access broker patterns. M-Trends 2025
- CrowdStrike -- Global Threat Report (annual) with dedicated sections on eCrime ecosystem and access broker trends. 2025 Global Threat Report
- Recorded Future -- Insikt Group research on underground forums, credential markets, and MaaS trends. recordedfuture.com/research
- Intel 471 -- Continuous monitoring of underground forums, MaaS vendors, and IABs. intel471.com
- Kela -- Dark web monitoring and threat intelligence focused on cybercrime ecosystem. kela.com
- Flashpoint -- Underground forum monitoring and threat intelligence. flashpoint.io
- Chainalysis -- Cryptocurrency tracing and cybercrime financial flow analysis. Annual Crypto Crime Report. chainalysis.com
- SpyCloud -- Annual infostealer and credential exposure reports. spycloud.com
- Europol -- Internet Organised Crime Threat Assessment (IOCTA), annual. europol.europa.eu
- FBI IC3 -- Internet Crime Report (annual). ic3.gov
Law Enforcement Operations (Referenced)¶
- Operation Cookie Monster (Apr 2023) -- Genesis Market seizure. FBI-led, 17-country operation.
- QakBot takedown (Aug 2023) -- FBI Operation "Duck Hunt." Infrastructure seized, malware uninstalled from 700K+ endpoints.
- Operation Magnus (Oct 2024) -- International disruption of RedLine and META stealer infrastructure.
- Hive takedown (Jan 2023) -- FBI infiltrated Hive ransomware, distributed decryption keys.
- LockBit disruption (Feb 2024) -- Operation Cronos. NCA/FBI seized infrastructure, unmasked LockBitSupp.
- 911 S5 Proxy seizure (May 2024) -- FBI seized world's largest residential proxy botnet.
- Garantex seizure (Feb 2025) -- German/US law enforcement seized Russian cryptocurrency exchange.
Academic and Industry Research¶
- Pastrana, S. et al. "Crimebb: Enabling cybercrime research on underground forum data." WWW 2018.
- Bhatt, S. et al. "The economics of the underground dark web marketplace." Journal of Cybersecurity, 2023.
- Huang, D.Y. et al. "Tracking ransomware end-to-end." IEEE S&P, 2018.
- Cybersecurity Ventures. "Cybercrime To Cost The World $10.5 Trillion Annually By 2025." cybersecurityventures.com
Cross-References¶
Related Sections
- Threat Actors Overview -- Full catalog of threat actors including nation-state, ransomware, and hacktivism
- Threat Landscape Overview -- Macro-level analysis of breach trends and financial impact
- Threat Intelligence Segment -- Market analysis of TIP platforms and dark web monitoring vendors
- Email Security Segment -- Anti-phishing market analysis and vendor landscape
- Identity & Access Segment -- MFA, credential management, and identity security market
- Pain Points & Friction -- Cross-segment defender challenges that the underground economy exploits
Glossary¶
This glossary defines the acronyms and key terms used throughout the cybersecurity market research site. Use it as a quick reference when navigating segment analyses, pain-point discussions, and opportunity assessments.
A¶
| Term | Definition |
|---|---|
| ACL | Access Control List — rules determining which users/systems can access resources |
| APT | Advanced Persistent Threat — a prolonged, targeted cyberattack where an intruder gains and maintains unauthorized access |
| ASM | Attack Surface Management — continuous discovery, inventory, and risk assessment of an organization's external-facing assets |
| ASPM | Application Security Posture Management — unified visibility and risk management across the application lifecycle |
| AV | Antivirus — software designed to detect, prevent, and remove malware |
B¶
| Term | Definition |
|---|---|
| BAS | Breach and Attack Simulation — automated tools that simulate real-world attacks to test security controls |
| BEC | Business Email Compromise — a social-engineering attack targeting employees with access to company finances or data |
C¶
| Term | Definition |
|---|---|
| C2 | Command and Control — infrastructure used by attackers to communicate with compromised systems |
| CASB | Cloud Access Security Broker — a security policy enforcement point between cloud consumers and providers |
| CCPA | California Consumer Privacy Act — California state law granting consumers rights over their personal data |
| CIAM | Customer Identity and Access Management — managing and securing external customer identities and authentication |
| CIEM | Cloud Infrastructure Entitlement Management — managing identities and privileges in cloud environments |
| CTEM | Continuous Threat Exposure Management — a program for continuously assessing and prioritizing threat exposures |
| CNAPP | Cloud-Native Application Protection Platform — integrated security for cloud-native applications across the full lifecycle |
| CSPM | Cloud Security Posture Management — continuous monitoring of cloud infrastructure for misconfigurations and compliance risks |
| CWPP | Cloud Workload Protection Platform — security for workloads running in cloud environments (VMs, containers, serverless) |
| CVE | Common Vulnerabilities and Exposures — a standardized identifier for publicly known cybersecurity vulnerabilities |
D¶
| Term | Definition |
|---|---|
| DAST | Dynamic Application Security Testing — testing a running application for vulnerabilities by simulating attacks |
| DCS | Distributed Control System — a control system for managing industrial processes across multiple locations |
| DLP | Data Loss Prevention — tools and processes to prevent unauthorized data exfiltration or leakage |
| DORA | Digital Operational Resilience Act — EU regulation on ICT risk management for financial entities |
| DSPM | Data Security Posture Management — discovering, classifying, and protecting sensitive data across cloud environments |
E¶
| Term | Definition |
|---|---|
| EASM | External Attack Surface Management — discovering and monitoring internet-facing assets for exposures |
| EDR | Endpoint Detection and Response — tools that monitor endpoints for threats and provide investigation and response capabilities |
| EPP | Endpoint Protection Platform — integrated endpoint security combining prevention, detection, and response |
F/G¶
| Term | Definition |
|---|---|
| FAIR | Factor Analysis of Information Risk — a quantitative model for understanding, analyzing, and measuring information risk |
| GRC | Governance, Risk, and Compliance — integrated framework for aligning IT with business goals, managing risk, and meeting regulations |
| GDPR | General Data Protection Regulation — EU regulation on data protection and privacy for individuals |
H¶
| Term | Definition |
|---|---|
| HIPAA | Health Insurance Portability and Accountability Act — US law governing the privacy and security of health information |
I¶
| Term | Definition |
|---|---|
| IAB | Initial Access Broker — specialized cybercriminals who compromise networks and sell access to ransomware operators and other buyers |
| IAM | Identity and Access Management — framework for managing digital identities and controlling access to resources |
| ICS | Industrial Control System — control systems used in industrial production and critical infrastructure |
| IDS | Intrusion Detection System — a system that monitors network traffic for suspicious activity and alerts |
| ITDR | Identity Threat Detection and Response — detecting and responding to identity-based attacks and compromises |
| IoT | Internet of Things — network of physical devices embedded with sensors, software, and connectivity |
| IPS | Intrusion Prevention System — a system that monitors and actively blocks detected threats in network traffic |
L¶
| Term | Definition |
|---|---|
| LOTL | Living Off the Land — attack technique using legitimate, pre-installed system tools and binaries rather than custom malware to evade detection |
M¶
| Term | Definition |
|---|---|
| MaaS | Malware-as-a-Service — cybercrime business model where malware developers sell or rent their tools to other criminals |
| MDR | Managed Detection and Response — outsourced security service providing 24/7 threat monitoring, detection, and response |
| MITRE ATT&CK | MITRE Adversarial Tactics, Techniques, and Common Knowledge — a knowledge base of adversary behaviors and techniques |
| MSSP | Managed Security Service Provider — a third-party provider offering outsourced monitoring and management of security devices |
| MFA | Multi-Factor Authentication — requiring two or more verification factors to gain access to a resource |
N¶
| Term | Definition |
|---|---|
| NDR | Network Detection and Response — detecting and responding to threats by analyzing network traffic patterns |
| NERC CIP | North American Electric Reliability Corporation Critical Infrastructure Protection — security standards for the electric grid |
| NGAV | Next-Generation Antivirus — advanced antivirus using behavioral analysis, AI, and machine learning beyond signature-based detection |
| NIS2 | Network and Information Systems Directive 2 — updated EU directive on cybersecurity for essential and important entities |
| NIST CSF | National Institute of Standards and Technology Cybersecurity Framework — a voluntary framework for managing cybersecurity risk |
O¶
| Term | Definition |
|---|---|
| OT | Operational Technology — hardware and software that monitors and controls physical devices and processes |
| OWASP | Open Worldwide Application Security Project — a nonprofit focused on improving software security through open-source projects and guidance |
P¶
| Term | Definition |
|---|---|
| PAM | Privileged Access Management — securing, managing, and monitoring privileged accounts and access |
| PCI DSS | Payment Card Industry Data Security Standard — security standards for organizations that handle credit card data |
| PII | Personally Identifiable Information — any data that could identify a specific individual |
| PLC | Programmable Logic Controller — an industrial computer used to control manufacturing processes |
R¶
| Term | Definition |
|---|---|
| RaaS | Ransomware-as-a-Service — cybercrime business model where ransomware operators provide malware and infrastructure to affiliates who conduct attacks, splitting profits |
| RGB | Reconnaissance General Bureau — North Korea's primary intelligence agency responsible for clandestine operations including cyber operations |
S¶
| Term | Definition |
|---|---|
| SASE | Secure Access Service Edge — converged network and security-as-a-service architecture delivered from the cloud |
| SAST | Static Application Security Testing — analyzing source code for vulnerabilities without executing the application |
| SBOM | Software Bill of Materials — a formal inventory of components, libraries, and dependencies in a software product |
| SCA | Software Composition Analysis — identifying open-source components and known vulnerabilities in a codebase |
| SCADA | Supervisory Control and Data Acquisition — a system for monitoring and controlling industrial processes remotely |
| SD-WAN | Software-Defined Wide Area Network — a virtual WAN architecture that simplifies branch networking and optimizes traffic |
| SEG | Secure Email Gateway — a solution that filters inbound and outbound email to block threats and enforce policies |
| SIEM | Security Information and Event Management — aggregating and analyzing log data for threat detection and compliance |
| SOAR | Security Orchestration, Automation, and Response — tools that automate and coordinate security operations workflows |
| SOC | Security Operations Center — a centralized team and facility for monitoring, detecting, and responding to security incidents |
| SOX | Sarbanes-Oxley Act — US law mandating financial reporting and internal control requirements for public companies |
| SSE | Security Service Edge — the security component of SASE, delivering SWG, CASB, and ZTNA as cloud services |
| SWG | Secure Web Gateway — a solution that filters web traffic to enforce security policies and block threats |
T¶
| Term | Definition |
|---|---|
| TAM | Total Addressable Market — the total revenue opportunity available for a product or service |
| TCO | Total Cost of Ownership — the complete cost of acquiring, deploying, and operating a solution over its lifetime |
| TIP | Threat Intelligence Platform — a system for aggregating, correlating, and operationalizing threat intelligence data |
| TLS | Transport Layer Security — a cryptographic protocol that provides secure communication over a network |
| TTP | Tactics, Techniques, and Procedures — the patterns of behavior and methods used by threat actors to conduct cyber operations |
V¶
| Term | Definition |
|---|---|
| VM | Vulnerability Management — the ongoing process of identifying, evaluating, treating, and reporting security vulnerabilities |
X¶
| Term | Definition |
|---|---|
| XDR | Extended Detection and Response — unified threat detection and response across endpoints, network, cloud, and email |
Z¶
| Term | Definition |
|---|---|
| ZTNA | Zero Trust Network Access — a security model that grants access based on identity verification and least-privilege principles |