Skip to content

Cybercrime Markets & Underground Economy

Overview at a Glance

Category: Cybercrime Infrastructure / Supply Chain Function: Enables all cybercrime actors through specialization and commerce Scale: Estimated $1.5--10.5T annual cybercrime economy (Cybersecurity Ventures; World Economic Forum, 2024) Key Segments Impacted: All -- this is the supply chain that enables everything


Ecosystem Overview

The cybercrime underground is a mature, self-regulating economy with deep specialization, division of labor, and market dynamics that mirror legitimate commerce. Actors specialize in narrow functions -- malware development, initial access brokerage, payload delivery, data exfiltration, monetization, and cashout -- then trade their goods and services on forums, marketplaces, and encrypted messaging channels.

This supply chain architecture has a critical structural effect: it reduces barriers to entry and enables less-skilled actors to conduct sophisticated attacks. A ransomware affiliate no longer needs to write their own malware, build C2 infrastructure, acquire initial access, or launder cryptocurrency. Each component can be purchased from a specialist vendor operating in the underground economy.

The result is an adversary ecosystem that scales horizontally. Law enforcement takedowns of individual actors or platforms create temporary disruption, but the specialization model ensures rapid reconstitution -- new forums emerge, new MaaS platforms launch, and displaced actors migrate to alternatives within weeks.

Cybercrime Supply Chain

Tool DevelopmentInitial AccessPayload DeliveryOperations & MonetizationCashout & LaunderingMDEXPKINFIABCREDSCANLOADSPAMTRAFRWBECATODATAMIXMULEOTCCARDMalware DevelopersExploit DevelopersPhishing Kit BuildersInfrastructure ProvidersInitial Access BrokersCredential SellersVulnerability ScannersLoader/Botnet OperatorsSpam ServicesTraffic Distribution SystemsRansomware OperatorsBEC/Fraud OperatorsAccount Takeover SpecialistsData BrokersCrypto Mixers/TumblersMule NetworksOTC Desks & Nested ExchangesGift Card/Prepaid Schemes

Dark Web Marketplaces & Forums

Underground forums serve as the primary coordination layer for the cybercrime economy. They function as marketplaces, recruitment boards, escrow services, and reputation systems simultaneously. Forum culture enforces norms through moderation, escrow requirements, and public dispute resolution -- mechanisms that reduce counterparty risk in an inherently trust-deficient environment.

Active Forums and Marketplaces

Forum/Market Type Focus Status Notable Activity
XSS Forum Russian-language; exploits, malware, access sales Active Ransomware group recruitment, zero-day sales, IAB listings
Exploit Forum Russian-language; high-tier cybercrime Active Premium IAB sales, malware developer community, RaaS recruitment
BreachForums Forum/Market English-language; data breaches, credential dumps Active (resurrected after seizure) Largest English-language breach data marketplace, successor to RaidForums
RAMP Forum Russian-language; ransomware-focused Active Ransomware affiliate recruitment, initial access sales, China-language section added
Dread Forum English-language; dark web meta-forum Active Discussion of markets and services, successor to Reddit-style forums on Tor
Telegram Channels Messaging Multi-language; varies by channel Active (growing) Infostealer log sales, combolists, DDoS-for-hire, increasingly replacing forums for lower-tier activity
Discord Servers Messaging English-language; entry-level cybercrime Active (frequently banned) Script kiddie tooling, credential sharing, raid coordination

Historical Forums (Seized or Defunct)

Forum/Market Type Taken Down Notes
RaidForums Forum/Market Seized (Apr 2022) Operated 2015--2022; primary English-language breach data forum; founder (Omnipotent) arrested
BreachForums v1 Forum/Market Seized (Mar 2023) Run by Pompompurin; successor to RaidForums; admin arrested; site resurrected under new management
BreachForums v2 Forum/Market Seized (May 2024) Run by Baphomet; seized by FBI/DOJ; again resurrected
Genesis Market Market Seized (Apr 2023, Operation Cookie Monster) Sold "bots" (full browser fingerprints with cookies/tokens); 1.5M+ bot listings at peak
Hydra Market Market Seized (Apr 2022) Largest Russian-language darknet market; $5B+ in cryptocurrency transactions
AlphaBay Market Seized (Jul 2017) Premier darknet marketplace; briefly relaunched 2021 under new admin, low traction
Hansa Market Market Seized (Jul 2017) Dutch police operated it covertly for a month after AlphaBay takedown

Forum Mechanics

Forums enforce trust through several mechanisms:

  • Escrow systems -- Admins or automated escrow hold funds during transactions, releasing to the seller upon buyer confirmation. This reduces exit scam risk. Typical escrow fee: 2--5% of transaction value.
  • Reputation scoring -- Forum members accumulate reputation through completed deals, positive feedback, and longevity. High-reputation accounts command premium pricing and are themselves traded (accounts with established history sell for $500--5,000+).
  • Admin arbitration -- Forum administrators resolve disputes, ban scammers, and enforce community rules. Admins on major forums like Exploit and XSS wield significant influence over the ecosystem.
  • Deposit requirements -- Some forums require new members to deposit cryptocurrency ($50--500) to register, filtering out casual observers and law enforcement personas.
  • Guarantor services -- Trusted intermediaries vouch for transactions between parties, taking a commission (3--10%) for facilitating trust.

Knowledge Gap

Precise transaction volumes on underground forums are difficult to verify. Estimates from threat intelligence firms (Flashpoint, Recorded Future, Kela, Intel 471) rely on sampling and extrapolation. The figures cited in this section represent best available estimates, not audited data.


Malware-as-a-Service (MaaS)

The Malware-as-a-Service model has professionalized malware distribution. Developers create and maintain malware families, then license them to operators via subscription or one-time purchase models. Many MaaS operations include customer support, documentation, update channels, and builder tools that allow customers to generate customized payloads.

Infostealers

Infostealers are the single most impactful MaaS category by volume. They harvest credentials, session tokens, cryptocurrency wallets, and browser data from compromised endpoints, then transmit stolen data ("logs") to the operator. These logs feed credential markets and enable downstream attacks including account takeover, ransomware initial access, and corporate espionage.

Malware Type Price Capabilities Status
RedLine Infostealer $150/month; $800 lifetime Browser credentials, crypto wallets, Discord tokens, VPN/FTP credentials, system info Active (despite 2024 disruption by Operation Magnus)
Raccoon Stealer Infostealer $200/month Browser data, crypto wallets, email clients, system fingerprint v2 active; operator arrested (Oct 2022), service resumed under new management
Vidar Infostealer $250/month Browser data, 2FA software, crypto wallets, Telegram sessions Active
Lumma Stealer Infostealer $250--1,000/month (tiered) Browser data, crypto wallets, 2FA extensions, session cookies, advanced evasion Active; rapidly growing market share (2024--2025)
StealC Infostealer $200/month Browser data, crypto wallets, modular plugin architecture Active; popular Vidar alternative
META Stealer Infostealer $125/month; $1,000 lifetime Browser credentials, crypto wallets, system fingerprinting Active
Mystic Stealer Infostealer $150/month Browser data, crypto wallets, messaging app data Active
Rhadamanthys Infostealer $250/month Browser data, crypto wallets, AI-assisted OCR for seed phrase extraction Active; rapidly evolving feature set
Atomic Stealer Infostealer (macOS) $1,000/month macOS-specific: Keychain, browser data, crypto wallets Active; notable for macOS targeting

Key infostealer economics: a single operator running RedLine or Lumma can generate tens of thousands of logs per month. High-value logs containing corporate VPN credentials, cloud service tokens, or cryptocurrency wallet seed phrases sell for $10--500+ each. Bulk logs (consumer accounts) sell for $1--10 each. The total infostealer log ecosystem generates billions of compromised credentials annually (SpyCloud, 2024; Recorded Future, 2025).

Loaders and Botnets

Loaders provide the delivery mechanism for downstream payloads. They establish initial persistence on victim systems and then download additional malware (ransomware, infostealers, RATs) at the operator's direction. Loader operators sell "installs" -- successful infections -- to downstream customers.

Malware Type Price Delivery Methods Status
BumbleBee Loader Per-install pricing ($50--300 per 1,000 installs depending on geo) ISO/VHD attachments, Google Ads malvertising, SEO poisoning Active; linked to former TrickBot/Conti operators
IcedID Loader/Banking Trojan Per-install; estimated $3,000--10,000/month for operator access Phishing attachments, thread hijacking, OneNote abuse Declining (operators shifting to other projects)
SmokeLoader Loader ~$400 for builder + per-install fees Phishing, exploit kits, drive-by downloads Active; one of the oldest active loaders (since 2011)
Pikabot Loader Per-install pricing Phishing, thread hijacking Active; emerged as QakBot replacement
Emotet Loader/Botnet Operated by core team, sells installs Email thread hijacking, macro-laden documents, link-based delivery Intermittent; repeatedly disrupted and rebuilt
QakBot/Qbot Loader/Banking Trojan Operated by core team, sells installs Email thread hijacking, HTML smuggling, PDF lures Rebuilding post-FBI takedown (Aug 2023)
Latrodectus Loader Per-install pricing Phishing, impersonation of Azure/Cloudflare pages Active; assessed as IcedID successor
DarkGate Loader/RAT $15,000/year or $100,000 lifetime (premium pricing) Phishing, Microsoft Teams abuse, malvertising Active; limited to small number of licensed operators

Loader economics: operators typically charge per install, with pricing varying by victim geography (US/EU installs command 5--10x premium over developing markets), victim type (corporate installs are premium), and exclusivity.

Remote Access Trojans (RATs)

Malware Type Price Capabilities Status
AsyncRAT RAT Free/Open-source Remote desktop, keylogging, file management, plugin architecture Active; widely used due to zero cost
QuasarRAT RAT Free/Open-source Remote desktop, keylogging, file transfer, registry editor Active
Remcos RAT $58--389 (licensed as "legitimate" tool) Remote desktop, keylogging, webcam capture, file management Active; sold as legitimate remote admin tool, heavily abused
DcRAT RAT $7--60 (cheap pricing) Remote desktop, keylogging, crypto mining, ransomware module Active
njRAT RAT Free Remote desktop, keylogging, file management Active; one of the most widely deployed RATs globally
Warzone RAT RAT $37.50/month Remote desktop, password recovery, privilege escalation Disrupted (operator arrested Feb 2024)
XWorm RAT/Loader $50--100 Remote access, DDoS, ransomware deployment, clipboard hijacking Active; growing adoption

Banking Trojans -- Evolution

Traditional banking trojans (Zeus, SpyEye, Gozi, Dridex) targeted financial institutions through web injection to manipulate banking sessions. This category has largely evolved into general-purpose stealers and loaders. Modern descendants like IcedID, QakBot, and TrickBot became primarily known as loader/access platforms rather than banking fraud tools. Mobile banking trojans (Xenomorph, SharkBot, Anatsa/TeaBot) remain an active subcategory targeting Android devices, with per-campaign licensing at $3,000--7,000/month (ThreatFabric, 2024).


Exploit Brokers & Zero-Day Markets

The exploit market exists along a spectrum from legitimate vulnerability research through gray-market brokerage to fully criminal black markets. Pricing is driven by target value, exploit reliability, and exclusivity.

Pricing Landscape

Target Zero-Day Price Range N-Day Availability (Disclosure to Weaponized PoC) Key Buyers
iOS full chain (remote, no click) $2M--5M+ Weeks to months Government agencies, surveillance vendors (NSO Group, Intellexa)
Android full chain (remote, no click) $1.5M--3M+ Weeks to months Government agencies, surveillance vendors
Chrome RCE + sandbox escape $500K--1M Days to weeks Government agencies, APT groups
Windows LPE (kernel) $100K--500K Days to weeks (often rapid weaponization) Ransomware groups, APT groups, red teams
Windows RCE (remote, unauthenticated) $500K--1M+ Days to weeks All buyer categories
Microsoft Exchange/Office 365 $200K--600K Days APT groups, ransomware operators
Enterprise VPN (Fortinet, Palo Alto, Ivanti) $100K--500K Hours to days IABs, ransomware affiliates, APT groups
WordPress/CMS plugins $5K--50K Hours to days Spam operators, cryptomining, SEO fraud

Market Segments

Legitimate/gray market brokers include Zerodium (public price list, buys from researchers, resells to government/defense customers), and various government contractors who acquire exploits for intelligence agencies. Zerodium's published prices effectively set a floor for the gray market. The 2023--2025 period saw Zerodium increase mobile exploit prices significantly, reflecting hardened mobile security.

Black market exploit sales occur on premium forums (Exploit, XSS) and through private channels. Prices typically match or exceed gray-market rates for high-value targets. Ransomware groups have become significant exploit buyers, particularly for enterprise VPN and edge device vulnerabilities that provide initial access at scale.

Exploit-as-a-Service is an emerging model where exploit developers retain ownership and charge per-use or per-campaign fees rather than selling outright. This allows developers to monetize a single exploit across multiple customers while maintaining operational security.

N-day weaponization timeline is accelerating. Analysis by Mandiant and Rapid7 shows the average time from vulnerability disclosure to observed exploitation has decreased from 32 days (2021) to under 5 days (2024) for widely-targeted vulnerabilities (Rapid7, 2024 Attack Intelligence Report). For high-value enterprise appliance vulnerabilities (VPN, firewall, file transfer), weaponization often occurs within hours of disclosure or even before a patch is available (zero-day to n-day window).

Knowledge Gap

Black market exploit pricing is inherently opaque. Published prices (including Zerodium's) represent the gray market. True black market prices -- particularly for state-sponsored buyers -- may significantly exceed published figures. The estimates above are compiled from threat intelligence reporting and should be treated as approximate ranges.


Credential Markets

Credential markets are the connective tissue between infostealers and downstream attacks. They aggregate, quality-sort, and sell stolen authentication data at scale.

Major Credential Markets

Market Type Volume Pricing Status
Russian Market Automated shop 5M+ listings (estimated) $1--50 per log (varies by target quality) Active; largest active credential market
2easy Automated shop 1M+ listings $1--20 per log Active
Genesis Market Automated shop (browser fingerprints) 1.5M+ bots at peak $5--350 per bot (full browser profile) Seized (Apr 2023, Operation Cookie Monster)
Telegram channels Decentralized Millions of logs shared daily Free (bulk dumps) to $5--100 (curated sets) Active; rapidly growing distribution channel
BreachForums Forum-based sales Varies by listing $0 (reputation building) to $100K+ (major breach data) Active
Combo lists Aggregated dumps Billions of credentials $10--500 per collection (depending on freshness, deduplication) Active; distributed across forums and Telegram
Corporate access Premium/private sales Low volume, high value $500--100,000+ per organization (depending on target, access level, revenue) Active; sold on Exploit, XSS, RAMP

Credential Types and Pricing

Infostealer logs form the bulk of credential market inventory. A single log typically contains all credentials, cookies, and tokens from one compromised endpoint. Pricing follows clear quality tiers:

  • Consumer accounts (streaming, gaming, social media): $1--5 per log
  • Email accounts (Gmail, Outlook, Yahoo): $5--15 per log
  • Financial services (banking, crypto exchanges): $15--50 per log
  • Corporate credentials (VPN, RDP, SSO, cloud admin): $50--500+ per log
  • Active session tokens (bypass MFA, already authenticated): 2--5x premium over static credentials

"Bot" markets (pioneered by Genesis Market) sell full machine fingerprints including browser cookies, saved passwords, session tokens, and browser configuration data. These allow buyers to impersonate the victim's browser environment, bypassing device fingerprinting and session-based authentication. Despite Genesis Market's seizure, the model has been replicated by Russian Market and others.

Session token and cookie markets have grown significantly as organizations deploy MFA. Stolen session tokens and authentication cookies allow attackers to bypass MFA entirely by importing already-authenticated sessions. This has driven the evolution of infostealers to prioritize cookie and token harvesting over static credential collection.

Freshness is critical. Credentials degrade in value rapidly as passwords are changed, sessions expire, and breaches are discovered. Markets differentiate by freshness:

  • Real-time logs (harvested within 24 hours): Premium pricing
  • Recent logs (1--7 days): Standard pricing
  • Aged logs (7--30 days): Discounted 50--80%
  • Stale logs (30+ days): Near-worthless for direct access, still useful for password reuse attacks

Bulletproof Hosting & Infrastructure

Bulletproof hosting (BPH) providers form the infrastructure backbone of cybercrime operations. These providers explicitly or implicitly ignore abuse complaints, law enforcement requests, and takedown notices, allowing criminal operations to persist.

Hosting Models

Traditional bulletproof hosts operate in jurisdictions with weak cybercrime enforcement or where operators have established relationships with local authorities. Key jurisdictions include Russia, Moldova, Romania (historically), and various offshore locations. These providers advertise on underground forums with explicit "abuse-tolerant" or "no logs" policies.

Legitimate hosting abuse is increasingly common. Criminal operators use compromised legitimate hosting accounts, stolen cloud credentials (AWS, Azure, GCP), or fraudulently registered accounts on mainstream providers. This approach provides better network quality and reputation than dedicated BPH, at the cost of shorter operational lifespans before suspension.

Residential proxy networks are built from compromised IoT devices, adware-bundled software, and hijacked consumer endpoints. These networks route malicious traffic through legitimate residential IP addresses, making detection and blocking significantly harder. Services like 911 S5 (seized May 2024, 19M+ IP addresses compromised) demonstrated the scale of this infrastructure. Successors continue to operate.

Infrastructure Services

Service Function Pricing Notes
Bulletproof VPS Host C2 servers, phishing sites, malware distribution $50--500/month Priced 3--10x above legitimate hosting
Fast-flux DNS Rapidly rotate DNS records across compromised hosts Included with hosting or $100--300/month add-on Hinders takedown by distributing across hundreds of IPs
Domain generation algorithms (DGA) Generate pseudo-random C2 domains Built into malware (not a service) Complicates domain-based blocking
Residential proxies Route traffic through legitimate residential IPs $5--15 per GB or $200--500/month unlimited 911 S5 successor services, hijacked IoT
Criminal VPN services "No-log" VPN marketed to criminals $5--30/month Distinct from commercial VPNs; some specifically market to cybercriminals
C2-as-a-Service Managed command-and-control infrastructure $500--5,000/month Turnkey C2 frameworks (Cobalt Strike, Sliver, Mythic) managed by provider
SMTP relay services Send phishing and spam at scale $50--300 per campaign or per 100K emails Rotating sender infrastructure to evade email filtering
Traffic distribution systems (TDS) Route and filter web traffic for exploit kits, malvertising $100--1,000/month Filter by geo, device, browser; redirect to appropriate payload

Jurisdictional Arbitrage

BPH operators exploit jurisdictional gaps systematically:

  • Russia -- Operators within Russia targeting non-CIS countries face minimal law enforcement risk. Many BPH providers operate openly from Russian datacenters.
  • Moldova/Transnistria -- Weak governance and enforcement create safe harbor.
  • Seychelles, Belize, Panama -- Offshore company formation combined with lax hosting oversight.
  • Abuse of legitimate cloud providers -- Even when accounts are suspended, the cost of creating new accounts is negligible, creating an asymmetric takedown burden.

Phishing Kits & Social Engineering Tools

Phishing-as-a-Service (PhaaS) platforms have transformed phishing from a manual craft into a scalable, subscription-based operation. Modern phishing platforms include adversary-in-the-middle (AiTM) capabilities that defeat most forms of multi-factor authentication.

Phishing-as-a-Service Platforms

Platform Type Capabilities Price Primary Targets
EvilProxy PhaaS (AiTM) Reverse proxy MFA bypass, session hijacking, targeting templates for M365, Google, Okta $400/month (basic); $1,000+/month (enterprise targets) Microsoft 365, Google Workspace, Okta
Evilginx Open-source AiTM framework Reverse proxy MFA bypass, customizable "phishlets," session token capture Free (open-source); commercial kits built on top $100--500 Any web application
Caffeine PhaaS Pre-built phishing pages, hosting, campaign management $250/month Microsoft 365, consumer email
NakedPages PhaaS (AiTM) Reverse proxy with AiTM, antibot, geo-filtering $250--1,000/month Microsoft 365, financial services
Greatness PhaaS Microsoft 365-focused, MFA bypass, pre-filled victim email $120/month Microsoft 365
Tycoon 2FA PhaaS (AiTM) Advanced AiTM, Cloudflare Turnstile bypass, antibot $200--600/month Microsoft 365, Google Workspace
Robin Banks PhaaS Banking and financial institution templates $50/month (basic); $200/month (full) Financial services, consumer banking
Rockstar 2FA PhaaS (AiTM) AiTM with QR code phishing, Telegram integration $200/month Microsoft 365

AiTM Mechanics

Adversary-in-the-middle phishing kits operate as transparent reverse proxies between the victim and the legitimate service. When a victim enters credentials and completes MFA on the phishing page, the kit relays everything to the real service in real time, captures the authenticated session token, and passes it to the attacker. This defeats all MFA methods except hardware-bound phishing-resistant MFA (FIDO2/WebAuthn).

The proliferation of AiTM kits is a primary driver of demand for phishing-resistant MFA adoption and has significantly weakened the security value of SMS and app-based OTP methods.

Emerging Social Engineering Tools

SMS phishing (smishing) platforms provide bulk SMS delivery infrastructure, URL shortening, and landing page hosting. Pricing runs $200--800/month. Services target mobile users with package delivery, banking, and government impersonation lures.

Deepfake-as-a-Service is emerging as a commercial offering in underground markets (2025). Real-time voice cloning and face-swapping tools are being packaged for BEC operations. Reported pricing ranges from $200/month for basic voice cloning to $1,000+/month for real-time video deepfake capability. A February 2024 incident in Hong Kong saw a finance worker tricked into transferring $25M via deepfake video call impersonating company executives (CNN, Feb 2024).

Knowledge Gap

Deepfake-as-a-Service pricing and adoption is rapidly evolving and difficult to verify. The capabilities described here reflect reporting from threat intelligence firms through early 2026, but the market is moving quickly and specific pricing figures may not be current.

AI-generated phishing content using jailbroken or uncensored LLMs has improved the quality of phishing lures -- eliminating grammatical errors, enabling convincing multi-language campaigns, and generating context-aware pretexts. While the impact of "WormGPT" and "FraudGPT" specifically has been overstated, the broader use of mainstream LLMs (via jailbreaks or social engineering of the models) for phishing content generation is well-documented (Microsoft, 2024; Google TAG, 2024).


Money Laundering & Cashout

Converting illicit proceeds into usable funds is the final and often most vulnerable stage of cybercrime operations. Law enforcement has increased pressure on this segment, particularly through cryptocurrency enforcement actions and sanctions.

Methods and Services

Method Commission Estimated Volume Risk Level Status
Cryptocurrency mixers/tumblers 1--3% Billions USD annually (aggregate) High (regulatory/law enforcement targeting) Active but under pressure; major services seized/sanctioned
Chain-hopping (cross-chain bridges) 0.5--2% (bridge fees) Growing Moderate Active; exploiting DeFi bridge anonymity
Mule networks 10--20% of laundered amount Tens of billions USD (global) High (mules frequently arrested) Active; core of fiat cashout
OTC desks (nested exchanges) 3--8% Billions USD annually Moderate--High Active; operating within legitimate exchange infrastructure
Gift card/prepaid card schemes 20--40% loss (resale discount) Moderate Moderate Active; common for lower-value fraud
Money laundering as a service 10--20% Significant Varies by method Active; full-service laundering offered on forums
Real estate/luxury goods Varies High for nation-state actors Lower detection (traditionally) Active; increasing regulatory scrutiny
NFT-based laundering Variable (platform fees + wash trading costs) Low--Moderate Moderate (declining with market) Declining with NFT market contraction

Cryptocurrency Laundering -- Enforcement Pressure

Law enforcement has significantly disrupted cryptocurrency laundering infrastructure:

  • Tornado Cash -- OFAC sanctioned (Aug 2022); founders indicted. Remained partially operational due to decentralized smart contract architecture, but usage dropped significantly.
  • Sinbad -- Seized (Nov 2023) by FBI, with cooperation from Netherlands and Finland. Identified as successor to Blender.io (sanctioned May 2022). Linked to Lazarus Group laundering.
  • ChipMixer -- Seized (Mar 2023) by German BKA and US DOJ. Processed over $3B in cryptocurrency.
  • 911 S5 Proxy -- Seized (May 2024); administrator arrested. 19M+ residential IP addresses compromised, used to launder proceeds and commit fraud.
  • Suex, Chatex, Garantex -- Russian-linked OTC desks sanctioned by OFAC for processing ransomware proceeds. Garantex seized (Feb 2025).

Despite enforcement, new mixing and tumbling services rapidly emerge to replace seized ones. The shift toward cross-chain bridges and decentralized protocols creates additional challenges for law enforcement, as these services may lack a central operator to target.

Mule Networks

Mule networks remain essential for converting cryptocurrency to fiat currency. Recruiters ("mule herders") use job scam advertisements, romance fraud, and direct recruitment on forums to acquire mules -- individuals who receive and forward funds through their personal bank accounts. Mule networks are organized in tiers:

  • Tier 1 (Unknowing mules): Recruited through job scams ("payment processing agent"), often unaware of the criminal nature. Highest arrest risk, lowest cut (5--10%).
  • Tier 2 (Knowing mules): Aware of the scheme, actively participate. Moderate risk, moderate cut (10--15%).
  • Tier 3 (Mule herders/organizers): Recruit and manage mule networks. Lower direct arrest risk, higher cut (15--25%).

How It All Connects

The following diagram illustrates the full economic cycle of cybercrime, showing how specialized actors and markets interconnect.

Tool & Service DevelopmentUnderground MarketsInitial Access LayerOperational LayerCashout LayerDEVEXPDEVPHKITINFRAFORUMSCREDMKTTELEGRAMIABSTEALERRWOPSBECOPSATOOPSDATAOPSMIXERMULESOTCDESKMalware Developers\n(MaaS vendors) Exploit Developers\n(brokers, researchers) Phishing Kit Developers\n(PhaaS platforms) Infrastructure Providers\n(BPH, proxies, C2) Forums\n(XSS, Exploit, RAMP) Credential Markets\n(Russian Market, 2easy) Telegram ChannelsInitial Access BrokersInfostealer OperatorsRansomware AffiliatesBEC OperatorsAccount Takeover\nSpecialists Data Theft &\nExtortion Operators Crypto Mixers\n& Bridges Mule NetworksOTC Desks &\nNested Exchanges

Economics

Underground Economy Estimates

Knowledge Gap

Estimates of the total cybercrime economy vary by an order of magnitude depending on methodology, scope, and source. The $1.5T figure (Bromium/HP, 2018) includes direct criminal revenues. The $8--10.5T figure (Cybersecurity Ventures, 2024--2025) includes estimated total economic damage and costs. Neither figure is independently auditable. Treat all aggregate economic figures as order-of-magnitude indicators, not precise measurements.

Profit Margins by Specialization

Specialization Estimated Annual Revenue (Top Operators) Profit Margin Barrier to Entry Risk Level
Ransomware operator (RaaS platform) $10M--100M+ 60--80% (after affiliate splits) High (development, infrastructure, reputation) High (law enforcement priority)
Ransomware affiliate $500K--10M+ 70--80% of ransom (minus RaaS cut) Moderate (need access + RaaS subscription) High
Infostealer developer $1M--10M+ 80--90% (subscription model, low marginal cost) Moderate (development skill) Moderate
Initial access broker $100K--2M+ 60--80% Low--Moderate Moderate
Credential market operator $500K--5M+ 70--85% (automated platform) Moderate (platform development, trust) Moderate--High
Phishing kit developer $500K--5M+ 80--90% Moderate Moderate
Bulletproof hosting provider $200K--2M+ 40--60% Moderate (infrastructure + jurisdictional setup) Moderate
Money mule herder $100K--1M+ 10--25% of laundered funds Low High (proximity to fiat system)
Exploit broker Highly variable ($100K--10M+) 30--60% (acquisition cost is high) Very High (research capability or trust network) Moderate

Market Dynamics

Competition drives innovation. MaaS vendors compete on features, evasion capability, customer support, and pricing -- mirroring legitimate SaaS dynamics. When one infostealer adds a new capability (e.g., Rhadamanthys adding AI-assisted seed phrase OCR), competitors follow within weeks.

Law enforcement takedowns create temporary price shocks. The seizure of Genesis Market (April 2023) temporarily increased "bot" pricing on competing platforms by 30--50% before new supply normalized prices (Flashpoint, 2023). Similarly, disruption of QakBot (August 2023) increased pricing for alternative loader installs until Pikabot, DarkGate, and other alternatives filled the gap.

Consolidation is occurring at the top end. Major ransomware operations increasingly vertically integrate, developing proprietary tooling, running their own infostealer operations, and establishing direct cryptocurrency laundering channels rather than relying on third-party services.

Insurance drives ransomware economics. The presence of cyber insurance has been documented as a factor in ransomware targeting and pricing. Some ransomware groups specifically seek evidence of insurance coverage during intrusions to calibrate ransom demands. Conversely, tightening insurance requirements (particularly MFA mandates) are slowly raising the cost of initial access.


Defensive Implications

Understanding the cybercrime supply chain directly informs defensive strategy. Key implications:

Dark web monitoring and digital risk protection (DRP) -- Organizations should monitor underground forums and credential markets for mentions of their domains, employee credentials, and corporate assets. This enables proactive response before stolen data is weaponized.

Credential monitoring -- Continuous monitoring of infostealer log markets for corporate credentials is now a baseline security requirement. When corporate credentials appear in log markets, immediate forced password resets and session invalidation are necessary.

Infostealer detection -- Endpoint security must specifically detect infostealer execution and data exfiltration. Given the volume of infostealer infections globally, this is a high-probability threat for most organizations.

Phishing-resistant MFA -- The proliferation of AiTM phishing kits renders SMS, app-based OTP, and push-notification MFA insufficient for high-value accounts. FIDO2/WebAuthn hardware keys or passkeys are the only MFA methods that resist AiTM attacks at the protocol level.

Threat intelligence platforms -- Threat intel that monitors underground markets provides early warning of targeted campaigns, newly available exploits, and access sales affecting specific industries or organizations.

Brand protection -- Monitoring for phishing kits and impersonation campaigns targeting the organization's brand enables faster takedown and reduced customer impact.

Session management -- Given the prevalence of session token theft, organizations should implement token binding, conditional access policies with continuous evaluation, and aggressive session timeouts for sensitive applications.


Market Impact

The cybercrime underground economy is a primary driver of demand across multiple cybersecurity market segments.

Directly Driven Market Segments

Segment Estimated Market Size (2025) Key Drivers from Underground Economy Representative Vendors
Dark Web Monitoring / Digital Risk Protection $1.2--2.5B Credential markets, forum monitoring, brand impersonation Recorded Future, Flashpoint, Intel 471, Kela, ZeroFox, Cyberint (acquired by Check Point), Digital Shadows (acquired by ReliaQuest)
Threat Intelligence $4--6B (broader TI market) Underground market monitoring, malware analysis, actor tracking Recorded Future, Mandiant/Google, CrowdStrike, Intel 471, Group-IB, Kela
Credential Monitoring Included in DRP and identity segments Infostealer logs, credential dumps, session token markets SpyCloud, Flare, Constella Intelligence, Enzoic, Have I Been Pwned
Anti-Phishing / Email Security $5--8B (email security broader) PhaaS platforms, AiTM kits, social engineering tools Proofpoint, Mimecast, Abnormal Security, Cofense, Bolster, Area 1 (Cloudflare)
Phishing-Resistant MFA / Identity $15--20B (IAM broader) AiTM kit proliferation driving FIDO2 adoption Yubico, Okta, Microsoft, Duo/Cisco, Beyond Identity, HYPR
Cryptocurrency Analytics / Blockchain Intelligence $500M--1B Ransomware payments, mixer/tumbler analysis, sanctions compliance Chainalysis, Elliptic, TRM Labs, Crystal Blockchain, CipherTrace (Mastercard)

Market Growth Drivers

The underground economy's maturation is driving cybersecurity spending in several ways:

  1. Democratization of attack capability -- MaaS lowers barriers, increasing attack volume, which drives demand for automated detection and response.
  2. MFA bypass proliferation -- AiTM kits drive enterprise migration to phishing-resistant MFA, benefiting FIDO2/passkey vendors and identity security platforms.
  3. Credential exposure scale -- Billions of credentials in circulation drive continuous monitoring, breach notification, and identity verification spending.
  4. Ransomware economics -- The ransomware supply chain drives spending across endpoint, backup, incident response, insurance, and negotiation services.
  5. Regulatory response -- Regulations like SEC incident disclosure rules, NIS2, and DORA create compliance-driven demand for monitoring and reporting capabilities.

Vendor Landscape Note

The digital risk protection segment is undergoing consolidation. Major acquisitions include Check Point's acquisition of Cyberint (2024), ReliaQuest's acquisition of Digital Shadows (2022), and Palo Alto Networks' acquisition of Cortex-adjacent threat intel assets. Standalone DRP vendors face platform pressure from large security vendors adding underground monitoring capabilities to existing threat intelligence products.


Sources & Further Reading

Primary Sources

  • Mandiant / Google Threat Intelligence -- Annual M-Trends reports documenting underground market trends, infostealer activity, and initial access broker patterns. M-Trends 2025
  • CrowdStrike -- Global Threat Report (annual) with dedicated sections on eCrime ecosystem and access broker trends. 2025 Global Threat Report
  • Recorded Future -- Insikt Group research on underground forums, credential markets, and MaaS trends. recordedfuture.com/research
  • Intel 471 -- Continuous monitoring of underground forums, MaaS vendors, and IABs. intel471.com
  • Kela -- Dark web monitoring and threat intelligence focused on cybercrime ecosystem. kela.com
  • Flashpoint -- Underground forum monitoring and threat intelligence. flashpoint.io
  • Chainalysis -- Cryptocurrency tracing and cybercrime financial flow analysis. Annual Crypto Crime Report. chainalysis.com
  • SpyCloud -- Annual infostealer and credential exposure reports. spycloud.com
  • Europol -- Internet Organised Crime Threat Assessment (IOCTA), annual. europol.europa.eu
  • FBI IC3 -- Internet Crime Report (annual). ic3.gov

Law Enforcement Operations (Referenced)

  • Operation Cookie Monster (Apr 2023) -- Genesis Market seizure. FBI-led, 17-country operation.
  • QakBot takedown (Aug 2023) -- FBI Operation "Duck Hunt." Infrastructure seized, malware uninstalled from 700K+ endpoints.
  • Operation Magnus (Oct 2024) -- International disruption of RedLine and META stealer infrastructure.
  • Hive takedown (Jan 2023) -- FBI infiltrated Hive ransomware, distributed decryption keys.
  • LockBit disruption (Feb 2024) -- Operation Cronos. NCA/FBI seized infrastructure, unmasked LockBitSupp.
  • 911 S5 Proxy seizure (May 2024) -- FBI seized world's largest residential proxy botnet.
  • Garantex seizure (Feb 2025) -- German/US law enforcement seized Russian cryptocurrency exchange.

Academic and Industry Research

  • Pastrana, S. et al. "Crimebb: Enabling cybercrime research on underground forum data." WWW 2018.
  • Bhatt, S. et al. "The economics of the underground dark web marketplace." Journal of Cybersecurity, 2023.
  • Huang, D.Y. et al. "Tracking ransomware end-to-end." IEEE S&P, 2018.
  • Cybersecurity Ventures. "Cybercrime To Cost The World $10.5 Trillion Annually By 2025." cybersecurityventures.com

Cross-References

Related Sections

Glossary

This glossary defines the acronyms and key terms used throughout the cybersecurity market research site. Use it as a quick reference when navigating segment analyses, pain-point discussions, and opportunity assessments.

A

Term Definition
ACL Access Control List — rules determining which users/systems can access resources
APT Advanced Persistent Threat — a prolonged, targeted cyberattack where an intruder gains and maintains unauthorized access
ASM Attack Surface Management — continuous discovery, inventory, and risk assessment of an organization's external-facing assets
ASPM Application Security Posture Management — unified visibility and risk management across the application lifecycle
AV Antivirus — software designed to detect, prevent, and remove malware

B

Term Definition
BAS Breach and Attack Simulation — automated tools that simulate real-world attacks to test security controls
BEC Business Email Compromise — a social-engineering attack targeting employees with access to company finances or data

C

Term Definition
C2 Command and Control — infrastructure used by attackers to communicate with compromised systems
CASB Cloud Access Security Broker — a security policy enforcement point between cloud consumers and providers
CCPA California Consumer Privacy Act — California state law granting consumers rights over their personal data
CIAM Customer Identity and Access Management — managing and securing external customer identities and authentication
CIEM Cloud Infrastructure Entitlement Management — managing identities and privileges in cloud environments
CTEM Continuous Threat Exposure Management — a program for continuously assessing and prioritizing threat exposures
CNAPP Cloud-Native Application Protection Platform — integrated security for cloud-native applications across the full lifecycle
CSPM Cloud Security Posture Management — continuous monitoring of cloud infrastructure for misconfigurations and compliance risks
CWPP Cloud Workload Protection Platform — security for workloads running in cloud environments (VMs, containers, serverless)
CVE Common Vulnerabilities and Exposures — a standardized identifier for publicly known cybersecurity vulnerabilities

D

Term Definition
DAST Dynamic Application Security Testing — testing a running application for vulnerabilities by simulating attacks
DCS Distributed Control System — a control system for managing industrial processes across multiple locations
DLP Data Loss Prevention — tools and processes to prevent unauthorized data exfiltration or leakage
DORA Digital Operational Resilience Act — EU regulation on ICT risk management for financial entities
DSPM Data Security Posture Management — discovering, classifying, and protecting sensitive data across cloud environments

E

Term Definition
EASM External Attack Surface Management — discovering and monitoring internet-facing assets for exposures
EDR Endpoint Detection and Response — tools that monitor endpoints for threats and provide investigation and response capabilities
EPP Endpoint Protection Platform — integrated endpoint security combining prevention, detection, and response

F/G

Term Definition
FAIR Factor Analysis of Information Risk — a quantitative model for understanding, analyzing, and measuring information risk
GRC Governance, Risk, and Compliance — integrated framework for aligning IT with business goals, managing risk, and meeting regulations
GDPR General Data Protection Regulation — EU regulation on data protection and privacy for individuals

H

Term Definition
HIPAA Health Insurance Portability and Accountability Act — US law governing the privacy and security of health information

I

Term Definition
IAB Initial Access Broker — specialized cybercriminals who compromise networks and sell access to ransomware operators and other buyers
IAM Identity and Access Management — framework for managing digital identities and controlling access to resources
ICS Industrial Control System — control systems used in industrial production and critical infrastructure
IDS Intrusion Detection System — a system that monitors network traffic for suspicious activity and alerts
ITDR Identity Threat Detection and Response — detecting and responding to identity-based attacks and compromises
IoT Internet of Things — network of physical devices embedded with sensors, software, and connectivity
IPS Intrusion Prevention System — a system that monitors and actively blocks detected threats in network traffic

L

Term Definition
LOTL Living Off the Land — attack technique using legitimate, pre-installed system tools and binaries rather than custom malware to evade detection

M

Term Definition
MaaS Malware-as-a-Service — cybercrime business model where malware developers sell or rent their tools to other criminals
MDR Managed Detection and Response — outsourced security service providing 24/7 threat monitoring, detection, and response
MITRE ATT&CK MITRE Adversarial Tactics, Techniques, and Common Knowledge — a knowledge base of adversary behaviors and techniques
MSSP Managed Security Service Provider — a third-party provider offering outsourced monitoring and management of security devices
MFA Multi-Factor Authentication — requiring two or more verification factors to gain access to a resource

N

Term Definition
NDR Network Detection and Response — detecting and responding to threats by analyzing network traffic patterns
NERC CIP North American Electric Reliability Corporation Critical Infrastructure Protection — security standards for the electric grid
NGAV Next-Generation Antivirus — advanced antivirus using behavioral analysis, AI, and machine learning beyond signature-based detection
NIS2 Network and Information Systems Directive 2 — updated EU directive on cybersecurity for essential and important entities
NIST CSF National Institute of Standards and Technology Cybersecurity Framework — a voluntary framework for managing cybersecurity risk

O

Term Definition
OT Operational Technology — hardware and software that monitors and controls physical devices and processes
OWASP Open Worldwide Application Security Project — a nonprofit focused on improving software security through open-source projects and guidance

P

Term Definition
PAM Privileged Access Management — securing, managing, and monitoring privileged accounts and access
PCI DSS Payment Card Industry Data Security Standard — security standards for organizations that handle credit card data
PII Personally Identifiable Information — any data that could identify a specific individual
PLC Programmable Logic Controller — an industrial computer used to control manufacturing processes

R

Term Definition
RaaS Ransomware-as-a-Service — cybercrime business model where ransomware operators provide malware and infrastructure to affiliates who conduct attacks, splitting profits
RGB Reconnaissance General Bureau — North Korea's primary intelligence agency responsible for clandestine operations including cyber operations

S

Term Definition
SASE Secure Access Service Edge — converged network and security-as-a-service architecture delivered from the cloud
SAST Static Application Security Testing — analyzing source code for vulnerabilities without executing the application
SBOM Software Bill of Materials — a formal inventory of components, libraries, and dependencies in a software product
SCA Software Composition Analysis — identifying open-source components and known vulnerabilities in a codebase
SCADA Supervisory Control and Data Acquisition — a system for monitoring and controlling industrial processes remotely
SD-WAN Software-Defined Wide Area Network — a virtual WAN architecture that simplifies branch networking and optimizes traffic
SEG Secure Email Gateway — a solution that filters inbound and outbound email to block threats and enforce policies
SIEM Security Information and Event Management — aggregating and analyzing log data for threat detection and compliance
SOAR Security Orchestration, Automation, and Response — tools that automate and coordinate security operations workflows
SOC Security Operations Center — a centralized team and facility for monitoring, detecting, and responding to security incidents
SOX Sarbanes-Oxley Act — US law mandating financial reporting and internal control requirements for public companies
SSE Security Service Edge — the security component of SASE, delivering SWG, CASB, and ZTNA as cloud services
SWG Secure Web Gateway — a solution that filters web traffic to enforce security policies and block threats

T

Term Definition
TAM Total Addressable Market — the total revenue opportunity available for a product or service
TCO Total Cost of Ownership — the complete cost of acquiring, deploying, and operating a solution over its lifetime
TIP Threat Intelligence Platform — a system for aggregating, correlating, and operationalizing threat intelligence data
TLS Transport Layer Security — a cryptographic protocol that provides secure communication over a network
TTP Tactics, Techniques, and Procedures — the patterns of behavior and methods used by threat actors to conduct cyber operations

V

Term Definition
VM Vulnerability Management — the ongoing process of identifying, evaluating, treating, and reporting security vulnerabilities

X

Term Definition
XDR Extended Detection and Response — unified threat detection and response across endpoints, network, cloud, and email

Z

Term Definition
ZTNA Zero Trust Network Access — a security model that grants access based on identity verification and least-privilege principles