Hackers Can Buy Tools To Attack Your Business For $40

Cyber threats and attacks are continuing to increase, according to a recent study by Positive TechnologiesMajor cyber incidents have increased by 32% between Q1 2017 and Q1 2018, according to another Positive Technologies post. Through their analysis, the organisation found that the rise in attacks can be attributed to ready-made malware.

Positive Technologies then analyzed 25 dark web sites to examine the costs of cybercrime services across the Dark Web, from simple to more complex attacks.

With remote desktop protocol (RDP) access to businesses being sold on the dark web for  10 bucks, users have already seen how easily they can be compromised. However, the inexpensive hacking tactics don't stop at RDP, and some of them are shockingly low.

Here are the costs of different cybercrime services, according to Positive Technologies:

  • Hacking email: $40
  • DDoS attack: $50
  • Hacking website: $150
  • Stealing payment data $270
  • Infecting with Trojan for mining: $300
  • Infecting with ransomware Trojan: $750
  • Stealing from ATM: $1,500
  • Targeted attack: $4,500

Starting at $40, hackers can infiltrate a business' email and steal sensitive information. With the price of attacks starting so low, cybercrime isn't directed only at big business.  Some 71% of SMBs are not prepared for cybersecurity risks, and with how cheap it is to attack, they need to shore up their defenses.

Big businesses aren't safe either. Since costs are so low, hackers could purchase multiple attack services to target large enterprises from different angles. If hackers can't afford the larger, more dangerous attacks, they can still do damage with a slew of smaller attacks.

TechRepublic

You Might Also Read: 

For Sale: Access To Airport Security:

Data About Your Company On The Dark Web:

« Malware – The Hateful Eight
The Impact Of Economic Espionage »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Firebrand

Firebrand

Firebrand is the leader in Accelerated Learning in the field of IT and project management.

SharkGate

SharkGate

SharGate provide a cloud-based website security solution to protect websites from being hacked.

AllegisCyber Capital

AllegisCyber Capital

AllegisCyber is an investment company with a focus on seed and early stage investing in cybersecurity and its applications in emerging technology markets.

Omada

Omada

Omada is a leading provider of IT security solutions and services for identity management and access governance.

Cyber Security Challenge UK

Cyber Security Challenge UK

Cyber Security Challenge UK is a series of national competitions, learning programmes, and networking initiatives designed to identify, inspire and enable more people to become cybersec professionals.

adaware

adaware

adaware is an award-winning security and privacy software provider, empowering users to connect with confidence.

Altaro Software

Altaro Software

Altaro provide backup solutions that are intuitive, easy to use, well-priced and backed by outstanding 24/7 support as part of the package.

ChainSecurity

ChainSecurity

ChainSecurity provides products and services for securing smart contracts and blockchain protocols and conducts R&D in the areas of security, program analysis, and machine learning.

Stanley Reid & Company (SRC)

Stanley Reid & Company (SRC)

Stanley Reid & Co is an Executive and Technical Search Firm serving the commercial market and the US Intelligence & Defense community. Our areas of expertise include Cybersecurity.

Qohash

Qohash

With a focus on data security, Qohash supports security, compliance and optimization use cases enhancing your risk management process.

IntelliDyne

IntelliDyne

IntelliDyne is a leading information technology consulting firm enabling better mission performance through innovative technology solutions.

Tech Seven Partners

Tech Seven Partners

At TechSeven Partners, we provide a full suite of cyber security solutions for your business including network monitoring, onsite and cloud backup solutions, HIPAA or PCI compliance.

IONOS

IONOS

IONOS is a leading provider of cloud infrastructure, cloud services, and hosting with more than 8.5 million customers contracts.

Beetles Cyber Security

Beetles Cyber Security

Beetles is a crowdsourced penetration testing platform designed to build a trusted, hacker-centric approach to protectan organization’s digital attack surface.

Token Security

Token Security

Token is the new approach designed for the identity boom era. Introducing Machine-First Identity Security.

SOCRadar

SOCRadar

SOCRadar is an Extended Threat Intelligence (XTI) SaaS platform that combines External Attack Surface Management (EASM), Digital Risk Protection Services (DRPS), and Cyber Threat Intelligence (CTI).