Mercenary Cyber Spies For Hire

It was once the case that only governments had the technical ability to penetrate secure data, telecoms networks and the devices connected to them. Today, the threat posed by private firms with cyber capabilities that rival the world’s most skilled spy agencies, is not widely known. 

The spy-for-hire industry targets people and organisations and aims to collect their intelligence information and monitor them to infiltrate their technology devices. These operations silently get their victims to unwittingly reveal information and often compromise their devices and accounts. 

One such as these is an emerging cyber crime organisation called the Atlantis Cyber-Army or the  Atlas Intelligence Group (AIG), which is offering a range of services, including exclusive data leaks, DDoS attacks, and Remote Desktop Protoctol (RDP) exploits. 

This criminal group operates on a for-hire basis and seeks to recruit cyber mercenaries that conduct specific illicit activities that are pieces of larger cyber campaigns. 

Organised threat groups tend to follow a similar path in which they recruit individuals with certain desirable capabilities that can benefit the group’s agenda. AIG strays from this model by outsourcing specific aspects of an attack to mercenaries, who are not responsible or involved in the rest of the attack. Each actor focuses on a specific piece of the attack and multiple different individuals may be involved. Their activities include Ransomware-as-a-Service exploits which can involve multiple threat actors, each being paid a percentage of any extorted funds or digital assets stolen.

What makes AIG different is it outsources specific aspects of an attack to mercenaries who have no further involvement in an attack.

The group is understood to have targeted various sectors, including education, finance, government entities, manufacturing and technology, and published leaked databases for sale on the Dark Web, with a starting price from little as 15 Euros.

AIG offers premium services that demand more skill and demonstrate the group’s sophistication, researchers said. One of these products is hacked panels and initial access to organisations, with prices for these services starting from about $1,000. The group also offers “VIP services” that claim ties to people in law-enforcement positions across Europe that can give customers access to sensitive information about specific individuals.

Meta:   Theatpost:   Oodaloop:   PSBE News Group:    Spiceworks:    Heal Security:   The Cipehr Brief:    

Techmonitor:     Reddit

You Might Also Read: 

Revealed: Top Secret Israeli Hackers For Hire:

 

« Building a Threat-Ready Ransomware Response Plan
Cyber Attacks On Port of Los Angeles Have Doubled »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ExaGrid Systems

ExaGrid Systems

ExaGrid provides Tiered Backup Storage with a unique disk-cache Landing Zone, long-term retention repository, and scale-out architecture.

Skkynet Cloud Systems

Skkynet Cloud Systems

Skkynet is a leader in real-time data systems for the secure management and control of industrial processes (SCADA) and embedded devices (M2M).

Phirelight Security Solutions

Phirelight Security Solutions

Phirelight empowers an enterprise to easily understand how their networks behave, while at the same time assessing and managing cyber threats in real time.

Volatility Foundation

Volatility Foundation

Volatility is an open source memory forensics framework for incident response and malware analysis.

Lepide

Lepide

LepideAuditor is a powerful Data Security Platform that enables you to reduce risk, prevent data breaches and prove regulatory compliance.

CYE

CYE

Utilizing data, numbers, and facts, CYE helps security leaders know what business assets are at risk and execute cost-effective remediation projects for optimal risk prevention.

GroupSense

GroupSense

GroupSense helps governments and enterprises take control of digital risk with cyber reconnaissance, counterintelligence and monitoring for breached credentials.

Human Security

Human Security

Human (formerly White Ops) Bot Mitigation Platform enables complete protection from sophisticated bot attacks across advertising, marketing and cybersecurity.

Cyberspace Solarium Commission (CSC)

Cyberspace Solarium Commission (CSC)

The Cyberspace Solarium Commission was established to develop a consensus on a strategic approach to defending the United States in cyberspace against cyber attacks of significant consequences.

Casque SNR

Casque SNR

CASQUE SNR is the next generation of Identity Assurance that has potential to supersede existing solutions. It provides Identity Assurance for both people and things.

Ackcent Cybersecurity

Ackcent Cybersecurity

Ackcent's mission is to help our clients to protect their critical digital assets by providing them with a portfolio of specialised professional services.

Northcross Group (NCG)

Northcross Group (NCG)

NCG provides services to help organizations meet the challenges of regulatory compliance. Our services include support, consultation, tools and accelerators for all parts of an organization.

Sharktech

Sharktech

Sharktech designs, develops, and supports advanced DDoS protection and web technologies.

HB-Technologies

HB-Technologies

HB-Technologies is pioneer in Africa, in digital security, embedded electronic and IT solutions based on highly secure smart cards that comply with international standards and norms.

Rolls-Royce Cybersecurity Technology Research Network

Rolls-Royce Cybersecurity Technology Research Network

Rolls-Royce has partnered with Purdue University and Carnegie Mellon University to create the Rolls-Royce Cybersecurity Technology Research Network.

Feroot Security

Feroot Security

Feroot Security secures client-side web applications so that businesses can deliver a flawless user experience to their customers. Our products help organizations protect their client-side surface.