The Cyber Criminal Underworld – Exploiting Network Access
Sell Access Threat actor
Gain Access Threat actor breaches the network and works on escalating their access to administrator privileges and putting a value on the access. Buyer’s Choice Buyer now has network access and can plan and execute their attack. Examples include: Ransomware attack, data exfiltration, espionage, malware deployment, and phishing attacks.
markets the sale of the access on deep
and dark web markets and forums.
Borrowed Time The buyer is now
conducting their attack and it is a matter of time until they are located and their access revoked.
This can take minutes, days, or even years.
21
Made with FlippingBook - Online catalogs