Cybercriminals Contemplate Exploit-as-a-Service Model

  /     /     /  
Publicated : 23/11/2024   Category : security


Cybercriminals Contemplate Exploit-as-a-Service Model


Researchers share their findings on the current zero-day market and how criminals strategies may shift in the future.



Cybercriminals strategies may expand to include an exploit-as-a-service business model, report researchers investigating how attackers continue to exploit organizations weaknesses.
The Digital Shadows Photon Research Team collected evidence from cybercriminal markets and forums to better understand how vulnerabilities are bought and sold. They report some high-profile criminal groups, such as ransomware gangs, have amassed enough funds to compete with traditional buyers of zero-days — an expensive and competitive market, researchers note.
Their investigation revealed criminals discussing ideas for an exploit-as-a-service model that would inevitably lower the barrier for accessing these sophisticated exploits, the team wrote in a blog post.
This model would allow capable threat actors to lease zero-day exploits to other cybercriminals to conduct their attacks, the report states. The benefit goes both ways: A developer can earn high profits when selling a zero-day exploit; however, it takes a lot of time to finalize a sale. This model would let developers generate even more earnings by renting out their exploits while waiting on a buyer.
Additionally, renting parties could test the proposed zero-day and later decide whether to purchase the exploit on an exclusive or non-exclusive basis, researchers noted.
Read more details
here
.

Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Cybercriminals Contemplate Exploit-as-a-Service Model