June 20, 2016 By Douglas Bonderud 2 min read

It’s a great time to be a cybercriminal, with preconfigured malware tools, ransomware kits and full-fledged bots all for sale on the Dark Web.

According to SC Magazine, the market is expanding, this time with access to more than 70,000 hacked servers. For just $6 a pop, would-be cybercriminals can get their hands on infected machines from a host of companies worldwide. Is this the start of a new malicious market vertical?

Supply and Demand for Hacked Servers

Cyber marketplaces have evolved over the last few years to full-service e-commerce ventures, many of which include top-notch customer service and guarantees about the authenticity of merchandise. Now, Kaspersky Lab has run across a relatively new venture named xDedic, which seemingly started up in 2014 and gained popularity last year.

As noted by Threatpost, this Dark Web market is selling both hacked servers and tools necessary to launch serious cyberattacks. For Kaspersky researcher Juan Andres Guerrero-Saade, just finding this many servers for sale was a surprise, but it’s also interesting to note that the entire operation is “meticulously” managed by a Russian-speaking cybercrime group. This organization facilitates the meetup of various cybercrime affiliates to sell whichever stolen goods are in the highest demand.

Right now, that demand seems to be trending toward servers: For just $6 apiece, would-be attackers can get access to servers from 173 countries and across industries such as banking, dating, gambling and online shopping. What’s more, Dark Web users can search for specific details such as system information, antivirus type or admin privileges.

The xDedic marketplace also offers tools to make hacking easier, such as a solution that alters RDP configurations to allow multiple sessions. The result? When a sysadmin logs in, attackers are simultaneously connected but hidden from view.

Market Forces

While xDedic has now passed 18 months of operation — which CEO Paul Kraus of Eastwind Networks told SC Magazine “usually signals a startup will succeed” — other security experts aren’t so sure of its longevity. Red Cell Infosec CEO Dominique Davis told the source the market is potentially the work of an intelligence community designed to entrap rather than empower attackers.

For the moment, the jury’s out on the origin and ultimate purpose of xDedic, but there’s no shortage of anecdotal evidence suggesting that hacked servers are helping drive market forces.

A recent Network World piece noted that Dark Web-enabled insider threats are becoming a real problem as disgruntled employees take to the internet’s underbelly looking for alternate employment with criminal groups. Employees are making themselves known to attackers and in turn are being sought out for larger and more lucrative jobs.

There’s also word from Ars Technica that the Democratic National Committee recently had its servers hacked by a lone wolf named Guccifer 2.0, who published hundreds of pages to prove the theft.

Servers are under threat both inside and out — and they’re grabbed easily enough that they go for less than the price of lunch. Whether a cybercriminal heaven or intelligence operation, xDedic represents a step forward for cybercrime: Servers available on demand in the dark for pennies on the dollar.

More from

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Communication platforms play a major role in data breach risks

4 min read - Every online activity or task brings at least some level of cybersecurity risk, but some have more risk than others. Kiteworks Sensitive Content Communications Report found that this is especially true when it comes to using communication tools.When it comes to cybersecurity, communicating means more than just talking to another person; it includes any activity where you are transferring data from one point online to another. Companies use a wide range of different types of tools to communicate, including email,…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today