Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityLogical SecuritySecurity Education & TrainingCybersecurity News

Who’s driving ransomware’s accelerated growth in 2025

By Nick Oram
Computer

Boicu Andrei via Unsplash

April 2, 2025

Ransomware reports in 2025 are on par to exceed last year’s numbers, with more than 500 global incidents taking place in the month of January alone. In total, 2024 saw 5,461 attacks, 15% more than 2023. While a number of factors can be attributed to ransomware’s continued growth, the role of the initial access broker or IAB, should not be understated, nor ignored.

An IAB is a threat actor who specializes in acquiring internal access to organizations and selling unauthorized access on the dark web. They play a critical role in allowing for a wider range of threat actors to engage in high-risk cyber threats like ransomware attacks, by launching the initial leg work of infiltrating the compromised organization. In lowering this barrier to entry, threat actors can not only increase the volume of their attacks but the speed at which they can deliver them. The following is a look into IAB tactics, relations with ransomware groups and services offered. 

Exploitation of vulnerabilities 

IABs can gain access to internal systems through well-known attack vectors like phishing, social engineering, credential leakage, stealer logs, utilizing brute forcing software and more. They are skilled at exploiting known vulnerabilities in software and systems to gain initial access, often using automated tools to scan for and identify vulnerable systems. Commonly exploited vulnerabilities include those in Remote Desktop Protocol (RDP), Virtual Private Networks (VPNs), web shells, and various remote access software. 

IABs are also skilled with exploiting zero-day vulnerabilities to gain access to compromised systems. The exploitation of zero-day vulnerabilities makes it challenging to defend against IABs, as these vulnerabilities are exploited before they are public knowledge.

The image below advertises a software tool that could be used by IABs called VPN Brute, advertised on the Exploit forum. This tool is designed to brute force login credentials for various VPN services and corporate networks. The example below is just one of many tools that IABs could utilize. 


Screenshot


Interactions with ransomware organizations

The threat of a ransomware attack continues to be a major concern for organizations as they can result in heavy financial and data loss. Increasingly, IABs have become intertwined with ransomware groups, giving operators the opportunity to focus on the deployment of their malware, improving its effectiveness, and completing the extortion attempt. In turn, IABs do the initial leg work of choosing targets and determining the most effective way to gain access to internal systems. At their core, IABs provide ransomware groups with the ability to scale and allow for more rapid execution of attacks. 

Below is an example of a threat actor selling access to a large holding company on the XSS forum. The IAB has not listed the name of the organization they have gained access to but has indicated what is included with the access. Typically, the price for access will depend on the size of the target and the method in which they have gained access to these systems. Sometimes IABs will post the name of the compromised organization, but information is often heavily sanitized to not alert the compromised organization. 


Screenshot


Lowering the skill level and ransomware-as-a-service (RaaS) 

IAB services are directly responsible for empowering less tech-savvy actors to carry out attacks that they otherwise may have lacked the skill set to do so. Additionally, leaked builders of ransomware on the dark web allow for novices to deploy ransomware without the necessary technological skill sets that would normally be needed. The two combined mean the only real barrier to entry for a ransomware attack is if the threat actor lacks the necessary funds for IAB services. 

The example below is a listing for a potential Conti ransomware builder on Dark Forums. The user has left instructions on how to use the builder as well as a download link. 


Screenshot


In addition to ransomware builders that are posted on dark web forums, the Ransomware-as-a-Service (RaaS) model lowers the barrier for the less tech savvy threat actor. Groups like Cicada3301 and others offer affiliate programs that will allow threat actors to use their technology for a one-time fee and for a commission on the total payout amount if the ransomware attack is successful. 


Screenshot


Affiliates of Cicada3301 have the ability to do the following outlined below. These bullet points were posted by the actor group on the RAMP forum.

  • The entire web resource is accessible via Tor
  • Chat companies: The possibility of communication is carried out by us or you, specified when creating a company
  • Chat support: Communication with support
  • SubAffiliate: An account for your partners with read-only access to chats
  • Builder: Build a locker according to your configurations
  • Landing: Generating a key that provides private access to the chat
  • Ability to set up a landing page for a company indicating only the data leak (without a lock)
  • Private keys from companies are not stored on our servers
  • Possibility of editing the note
  • Calling companies
  • File storage for storing leak

It is also very likely that many IABs work directly for ransomware groups and as a result, are not publicly posting their compromises on dark web forums. This creates multiple benefits for both groups. For IABs, not posting on dark web forums of their compromises may help them stay off the radar from law enforcement, especially if the dark web sources they post to are eventually seized. On the ransomware and RaaS side, having an IAB who is directly working for that group is going to allow for expediting of attacks for both ransomware groups and their affiliates. This kind of arrangement will allow for increased scaling of ransomware organizations’ operating efforts. 

Stealer logs & infostealer marketplaces

Navigating dark web markets for internal logins can take a tremendous amount of time, and IABs take on this role for ransomware groups. Credentials and devices that have been compromised by stealer malware variants are available for purchase on various marketplaces such as the Russian Marketplace and Exodus and are relatively cheap. On these example marketplaces, threat actors are looking specifically for compromised devices where they can see a possible internal login were compromised. By using the login information purchased, IABs can find access to internal corporate systems, then in turn advertising this internal access for sale on dark web forums. 

IABs will also look to dark web forums for stealer log credential leaks. It is common to see threads like the image below on many dark web forums where users are posting large files of credentials that have been captured by stealer malware. Similar to investigating marketplaces like Russian Market, IABs on forums are looking for highly valuable internal logins within the stealer log files. 


 Screenshot


Protecting against IABs

IABs will continue to be a threat in the cybersecurity landscape as their services allow ransomware groups and lone threat actors to increase the scale and speed of their operations. In addition, IABs are lowering the barrier of entry for less tech savvy criminals by allowing them access to compromised internal systems for an agreed upon sum.

The practices outlined below will help your organization protect against IABs and the growing threat of ransomware. 

  • Make sure that your organization deploys proper phishing education for their employees. Instituting phishing training modules and having simulated phishing campaigns will help protect your organization from IABs as phishing is a primary tactic used to gain access to your systems.
  • Organizations should make sure their IT departments release patches and update systems regularly. IABs are excellent at infiltrating internal systems. 
    • IABs are adept at using zero-day vulnerabilities as a vector of compromise. If potential zero days are identified, make sure they are addressed as soon as possible. In addition, keeping an eye out on your third-party vendors and if they were exposed to a zero-day vulnerability is important to monitor as well. 
  • Commonly exploited vulnerabilities by IABs include those in Remote Desktop Protocol (RDP), Virtual Private Networks (VPNs), web shells, and remote access software from various cyber vendors. Make sure that these sources are secure and have monitoring in place of potential unauthorized access by an IAB.
  • Make sure that your organization has strong password policies as well as using MFA. 
  • Have a dark web monitoring solution to look for mentions on marketplaces and forums. IABs are very active in posting on these sources, so monitoring these areas is important. 
    • Monitor the dark web on infostealer marketplaces as well as monitoring for credentials that have been captured by infostealer malware. IABs will be looking for internal logins and trying to manipulate that data so they can infiltrate internal systems.
KEYWORDS: initial access brokers (IABs) ransomware threat landscape

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Nick oram headshot

Nick Oram is Senior Manager - Domain & Dark Web Monitoring Services at Fortra. Image courtesy of Oram 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • McAfee Labs Forecasts Growth in Mobile Ransomware and Security-Aware Attacks in 2014

    See More
  • ransomware

    COVID-19 pandemic sparks 72% ransomware growth, mobile vulnerabilities grow 50%

    See More
  • Business people around computers

    Unstructured data growth increases risk of ransomware and data breaches

    See More

Related Products

See More Products
  • 150952519X.jpg

    Intelligence in An Insecure World, 3rd Edition

  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • Physical Layer Security in Wireless Communications

See More Products

Events

View AllSubmit An Event
  • April 23, 2025

    Employee Perceptions of Workplace Safety in 2025

    ON DEMAND: Workplace safety continues to be a critical concern in 2025, with employees across industries expressing growing concerns about their safety at work.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing