Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsManagementPhysicalCyber Tactics ColumnSecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & TrainingFire & Life SafetyPhysical Security

Cyber Tactics

New year, new threat: Rise of the enterprise-sized initial access broker

By John McClurg
: Rise of the Enterprise-Sized Initial Access Broker
cyber tactics
: Rise of the Enterprise-Sized Initial Access Broker
cyber tactics
January 7, 2022

The new year is often a time for change and arrives ladened with various prognostications. Be they personal, professional or corporate — every new year brings with it the promise of evolution. Although much of the new year will be a repeat of what we failed to learn and remember from the past, there will be that which presents itself as novel.

For my first column of 2022, I wanted to shine a light on one such novel and evolving way in which the cybercriminal business model will present itself: an increasing utilization of large Initial Access Brokers.

Back in November, the BlackBerry Research and Intelligence team identified an unusual connection between the actions of three distinct threat groups: MountLocker, Phobos and StrongPity. The discovery was intriguing given not how similar these actors are, but how, in fact, they differ.

Mountlocker's ransomware is targeted at geographically diverse enterprise-sized companies, and the outfit often scales its attacks through niche verticals, with the healthcare and life sciences sectors being the two most recent targets. At the same time, StrongPity provides sophisticated advanced persistent threat or APT-level attacks generally used in espionage bids, with the most recent activity being seen in Turkey. Perhaps the most unexpected of the three is Phobos and its ransomware, which targets small organizations en masse and is listed by the U.S. Treasury as one of the most prevalent in the U.S.

These threat groups don’t share similar targets, and StrongPity doesn’t even share the same intrusion tactic. So how was it that these three dramatically different criminal organizations were exposed as connected?

The disparate motives of the three groups led the research team to examine not what connects them, but who. In the wake of that shift in focus, our team uncovered a new threat actor — Zebra2104 — who has been acting as an Initial Access Broker (IAB) for other criminal organizations.

Generally, an IAB will perform the first aggressive step in the chain of an attack. They will gain access into a victim’s network through exploitation, phishing or other means. Once they have established a reliable entry point into the victim’s network, the IAB will disclose this means of access in underground forums on the dark web, advertising their accomplishments in hopes of finding a buyer. The price for access can range from as little as $25 up to thousands of dollars. Typically, the bigger a compromised organization — or the bigger the organization’s partners — the higher the fee. After a sale, the winning bidder will deploy their malware of choice — anything from ransomware to information-stealing malware and everything in between.

The three threat actors mentioned target victims that range widely in geography, industry and size. In order to have gained such access to this spectrum of victims, the team concluded that Zebra2104 must have either a sizable workforce or have successfully sabotaged diverse forums on the Internet.

In either case, Zebra2104 reflects a scale of IAB not commonly seen.

The notion that Zebra2104 may be the cyber underground equivalent of a ‘Fortune 500’ company, providing services to other notable ‘businesses,’ is as unsettling as it is plausible. This provides new insight into the current cybercrime landscape, showing how it continues to evolve and present new challenges to the security community.

Perhaps the most significant takeaway from the research is that threat actors are connecting and sharing tools in ways that are both more menacing and cost effective. They are forming new partnerships and optimizing their resources to better meet their nefarious ends. This bolsters the calls for us as a security community to augment the manner in which we coordinate, share and work together in our 2022 fight against the rising tide of cybercrime.

This means more than simply building the best cybersecurity and resiliency policies into your own business. It means continuously tracking, documenting and sharing intelligence across our community so we can all stay one step ahead. As the cybercriminal community increases its connectivity, we as security professionals must do so as well.

KEYWORDS: cyber security information security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

John mcclurg

John McClurg served as Sr. Vice President, CISO and Ambassador-At-Large in BlackBerry's/Cylance’s Office of Security & Trust. McClurg previously was CSO at Dell; Vice President of Global Security at Honeywell International, Lucent Technologies/Bell Laboratories; and in the U.S. Intelligence Community, as a twice-decorated member of the Federal Bureau of Investigation.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Cyber tactics

    2023: The year for contextual cyber threat intelligence

    See More
  • cyber-theft-freepik1170x658.jpg

    Initial access brokers: The new face of organized cybercrime

    See More
  • cyber security

    Reflections on 35 years in the trenches

    See More

Related Products

See More Products
  • High-Rise Security and Fire Life Safety, 3rd edition

  • 9780815378068.jpg.jpg

    Biometrics, Crime and Security

  • threat and detection.jpg

    Surveillance and Threat Detection

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing