Threat Zone 2025: The Other Side
The research provides insights into underground resources and how they fuel cyber risks for organizations across Russia and other CIS countries
28 августа, 11:00
Что таит «Обратная сторона»?
Презентация исследования о теневых ресурсах «Threat Zone 2025: обратная сторона»
До начала:
About
BI.ZONE Threat Intelligence and BI.ZONE Digital Risk Protection present their joint research on underground resources to help companies identify and assess cyber threats.
Our experts have examined dozens of forums and Telegram channels, analyzing advertisements for widely used malware and vulnerability exploits. They have also identified booming sales of leaked databases and unauthorized access to Russian organizations.
This research outlines key underground market trends, offers real-world examples of threats, and provides the outlook for the dark web landscape. Our findings will allow organizations to stay one step ahead of potential attackers.
20%
of clusters targeting Russian companies use commercial malware
$10
starting price of hacked corporate accounts
Key takeaways
Early threat identification
Advertisement analysis helps to detect offers for access, leaked data, and signs of upcoming attacks before they occur
Understanding current threat landscape
Insights into underground resources reveal which systems and industries are most frequently targeted
Risk assessment
Awareness about the most sought-after data and access points enables more accurate risk assessment
Vulnerability management
Information about vulnerability exploits for sale helps security teams prioritize threat management within their infrastructures
Defense strategy development
Understanding underground market trends allows organizations to build long-term cybersecurity strategies tailored to real-world threats
Research overview
Our analysis covers advertisements across several categories, including:
Malware
Malware obfuscation
Vulnerability exploits
Access to organizations in Russia and other CIS countries
Data leak announcements
You might find interesting