MITRE ATT&CK states: "This technique cannot be easily mitigated with preventive controls since it is based on the ability of adversaries to purchase information that can be used during targeting." Understanding this threat landscape is essential for every security professional.
The commercialization of cyber threats has created a mature, professionalized marketplace where adversaries can purchase everything from stolen credentials and code signing certificates to zero-day exploits and persistent network access. This lowers the barrier to entry for cybercrime and nation-state operations alike.
According to threat intelligence reports, the MOVEit Transfer zero-day exploited by the Cl0p ransomware group in 2023 compromised over 2,500 organizations worldwide. Similarly, LockBit has leveraged purchased exploits and access to establish one of the most prolific ransomware operations in history. These groups don't always discover their own vulnerabilities, they buy them.
Initial Access Brokers (IABs) have emerged as a specialized role in this ecosystem, operating as middlemen who compromise networks and then sell access to ransomware operators and advanced persistent threat (APT) groups. The average price for corporate network access has risen steadily, with healthcare and financial sector access commanding premium rates.
When an adversary can simply purchase a valid code signing certificate or a set of enterprise VPN credentials, traditional perimeter defenses become significantly less effective. The purchased data often appears completely legitimate, bypassing email filters, endpoint detection, and even code integrity checks.
This technique is particularly dangerous because it's externally sourced, the data exists outside your organization and can be acquired without ever touching your network directly. By the time defenders detect the use of purchased data, the attacker may already have established persistence or exfiltrated sensitive information.
"This technique cannot be easily mitigated with preventive controls since it is based on the ability of adversaries to purchase information that can be used during targeting. Consider applying enhanced monitoring and threat intelligence feeds to detect when your organization's data appears on illicit marketplaces."
Adversaries may purchase technical information about victims that can be used during targeting. This includes credentials, certificates, zero-day exploits, network access, proprietary schematics, source code, and other technical intelligence obtained from dark web marketplaces, data brokers, or underground forums.
Imagine a criminal buying a master key to an office building from a corrupt locksmith. They didn't pick the lock themselves, they simply paid someone who already had it. Now they can walk through the front door anytime, and security cameras won't flag them because the key is legitimate. That's exactly what happens when attackers buy credentials or certificates on the dark web.
| Term | Definition | Real-World Example |
|---|---|---|
| Initial Access Broker (IAB) | A threat actor who specializes in compromising networks and selling access to other criminals | A broker sells VPN credentials to a healthcare network for $2,700 in Bitcoin |
| Zero-Day Exploit | A vulnerability unknown to the software vendor with no available patch | The MOVEit Transfer SQL injection flaw exploited by Cl0p in 2023 |
| Code Signing Certificate | A digital certificate that verifies the authenticity of software, making it appear trusted | Stolen EV certificate used to sign malware that bypasses antivirus |
| Data Broker (Illicit) | An entity that aggregates and sells stolen or leaked data, often on the dark web | Breach forums selling bulk credential dumps from major data breaches |
| Escrow Service | A third-party holding payment until transaction terms are verified, common on dark markets | Bitcoin held in escrow until the buyer confirms the zero-day works |
| Exploit Kit | A pre-packaged toolkit containing multiple exploits targeting common software vulnerabilities | RIG or RattleExploit kit sold for use in drive-by download attacks |
| Botnet Access | Control over a network of compromised devices used for DDoS, spam, or proxy operations | Rental of a 10,000-device botnet for $500/day |
| Dropzone | A server used to collect stolen data from compromised victims | A bulletproof-hosted server collecting exfiltrated credit card data |
Think of it like a black market arms bazaar. Nation-states, criminal gangs, and even lone wolves can walk in with cryptocurrency and walk out with weapons of digital destruction. They don't need to be skilled hackers, they just need money. The zero-day brokers are the arms dealers, the IABs are the scouts who find targets, and the ransomware operators are the end users pulling the trigger.
SCENARIO, Based on composite real-world incidents
Alex is the CISO of NovaTech Solutions, a mid-sized technology company with 2,400 employees across eight offices. NovaTech develops enterprise management software used by Fortune 500 companies, and their code signing certificate is the bedrock of customer trust, it proves that NovaTech's software updates are authentic and safe to install.
A junior developer named Ryan receives a convincing spear-phishing email disguised as a GitHub pull request notification. He clicks a malicious link, and within minutes, an attacker deploys a credential harvester on his workstation. The attacker now has Ryan's corporate credentials, VPN token, and access to NovaTech's internal code repository.
Using Ryan's credentials, the attacker moves laterally through NovaTech's network over 72 hours. They discover the code signing certificate stored on a build server and exfiltrate the private key along with associated documentation. The attacker then packages everything, certificate, private key, signing tools, and internal documentation, into an encrypted archive and lists it on a prominent dark web marketplace for 2.1 BTC.
A ransomware group operating under the name ShadowLock purchases the certificate for 1.8 BTC after the price is negotiated. The transaction is completed through an escrow service. Within hours, ShadowLock begins using the certificate to sign their ransomware payloads, making them appear as legitimate NovaTech software updates.
Signed with a trusted NovaTech certificate, the ransomware passes through antivirus scans, email gateway filters, and application whitelisting at three of NovaTech's major customers. By the time Alex arrives at work on Friday morning, 12 organizations have been encrypted, and NovaTech's reputation is in freefall. Customer support lines are flooded, the stock drops 14%, and the board demands answers.
A threat intelligence feed alerts Alex's team that NovaTech's code signing certificate has been spotted signing malware in the wild. The SOC immediately revokes the certificate through the certificate authority, issues a security advisory to all customers, and begins forensic investigation. They identify the initial phishing vector and Ryan's compromised credentials.
NovaTech implements hardware security modules (HSMs) for all cryptographic keys, enforces phishing-resistant MFA across the organization, deploys 24/7 dark web monitoring, and revokes and reissues all code signing certificates. They also launch an employee security awareness program and invest in behavioral analytics to detect insider threats and compromised accounts faster.
| Cost Category | Impact |
|---|---|
| Certificate Revocation & Reissuance | $180,000 |
| Customer Incident Response Support | $420,000 |
| Legal Fees & Regulatory Fines | $1,200,000 |
| Brand Damage & Lost Revenue | $3,500,000 (est.) |
| Security Infrastructure Upgrades | $680,000 |
| Total Estimated Cost | ~$5.98 Million |
Since T1597.002 relies on external acquisition of data, defenders must focus on monitoring, detection, and rapid response rather than prevention alone.
Subscribe to threat intelligence services that continuously scan dark web marketplaces, paste sites, and breach forums for mentions of your organization's data.
Protect your code signing and SSL/TLS certificates with hardware-backed storage and strict access controls. Ensure rapid revocation capabilities.
Since purchased credentials are a primary attack vector, multi-factor authentication dramatically reduces their value to attackers.
Even if credentials are purchased and valid, their usage patterns will likely differ from the legitimate user's normal behavior.
Proactively check whether your organization's credentials have been compromised in breaches and are circulating on dark web marketplaces.
Understand which threat actors are active in purchasing and selling technical data relevant to your industry and region.
Have a documented, tested playbook for when your organization's data is discovered on a dark marketplace.
While attackers can purchase data, defenders have one key advantage: they control the infrastructure. By implementing phishing-resistant MFA, hardware-backed key storage, and comprehensive monitoring, defenders can render purchased data significantly less valuable. A stolen password is worthless if it also requires a hardware key that can't be bought on any marketplace.
From the adversary's perspective, purchasing technical data is an investment that saves time, reduces risk, and increases the probability of a successful operation.
Defenders must assume that some of their organization's data is already available for purchase and build detection and response capabilities accordingly.
Both sides recognize that the economics of cybercrime have fundamentally changed. Attackers no longer need elite technical skills to breach organizations, they need cryptocurrency and access to a marketplace. Defenders must adapt by building resilient systems where any single purchased data point (credential, certificate, or access) cannot compromise the entire organization. This is the essence of Zero Trust: "never trust, always verify."
Threat hunters proactively search for signs that purchased data is being used against their organization. Here are the key indicators they investigate, explained in plain language.
The Setup: Imagine you're a threat hunter at a large enterprise. An employee's credentials have been purchased on a dark marketplace and are now being used by an attacker. How would you detect this without the attacker knowing?
| Hunting Hypothesis | What to Look For | Why It Works |
|---|---|---|
| Impossible Travel | Same credentials used from New York and Moscow within 2 hours | A user can't physically be in two places at once, purchased creds are likely being shared or sold |
| Off-Hours Activity Spike | An HR employee's account accessing engineering file servers at 3 AM | Purchased credentials are often used by attackers in different time zones |
| New Device Fingerprint | Valid login from a device never seen before in the organization's asset inventory | The attacker is using their own machine, not the legitimate user's laptop |
| Anomalous Data Access | A marketing employee downloading source code repositories for the first time | Purchased credentials give access the attacker needs, not what the user normally does |
| Certificate Signing Anomaly | Code signing certificate used to sign binaries that don't match the organization's software catalog | Purchased certificates may be used to sign malware the legitimate organization never created |
| Failed MFA Bypass Attempts | Multiple failed authentication attempts with valid password but wrong MFA token | Attacker has the password but not the second factor, a sign of purchased credentials |
Think of it like a hotel security team noticing that a guest's keycard is being used to enter rooms on different floors at unusual hours. The keycard is valid (the purchased credential), but the behavior is wrong. Threat hunters don't look at the keycard, they look at the pattern of how it's being used. This behavioral analysis is what separates detection of purchased data from ordinary login activity.
A bank teller doesn't just check that your ID is valid. They notice if the same person who always deposits checks on Tuesdays suddenly tries to wire $50,000 to an overseas account on a Sunday at midnight. The ID might be real (purchased), but the behavior is the red flag. In cybersecurity, this is called User and Entity Behavior Analytics (UEBA), and it's one of the most effective ways to detect attackers using purchased data.
A threat hunter might write a query like:
// Find logins where the user's normal device
// does not match the current device, AND
// the login occurs outside business hours
WHERE user.device_fingerprint != user.known_devices
AND login_time NOT IN business_hours
AND mfa_method = "sms" // SMS is interceptable
This query would surface logins that match the behavioral profile of an attacker using purchased credentials, valid username/password but wrong device, wrong time, and weak MFA.
Have you encountered scenarios where purchased technical data was used in an attack? What detection strategies have worked for your organization? Share your insights, questions, and experiences below.
Discussion Prompts:
Disclaimer: This page is for educational purposes only. All marketplace simulations are CSS animations depicting hypothetical scenarios. No real malicious marketplaces, exploits, or stolen data are referenced or endorsed.
Every contribution moves us closer to our goal: making world-class cybersecurity education accessible to ALL.
Choose the amount of donation by yourself.