How adversaries purchase existing footholds on target networks through Initial Access Brokers, dark web marketplaces, and cybercrime partnerships, bypassing the hardest part of an attack entirely.
MITRE ATT&CK • Enterprise • T1650
Initial Access Brokers are a key component of the cybercrime ecosystem, offering hassle-free building blocks for ransomware operators who lack the skills or patience to compromise networks themselves. They have shifted from niche forum actors to central wholesalers in the ransomware supply chain.
42% increase in credential listings (Fortinet 2025)IABs sell enterprise network access across a dramatic price spectrum. Low-level web shell access can cost as little as $500, while privileged access to Fortune 500 financial institutions commands $50,000 or more. Pricing depends on sector, privilege level, and detection status.
Premium pricing for high-value targetsThe FBI's Internet Crime Complaint Center received over 859,000 complaints in 2024, with total losses exceeding $16 billion. North America alone accounts for approximately 47% of all ransomware attacks globally, making acquired access a persistent and growing threat.
47% of ransomware targets North AmericaAccording to ENISA's Threat Landscape 2025 report, vulnerability exploitation remains the cornerstone of initial access at 21.3%, with widespread campaigns rapidly weaponizing them within days of public disclosure. These exploits often become the access that IABs later sell.
21.3% of initial access via vuln exploitationCISA issued an advisory in 2022 detailing how the Karakurt Data Extortion Group acquired network access through brokers to conduct data theft and extortion campaigns. This group purchased VPN and RDP credentials from IABs to bypass initial access challenges entirely.
CISA Advisory AA22-283AIn March 2026, researchers uncovered "ALP-001," a Tor-based data leak site directly linked to an active Initial Access Broker. This discovery highlights that IABs are not only selling access but also actively leaking stolen data to demonstrate access quality to potential buyers.
Rapid7: IABs shifted to high-value targetsT1650 is a MITRE ATT&CK technique under the Initial Access tactic (TA0001). It describes how adversaries purchase or otherwise acquire existing access to a target system or network through online services and Initial Access Broker (IAB) networks, rather than developing their own initial access capabilities. This includes purchasing access to planted backdoors, web shells, valid accounts, or access through remote services.
Marcus Webb isn't your typical hacker. He doesn't write exploits, conduct phishing campaigns, or scan for vulnerabilities. Marcus is a ransomware operator, and his job starts only after someone else has already done the hard work of getting inside a network.
On a Tuesday evening, Marcus connects to a Tor-based marketplace through his encrypted VPN. He logs in with his established username and scrolls through the latest listings from verified Initial Access Brokers. He's looking for a specific type of target: a mid-sized manufacturing company in the American Midwest, preferably one with limited security monitoring.
After 20 minutes of browsing, he finds it: a listing from a trusted vendor called "ShadowVendor" for MidWest Manufacturing Corp. The listing describes VPN credentials with domain admin privileges, access to 200+ endpoints, and critically, no Endpoint Detection and Response (EDR) solution deployed. The price? $4,000 in Monero (XMR).
Marcus initiates the purchase through the marketplace's escrow system. Within 45 minutes, the cryptocurrency transaction is confirmed, and he receives the credentials via encrypted message. The original access was obtained months ago by a separate threat actor who exploited an unpatched Fortinet VPN vulnerability (CVE-2024-21762) and maintained persistent access, waiting for the right buyer.
That night, Marcus deploys ransomware across 200 endpoints. By morning, MidWest Manufacturing's entire production floor is locked down. The company negotiates for three days before paying a $2.5 million ransom. The total cost to Marcus? $4,000 plus a few hours of work. The ROI is staggering: a 62,400% return on investment.
Understanding the attacker's process is essential for building effective defenses. Below is the typical lifecycle of how adversaries leverage purchased access, and how defenders can interrupt each stage.
Adversaries define their target based on sector, size, revenue, and security posture. They determine the level of access needed (VPN, RDP, domain admin, web shell) based on their intended secondary objectives.
Adversaries connect to dark web marketplaces, Telegram channels, and underground forums where IABs advertise compromised network access. They evaluate vendor reputation and marketplace trust scores.
Adversaries review listings based on privilege level (standard user vs. domain admin), detection status (EDR present or absent), sector, number of endpoints, and included access (VPN, RDP, email, backups).
The purchase is completed using cryptocurrency (Bitcoin, Monero) through marketplace escrow systems. The transaction is designed to be untraceable, with the adversary receiving credentials via encrypted messaging.
After receiving credentials, the adversary tests connectivity, verifies privilege levels, and maps the network environment. They confirm the access is still active and undetected before proceeding to secondary operations.
The adversary ensures they maintain access even if the purchased credentials are rotated. They create backdoor accounts, deploy remote access tools, and escalate privileges to domain admin or equivalent levels.
With validated access and established persistence, the adversary executes their primary mission: deploying ransomware, exfiltrating sensitive data for extortion, conducting lateral movement to additional systems, or enabling supply chain compromise of partner organizations.
How attackers leverage IAB networks to minimize effort and maximize ROI
How defenders detect purchased access and prevent credential monetization
Detecting IAB-acquired access requires hunting for behavioral anomalies that distinguish a purchased credential session from legitimate user activity. Below are key indicators and hunting hypotheses.
A user account logs in from a geographic location that is implausible given the previous login. For example, a login from Eastern Europe within 2 hours of a login from the US Midwest strongly suggests credential use by a different party.
HIGH SEVERITYDomain admin or service accounts being used outside of normal business hours, weekends, or holidays. IAB purchasers often operate during off-hours to reduce detection likelihood. Monitor for privileged sessions initiated between 10 PM and 6 AM.
HIGH SEVERITYA user account establishing a VPN or RDP connection from a device that has never been seen before in the organization. IAB purchasers typically use their own infrastructure to connect, which will not match known device fingerprints.
HIGH SEVERITYAn account that has been inactive for weeks or months suddenly connects and begins accessing sensitive systems. This is a strong indicator that the account's credentials have been sold on an IAB marketplace and the new owner is testing access.
MEDIUM SEVERITYUser accounts accessing systems, shares, or databases they have never touched before. For example, a marketing account suddenly accessing domain controllers or backup servers. This reconnaissance behavior follows credential acquisition.
MEDIUM SEVERITYProactively search dark web marketplaces, paste sites, and Telegram channels for your organization's domain, email patterns, and known usernames. Tools like SpyCloud, Have I Been Pwned, and Recorded Future can automate this detection.
PROACTIVE HUNTING// Detect logins from new countries for privileged accounts
index=auth src_user=* role="Domain Admin" | stats dc(country) as countries by src_user | where countries > 1
// Detect VPN connections from previously unseen IP ranges
index=vpn action=login | stats values(client_ip) as known_ips by user | join user [search index=vpn action=login earliest=-24h | stats values(client_ip) as new_ips by user] | where NOT match(new_ips, known_ips)
// Detect dormant accounts that suddenly become active
index=auth action=login | stats last_login, latest(_time) as recent_login by user | where recent_login - last_login > 2592000
// Detect off-hours privileged access (10 PM - 6 AM)
index=auth role="Domain Admin" date_hour >= 22 OR date_hour < 6 | stats count by user, src_ip
The most dangerous aspect of T1650 is that by the time you detect purchased access being used against your organization, the breach has already begun. Initial Access Brokers have likely been selling your compromised credentials for weeks or months before an adversary decides to buy them and take action. Proactive monitoring is no longer optional, it's essential.
Questions to consider for your organization:
Have you encountered IAB-acquired access in your environment? What detection strategies worked best for your team? Share your experiences and questions about credential monitoring, dark web intelligence, or zero-trust implementations. The fight against Initial Access Brokers requires collective knowledge and collaboration across the security community.
Key Takeaway: The threat of T1650 is not that adversaries can break in, it's that they can buy in. Every unmonitored credential, every unpatched VPN, and every account without MFA is a product waiting to be listed on a dark web marketplace. Defend your access as fiercely as you would defend your front door.
Every contribution moves us closer to our goal: making world-class cybersecurity education accessible to ALL.
Choose the amount of donation by yourself.