top of page

How These Cybercrime Businesses Typically Operate

  • mike979706
  • Sep 7
  • 2 min read

Updated: 5 days ago

by: Michael M. Ralph | Cybersecurity, Legal Services


Here's a breakdown of how a typical cybercrime business operates, especially those behind large-scale attacks like ransomware, phishing, or data breaches. It mirrors a legitimate startup in many ways, but its product is crime.


1. Business Model Selection

Cybercriminals choose a model that generates profit:


Model Description

Ransomware-as-a-Service Sell or rent ransomware tools to affiliates. The creator gets a cut of ransom payments.

(RaaS)

Phishing-as-a-Service Provide phishing kits or spoofed sites for a fee.

(PhaaS)

Data Breach and Sale Steal data and sell on dark web markets.

Credential Stuffing Use leaked passwords to break into other accounts. (Huge Topic)

Cryptojacking Hijack devices to mine cryptocurrency.


2. Team Structure

Just like a legitimate company:


Role Function

Developers Build and update malware, phishing kits, exploits

Operations Manage infrastructure (servers, VPNs, botnets)

Social Engineers Craft emails, voice calls, or messages to manipulate targets

Sales/Support Communicate with victims (e.g., via ransomware chat portals)

Money Mules Launder the profits through crypto or shell accounts


3. Tool Development or Purchase


They either:

  • Build in-house malware or attack tools

  • Buy/rent from black markets (e.g., exploit kits, zero-day vulnerabilities, phishing templates)

  • Think of it like software licensing, but for crimeware.


4. Target Acquisition


Targets are selected through:

  • Reconnaissance (scanning for vulnerabilities or open ports)

  • Data mining (buying breached credentials or insider info)

  • Social engineering (LinkedIn profiling, email scraping, etc.)


They often go for:

  • Organizations with weak defenses

  • High-value targets (e.g., hospitals, municipalities) Large file content of pedigree information

  • Employees susceptible to phishing


5. Execution of the Attack


Once targets are picked, they launch:

  • Phishing campaigns to deliver malware or steal credentials

  • Exploit-based intrusions via vulnerabilities

  • Credential stuffing attacks from leaked databases

  • Drive-by downloads through malicious ads or fake sites


6. Monetization


How they profit:

  • Ransomware: Demand Bitcoin to unlock files

  • Data theft: Sell PII, credit cards, or trade secrets

  • Bank fraud: Transfer funds or commit identity theft

  • Crypto mining: Use infected machines for profit


They typically:

  • Use cryptocurrency to receive payments

  • Launder money through mixers, exchanges, or mules


7. Evade Detection


To stay operational:

  • Use bulletproof hosting (ISPs that ignore abuse complaints)

  • Routinely rotate infrastructure

  • Employ encryption and obfuscation in code

  • Keep a low profile when needed, avoiding unnecessary noise


8. Reinvest & Scale


Like any business, profits are reinvested:

  • Hire more talent (e.g., on dark web job boards)

  • Acquire better tools or stolen data

  • Increase campaign reach or automation

  • Improve customer support (some offer real-time ransomware support chats!)


Example: Ransomware-as-a-Service (RaaS)


A real-world example looks like this:

1. RaaS developer creates the ransomware code and infrastructure.

2. Affiliates sign up to distribute it (via phishing, exploits, etc.).

3. Victims get infected and see a ransom note.

4. The affiliate gets a share (e.g., 70%) of ransom payments; the RaaS operator gets the rest.

5. Everyone profits and reinvests into future attacks.


Their operating the same way that your marketing team conducts itself with your customers. They run campaigns, run their converstions, make the calls, and track the results.


Thank you for reading.

Recent Posts

See All

Comments


bottom of page