The demand for hacking tools and malware is greater than the current supply

A 34-page report published by Positive Technologies reveals a high demand for malware creation on the dark web: Three times greater than the current supply. The report is based on 25 Russian and English-based dark web sites with around 3 million registered individuals to reveal the most-popular malware in use today, the cost of attack services, and more.

“Such utilities are becoming increasingly available as a result of partner programs, malware leasing, and as-a-service distribution models,” the firm states. “This trend is not only causing a rise in the number of cyber-incidents, but seriously hindering investigative efforts to properly attribute attacks.”

What is the dark web? Of all the internet pages available on the web, only four percent are indexed in search engines. The remaining “hidden” pages fall into the “deep web” consisting of private forums, databases and other resources both legal and illegal. It’s this illegal portion that falls under the dark web banner: A place you should never, ever visit without full protection.

On the dark web you’ll find the “shadow market,” a place where illegal products and services are sold. Most of what you’ll find on this market can be split into four categories: Malware (ransomware, miners), Exploits (known, zero-day), Data (credit cards, banking), and Access (user credentials).

demand for malware greater than current supply chart

Currently, the most widely used malware is the cryptominer, which seizes PCs and mines digital coins for hackers. In second place are hacking utilities followed by botnet malware, Remote Access Trojans, and ransomware. The remaining 55 percent deals with creation and distribution.

On the pricing front, the most expensive “service” can cost more than $4,500 for attacking an organization, depending on the difficulty. Malware designed for attacking ATM machines has a starting cost of $1,500 while compromising a website to gain full control can cost a mere $150. But that’s just a sample: Any type of attack is possible if you have the funds, such as a DDoS attack for around $50 per day.

demand for malware greater than current supply service pricing
The average cost of malware in dollars.

According to the report, the most requested hack-for-hire request is finding vulnerabilities followed by accessing email accounts. Social network account and email hacks are at the top of the commonly offered services list, as these attacks are supposedly the easiest to perform.

The report also notes the prison time you’ll receive for hacks and attacks. For instance, hacking the accounts of U.S. government officials will land you a five-year prison sentence while conducting a DDoS attack requires a minimum of one year in prison. If you want a long-term stay, managing a shadow service will place you behind bars for 35 years.

Positive Technologies ultimately points out that the fight against cybercriminals is only getting harder. Just in the first quarter of 2018 alone, the number of hacker-related incidents was up 32 percent versus the same quarter in 2017. The fact that the demand for new hacking tools is greater than the current supply is alarming enough.

A good way to protect yourself is to routinely change passwords, use two-factor authentication, biometrics, and/or use physical USB-based security keys.

Emerging Tech

Awesome Tech You Can’t Buy Yet: Robo sidekicks, AC for your bed, and more

Check out our roundup of the best new crowdfunding projects and product announcements that hit the Web this week. You can't buy this stuff yet, but it sure is fun to gawk!
Computing

The Andromeda botnet still lingers as nations struggle to clean infected PCs

A report by Fortinet suggests that although the FBI and Europe ended the Andromeda botnet’s reign in late 2017, there are still infected PCs. Cleaning up these PCs isn’t progressing at the same pace across various regions.
Smart Home

White-hat Chinese hackers turn Alexa into a spy, briefly

A team of Chinese researchers revealed this week that they were able to use a cracked Amazon Echo to exploit a series of Alexa interface flaws to take control over an unteuched Echo running on the same network.
Computing

Just when you thought spam was dead, it’s back and worse than ever

Spam emails might seem like an outdated way to spread malware, but in 2018 they are proving to be the most effective attack vector thanks to new techniques and tricks.
Photography

8 easy ways for you to transfer photos from an Android phone to a PC

If you haven't already, you should back up your photos to a computer. Here's how to transfer photos from an Android phone to a PC using third-party services and a wealth of storage devices.
Computing

Windows 10 can split and resize windows with ease. Here's how to do it

Windows 10 is a great desktop operating system, and its many window management features are part of the reason why. Here's how to divvy up windows using Snap Assist and other native tools.
Photography

A turn for the better: Loupedeck+ adds custom dials, more to Lightroom console

The Loupedeck+ improves on the original Lightroom console by adding welcome customization options and introducing support for Skylum Aurora HDR. What's even better is that it does this all at an even lower price.
Computing

Apple AR glasses will launch in 2020, says respected industry analyst

Apple AR glasses may be closer to reality than we thought. Here is everything we know so far about the augmented reality system, including the rumored specifications of Apple's Project Mirrorshades.
Social Media

How to use Adobe Spark Post to spice up your social media images

Images are proven to get more likes than plain text -- but only if those images are good. Adobe Spark post is an AI-powered design program for non-designers. Here's how to use it to take your social media feeds to the next level.
Mobile

Google One subscriptions offer more cloud storage for low prices, other perks

Can't get enough storage on Google Drive, Photos, or Gmail? Google One is the new way to boost your cloud storage. But it's not just about more space -- Google One comes with a loads of benefits.
Computing

Intel serves up ‘Bean Canyon’ NUCs revved with ‘Coffee Lake’ CPUs

Looking for a super-compact PC for streaming media that doesn’t break the bank? Intel updated its NUC family with its new “Bean Canyon” kits. Currently, there are five with a starting price of $300 packing eighth-generation Intel Core…
Deals

Save hundreds with the best MacBook deals for August 2018

If you’re in the market for a new Apple laptop, let us make your work a little easier: We hunted down the best up-to-date MacBook deals available online right now from various retailers.
Computing

Lost without 'Print Screen'? Here's how to take a screenshot on a Chromebook

Chrome OS has a number of built-in screenshot options, and can also be used with Chrome screenshot extensions for added flexibility. You have a lot of options, but learning how to take a screenshot on a Chromebook is easy.
Computing

Gaming on a laptop has never been better. These are your best options

Gaming desktops are powerful, but they tie you down to your desk. For those of us who prefer a more mobile experience, here are the best gaming laptops on the market, ranging from budget machines to maxed-out, wallet-emptying PCs.