
CrazyHunter Ransomware
CrazyHunter is a ransomware campaign targeting healthcare that weakens endpoint defenses and escalates privileges before encrypting systems at scale.

Cybercrime is a profitable business. But exactly how lucrative is it? According to one recent report, Americans lost $6.9 billion to online scams in 2021, up from $3.5 billion in 2019. And the average annual ‘salary’ of criminal hackers ranges from $50,000 to more than $2 million. Considering that a hacker’s operating overhead is almost nil and the chances of prosecution and conviction are low, it’s easy to see why this is an attractive business model for some.
But where and how is all this underground commerce transacted? Increasingly, it takes place in marketplaces - cyber underground marketplaces.
What are the marketplaces?
Underground marketplaces operate like legitimate online marketplaces, such as Etsy or Facebook Marketplace, where vendors advertise their products and prices. And underground marketplace vendors receive most of their revenue from selling products, with marketplace owners receiving commissions on all sales.
So, if you are a consumer of nefarious products, dozens of sites make it easy for you to buy or rent bots and botnets, stolen passwords or compromised login credentials, malware, stolen financial and healthcare data and hacking tools, etc. Researchers report the two of the most active bot marketplaces in 2021 were Russian Market and Genesis. Russian Market was also the place to find the largest selection of login credentials.
How threat actors use underground marketplaces to buy and sell ‘bots’
Underground marketplace sellers typically obtain their wares via data breaches. They often use information stealer malware, aka ‘infostealers,’ to collect data from infected systems. These can include usernames, passwords, payment card details, cryptocurrency wallets, etc. Infostealers work to covertly access applications where data is stored, often from a compromised internet browser, and transmit the data back to the criminal organization.
Underground marketplace customers place orders through the market’s website and get their orders fulfilled by sellers. Access to marketplaces differs from marketplace to marketplace. Some are accessed using the ‘surface web’. However, a number of underground marketplaces are only accessible through Tor or I2P, adding an extra layer of encryption, thus making browsing and transactions hard to trace. Marketplace customers set up accounts and add funds to their accounts, usually using cryptocurrency (Bitcoin and Monero being popular choices). Some marketplaces such as Genesis accept payment in USD. Once set up, users browse and buy, much like any other marketplace.
Underground marketplaces have led to numerous security incidents in the past year
Intel 471 has identified numerous security incidents linked to marketplaces. The following examples demonstrate the scope and breadth of these criminal sites and their operators:
The future of marketplaces
In the future, cyber underground marketplaces will likely continue to trade goods. Moreover, with surface web marketplaces such as Genesis continuing to operate in the clear and therefore increasing exposure, they will have a continuous stream of customers interested in purchasing nefarious goods. History has shown that when global and local economies are in retreat, individuals can make cash by both buying and selling compromised assets.
To remedy and mitigate underground marketplaces, law enforcement is required to reduce the stream of users accessing these websites on the clear web, leaving only those hosted on Tor or I2P accessible. That may be a big ask of authorities who tend to be under-resourced in this space and to truly curb underground commerce, a focused law enforcement effort is needed.

CrazyHunter is a ransomware campaign targeting healthcare that weakens endpoint defenses and escalates privileges before encrypting systems at scale.

DevMan Ransomware is a newly emerging ransomware operation observed in 2025 that has been assessed as a derivative of the DragonForce ransomware family.

Gootloader resurfaced with enhanced capabilities, building on the multi-stage loader malware first seen in 2020.
Stay informed with our weekly executive update, sending you the latest news and timely data on the threats, risks, and regulations affecting your organization.