Wednesday, April 23, 2025
Homecyber securityOver 26,000 Dark Web Discussions Focused on Hacking Financial Organizations

Over 26,000 Dark Web Discussions Focused on Hacking Financial Organizations

Published on

SIEM as a Service

Follow Us on Google News

Radware’s comprehensive research into the cybersecurity landscape has uncovered significant trends shaping the financial services industry’s vulnerabilities in 2024.

The analysis, conducted across 46 deep-web hacker forums, identified over 26,000 threat actors’ discussions that revealed increasingly sophisticated cyberattack methods.

The study highlights the adoption of advanced tools and strategies by cybercriminals, underscoring the urgent need for financial institutions to reinforce their defenses against a rapidly evolving threat landscape.

- Advertisement - Google News

Underground Infostealer Economy Thrives

One major finding is the rise of the “infostealer economy,” which underscores the growing sophistication of cybercriminal marketplaces.

Radware’s research revealed that deep-web forums frequently discussed information-stealing malware, with an average of 3-4 daily mentions of “infostealer-as-a-service” offerings.

These malware services are tailored for different market segments, ranging from individual threat actors to Advanced Persistent Threat (APT) groups.

Infostealer developers emphasize compatibility with other hacking tools and modularity in their offerings.

Many products come with plug-ins and enhanced user interfaces designed to cater to individual hackers with low-price plans and full technical support.

For APT groups, specialized features such as capabilities to compromise corporate Outlook accounts are being marketed.

One noteworthy example, Mystic Stealer, demonstrates the ability to target email credentials, which could pave the way for ransomware attacks using stolen enterprise credentials.

Financial Organizations
Mystic Stealer Ads

Credential-as-a-Service Platforms Expand

Another alarming trend is the growth of credential-as-a-service (CaaS) platforms, which operate through subscription models to distribute freshly breached credentials.

These services are becoming increasingly sophisticated, evident in the shift away from traditional text-based lists to more advanced distribution methods.

Radware’s analysis found that Combo Cloud, one such platform, experienced a 46% increase in mentions between 2022 and 2024.

The service provides credentials sorted by industry and geographic location, offering cybercriminals streamlined access to targeted financial accounts.

This evolution in credential marketplaces signals a growing risk to financial institutions as attackers gain access to increasingly tailored tools for breaching protected systems.

The emergence of One-Time Password (OTP) bot services represents a new frontier in social engineering attacks.

Operated primarily through Telegram, these bots automate the theft of two-factor authentication (2FA) codes, making the process scalable.

Attackers first gather a list of potential targets through credential stuffing and subsequently use OTP bots to impersonate legitimate entities like banks or customer service representatives.

Victims are lured into sharing 2FA codes under the guise of fraud alerts or account verification, enabling cybercriminals to gain full control of accounts by locking out legitimate users.

Radware’s research identified 38 distinct OTP bot services available on the dark web, ranging from $10 to $50 per attack.

Financial Organizations
OTP bot operated via Telegram

Mentions of these services increased by 31% over the past year, with 1,354 references recorded during the study period.

Distributed Denial-of-Service (DDoS) attacks have also become more accessible and potent, fueled by advancements in AI technology.

The DDoS-as-a-service ecosystem has expanded, with 34 tools available to over 196,000 followers.

For as little as $50, attackers can now generate traffic of up to 35,000 requests per second directly from mobile devices.

Radware documented the debut of “Stressed Cat,” a new DDoS tool incorporating AI-driven captcha-solving capabilities.

Unlike traditional DDoS methods that attempt to bypass captchas, AI-enabled tools can actively solve them, increasing attack efficiency and circumventing captcha-reliant defense mechanisms.

This innovation marks a significant escalation in the capabilities of DDoS attacks, making them harder to detect and mitigate.

Radware’s findings highlight the decentralization of cybercrime, with clear separations between attack developers and executors.

This fragmentation complicates attribution and hampers law enforcement efforts.

For financial organizations, the stakes are higher than ever, as cybercriminals continue to refine their tactics and develop highly specialized tools to breach security measures.

The report emphasizes the need for cybersecurity professionals to shift from reactive approaches to proactive strategies that leverage external threat intelligence.

By understanding the dynamics of dark web forums and emerging cybercrime trends, organizations can better anticipate threats and implement defenses that address the evolving tactics of adversaries in the cyberspace.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Hackers Exploit NFC Technology to Steal Money from ATMs and POS Terminals

In a disturbing trend, cybercriminals, predominantly from Chinese underground networks, are exploiting Near Field...

Threat Actors Leverage TAG-124 Infrastructure to Deliver Malicious Payloads

In a concerning trend for cybersecurity, multiple threat actors, including ransomware groups and state-sponsored...

Ransomware Actors Ramp Up Attacks Organizations with Emerging Extortion Trends

Unit 42’s 2025 Global Incident Response Report, ransomware actors are intensifying their cyberattacks, with...

New SMS Phishing Attack Weaponizes Google AMP Links to Evade Detection

Group-IB’s High-Tech Crime Trends Report 2025 reveals a sharp 22% surge in phishing websites,...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Exploit NFC Technology to Steal Money from ATMs and POS Terminals

In a disturbing trend, cybercriminals, predominantly from Chinese underground networks, are exploiting Near Field...

Threat Actors Leverage TAG-124 Infrastructure to Deliver Malicious Payloads

In a concerning trend for cybersecurity, multiple threat actors, including ransomware groups and state-sponsored...

Ransomware Actors Ramp Up Attacks Organizations with Emerging Extortion Trends

Unit 42’s 2025 Global Incident Response Report, ransomware actors are intensifying their cyberattacks, with...