A new threat intelligence report from the Abstract’s Threat Research Organization (ASTRO) will reveal that the cybercrime economy has industrialized network breaches with specialized criminals now selling pre-compromised access to corporate networks for as little as $500.
Abstract’s report, “Priced to Move: The Underground Markets of Modern Cyberattacks,” examines the rapidly growing ecosystem of Initial Access Brokers (IABs): attackers who break into organizations and then sell that access to ransomware gangs and other threat actors.
Key findings from the research include:
- Credential abuse is now the dominant entry point. 56% of incidents involved valid accounts without MFA.
- Ransomware attacks surged 47% year over year, fueled by the growth of this underground access market.
- Network access often sells for $500–$1,000, allowing attackers to target dozens of organizations simultaneously.
- Median time from initial compromise to ransomware deployment has dropped to just five days.
- Healthcare, government, and education are among the sectors seeing the fastest growth in IAB-driven attacks.
The economics are striking. The report details a healthcare breach where $2,200 worth of purchased access ultimately resulted in nearly $4 million in damage, a roughly 1,700x return on investment for attackers.
ASTRO says the rise of access brokers has fundamentally changed how cybercrime operates…turning network intrusions into a specialized supply chain where one group gains access, another sells it, and ransomware gangs monetize it.
You can read the research here:https://abstract.security/reports/priced-to-move
New Research Shows How Attackers Silently Disable AWS CloudTrail Without Triggering Alerts
Posted in Commentary with tags Abstract Security on March 31, 2026 by itnerdThe Abstract ASTRO research team has just published a blog entitled: How Attackers Disable CloudTrail Without Calling StopLogging or DeleteTrail.
Security teams rely heavily on AWS CloudTrail as a source of truth for detecting breaches, but new research shows attackers can quietly disable or degrade logging without ever touching the APIs most defenders monitor.
In a new technical deep dive, ASTRO uncovers how adversaries are bypassing traditional detections (like StopLogging or DeleteTrail) and instead using lesser-known AWS APIs to blind logging systems while keeping them appearing fully operational.
Key findings that may interest your readers:
The research also outlines detection strategies, including how to identify subtle parameter changes and—more importantly—how to correlate multiple low-signal events into high-confidence alerts, something most SIEMs struggle to do.
This has major implications for DFIR teams and cloud security programs: organizations may believe they have full visibility, while attackers are actively operating in blind spots.
You can read the blog entry here: https://www.abstract.security/blog/how-attackers-disable-cloudtrail-without-calling-stoplogging-or-deletetrail
Leave a comment »