Strengthening cyber security in the age of the dark web

Dark Web

In their role as trusted advisors, channel partners are well-positioned to educate customers on new and emerging threats. One such threat is the theft of data, a much sought-after currency in today's digital world. Whether it's sensitive company data, employee records or customers' personally identifiable information (PII), all data has a value to cyber criminals.

A recent rise in data theft has been fuelled, in no small part, by the dark web, a dingy corner of the internet where stolen data can be bought and sold freely. But the dark web today does more than provide a trading post for data thieves; it actively enables cyber attacks by offering a variety of custom-built malware, network access tools and corporate espionage services to hackers.

Recent academic research shows the dark web has become a haven for custom-made, targeted malware, with threats tailored to specific industries or organisations outnumbering off-the-shelf varieties two to one. The enterprise, moreover, is directly in the firing line, with four in ten vendors selling targeted hacking services aimed at FTSE 100 and Fortune 500 businesses, with a 20% rise in the number of dark web listings with a direct potential to harm the enterprise since 2016.

The study discovered that access to corporate networks is sold openly - 60% of vendors approached by researchers offered access to more than ten business networks each. These include banking and finance, healthcare, ecommerce and education, as well as corporate networks. The methods for providing access vary - some involve stolen remote access credentials for sale for less than the price of a newspaper, while others involve backdoor access or the use of malware.

The relatively low cost and availability of these services mean that it's never been easier for hackers to launch a successful attack on an organisation. And, as we know, the fallout of a data breach can be devastating, causing untold financial and reputational damage. According to the Ponemon Institute, the average cost of a data breach in 2018 now exceeds $3.8 million. This, however, can also be seen as an opportunity for channel partners to help address the threats and differentiate themselves from other providers.

With such sophisticated and complex malware now easily available to hackers, it's vitally important that security-focused channel partners extend the conversation beyond the boundaries of traditional detection-based solutions, such as endpoint detection and response (EDR) and antivirus (AV), which can actually struggle to identify new threats.

In many instances, the kind of custom malware now available to cyber criminals will be unknown to conventional security systems and given a free pass to sail through undetected by the target network. Instead, channel partners need to help organisations adopt a layered security strategy that includes application isolation capabilities to contain threats. These capabilities can also generate in-depth threat telemetry that can be shared across security platforms to stop cybercriminals from obtaining persistent footholds in corporate networks.

Latest in Security
Cybersecurity concept image symbolizing third-party data breaches with give padlock symbols and one pictured in red, signifying a security breach.
These five countries recorded the most third-party data breaches last year
Phishing concept image showing an email symbol with fishing hook.
Have I Been Pwned owner Troy Hunt’s mailing list compromised in phishing attack
23andMe logo and branding pictured on a sign outside the company headquarters in Sunnyvale, California.
Millions of 23andMe users’ genetic data could be up for grabs – and experts worry it’s a looming privacy nightmare
Malware Detected Warning Screen with abstract binary code 3d digital concept
Fake file converter tools are on the rise – here’s what you need to know
Oracle logo pictured on the front of the company headquarters in Redwood City, California.
Oracle breach claims spark war of words with security researchers
Cybersecurity concept image showing digitized padlock with data points flowing out from behind.
Security experts warn of ‘contradictory confidence’ over critical infrastructure threats
Latest in Feature
Matt Clifford speaking at Treasury Connect conference in 2023
Who is Matt Clifford?
Open source vulnerabilities concept image showing HTML code on a computer screen.
Open source risks threaten all business users – it’s clear we must get a better understanding of open source software
An abstract CGI image of a large green cuboid being broken in half with yellow, orange, and red cubes to represent ransomware resilience and data encryption.
Building ransomware resilience to avoid paying out
The words "How effective are AI agents?" set against a dark blue background bearing the silhouettes of flowchart rectangles and diamonds to represent the computation and decisions made by AI agents. The words "AI agents" are yellow, while the others are white. The ITPro Podcast logo is in the bottom right-hand corner.
How effective are AI agents?
An illustration showing a mouth with speech bubbles and question marks and a stylized robot alien representing an AI assistant chirping away with symbols and ticks, to represent user annoyance with AI assistants.
On-device AI assistants are meant to be helpful – why do I find them so annoying?
A range of HP devices set on pedestals on the keynote stage at HP Amplify 2025 in Nashville, with a large screen in the background bearing the HP logo against a white background. The devices include AI PCs, laptops, and printers.
HP hones its edge AI ambitions at Amplify 2025