
Before a ransomware gang encrypts your servers, they almost certainly didn't break in themselves. They bought the door. Initial Access Brokers (IABs) are the dark web's most dangerous middlemen: specialists who breach corporate networks and auction off persistent access to the highest bidder. The ransomware operator buys the access, deploys the payload, and splits the ransom. IBM X-Force found IAB listings grew 140% year-over-year. Your company's network access may be for sale right now.
What Is an Initial Access Broker?
An Initial Access Broker is a specialist in the modern cybercrime ecosystem—someone whose sole job is to compromise a corporate network, establish persistent access, and then sell that access to other criminals. This represents a clear division of labor in organized cybercrime. Unlike traditional hackers who might attempt to monetize a breach themselves, IABs focus exclusively on the initial compromise phase and then hand off the keys to whoever pays the highest bid.
In the ransomware-as-a-service era, this model has become ruthlessly efficient. An IAB might have no interest in encryption, data theft, or extortion—they simply identify a valuable target, break in, leave backdoors, and list the access on dark web forums like XSS, Exploit.in, and RAMP. A ransomware operator (or RaaS affiliate) buys the access, deploys their malware suite, and profits. The IAB takes a cut without ever touching the ransom payment.
This division of labor has made both groups more dangerous. IABs can focus entirely on evasion and persistence. They don't need to worry about encryption speed or data exfiltration tools. They just need to get in and stay in—and stay undetected.
How IABs Obtain Corporate Network Access
IABs exploit the same vulnerabilities and human behaviors that security teams struggle against every day—but they do it at industrial scale.
VPN credential theft is one of the fastest routes to initial access. IABs harvest credentials from stealer logs (malware that extracts saved passwords and browser data), purchase phishing logs, and exploit unpatched VPN appliances. Fortinet FortiGate, Pulse Secure Connect, and Citrix NetScaler have all been favorite targets when zero-days or known CVEs remain unpatched.
RDP brute force remains brutally effective. An IAB will scan for exposed RDP ports, attempt millions of credential combinations, and maintain persistence via scheduled tasks and registry modifications.
Web shell installation is another vector: an unpatched WordPress plugin, Joomla vulnerability, or custom web application gets exploited, and a web shell gives the attacker interactive access. The web shell becomes the foothold for deeper reconnaissance.
Supply chain compromise is becoming more common. Instead of breaking into your network directly, an IAB compromises your managed service provider (MSP), contractor, or software vendor and uses that trusted relationship to gain entry.
Insider threats also play a role. Disgruntled employees, contractors with network access, or individuals compromised via spear phishing may sell their credentials directly to an IAB.
Once inside, IABs typically install remote access tools (Cobalt Strike, Brute Ratel, AnyDesk, TeamViewer) and maintain access for weeks or months before listing the network for sale.
How IABs Sell Corporate Access
The dark web marketplaces where IABs advertise operate much like eBay for stolen credentials and network access. Listings appear on forums, Telegram channels, and dedicated auction platforms. The format is consistent and professional.
A typical IAB listing includes:
- Company name or IP range (sometimes anonymized)
- Revenue range and employee count
- Industry (healthcare, finance, manufacturing are premium targets)
- Country (US and Western Europe command higher prices)
- Access type (standard user, domain admin, cloud admin, database access)
- Security controls present (Is EDR installed? Does the network use MFA?)
- Asking price
Pricing reflects the target's value. An RDP account on a small business might sell for $200. A domain admin account on a Fortune 500 company can fetch $50,000 to $150,000 or more. High-revenue companies in regulated industries (finance, healthcare, insurance) are premium targets and command premium prices.
IABs also distinguish between low-value "bins" (bulk lists of stolen credentials, often from low-value targets) and curated, high-value listings (verified access to a specific Fortune 500 network with known revenue and security posture).
The most sophisticated IABs even provide "proof of access"—screenshots of Domain Controller dashboards, Active Directory listings, or network diagrams—to prove the access is real and not a scam.
The IAB-to-Ransomware Pipeline
The relationship between IABs and ransomware operators is the linchpin of modern ransomware attacks.
An IAB lists network access on a dark web forum. A RaaS affiliate (ransomware-as-a-service partner) evaluates the listing. If the revenue, industry, and lack of security controls make it a good target, they purchase the access—typically via cryptocurrency.
Is your company exposed on the dark web right now?
Scan dark web forums, breach dumps, stealer logs & 50,000+ threat sources. Results in seconds, completely free.
The affiliate then takes over. They log in using the credentials or access method provided by the IAB. They deploy Cobalt Strike or Brute Ratel for command and control. They conduct reconnaissance, identify high-value systems, and move laterally toward domain controllers and backup systems.
Once positioned, they often exfiltrate sensitive data (preparing for double extortion), then deploy the ransomware payload. The entire timeline from purchase to encryption can be as fast as 24 hours.
The ransom is negotiated and paid (or not). Both the IAB and the RaaS operator profit. The IAB takes a flat fee or percentage cut. The ransomware operator takes a cut of the ransom payment and passes a percentage to their RaaS affiliate.
Detecting If Your Organization Is Being Brokered
This is where dark web monitoring becomes your strategic advantage. If your company's network access is listed by an IAB, you want to know before a ransomware operator buys it and deploys encryption.
DarkVault continuously monitors criminal forums, auction channels, Telegram groups, and paste sites for your company name, IP addresses, domain names, and employee credentials. We scan for listings that mention your industry, revenue range, or location.
Early detection of an active IAB listing gives you a critical window: days or weeks to close the compromised access before the ransomware buyer shows up. Our intelligence includes:
- The type of access being sold (RDP? VPN? Domain admin?)
- The asking price (indicates how seriously the market values your network)
- The IAB's asking price and timeline
- Indicators of whether the listing is genuine or a scam
Find out if your network is being sold right now—request a threat intelligence briefing and dark web scan for your organization.
Incident Response When You Find an IAB Listing for Your Company
If DarkVault detects an active IAB listing for your organization, the clock starts. Here's your immediate playbook:
- Trigger your incident response plan immediately. Treat this as a confirmed breach.
- Forensic investigation: Assume the compromised network access is real. Conduct urgent forensic analysis of all remote access points (VPN logs, RDP logs, SSH logs, privileged account logs).
- Credential rotation: Force password resets for all accounts that may have been compromised, especially domain admin and service accounts.
- Segmentation review: Isolate systems containing the most sensitive data. IABs typically don't exfiltrate everything—they focus on what's most valuable.
- Threat hunt: Search for indicators of persistence left behind by the IAB (scheduled tasks, registry modifications, web shells, backdoored accounts).
- Notify your cyber insurer and legal team immediately.
- Preserve evidence for law enforcement and potential prosecution.
- Ransom demand preparation: Assume a ransomware attack may follow. Prepare incident communications and legal response.
The goal is to revoke the IAB's access before the ransomware buyer has a chance to use it. Speed is critical.
How DarkVault Monitors for IAB Activity
Our threat intelligence platform performs continuous, automated monitoring of criminal forums, auction channels, Telegram groups, and paste sites. We scan in multiple languages and across 200+ criminal marketplaces and sources.
When we detect a potential IAB listing for your organization, our system immediately:
- Extracts the listing details (access type, asking price, company information)
- Verifies authenticity (filters out scams and false positives)
- Alerts your security team with a detailed threat intelligence report
- Tracks the listing over time (to see if it's purchased or removed)
Our SLA on critical alerts is 15 minutes from detection to notification. Analysts validate every alert to ensure you're not overwhelmed with false positives. Integration with SIEM and SOAR platforms means this intelligence flows directly into your security automation tools.
FAQ
Q: How do I know if my company is listed by an Initial Access Broker?
A: You likely won't discover it yourself—dark web forums are not indexed by Google, and finding IAB listings requires specialized tools, language skills, and access to underground marketplaces. This is why dark web monitoring is essential. DarkVault continuously monitors where IABs advertise and alerts you immediately if your organization appears.
Q: How quickly can attackers deploy ransomware after buying IAB access?
A: Very quickly. In some cases, ransomware has been deployed within 24 hours of an IAB selling access. More typical timelines are 48-72 hours, but the IAB's credentials give the attacker an immediate foothold. The faster you detect and revoke the access, the less time the attacker has to move laterally and prepare the ransomware payload.
Q: What should I do if DarkVault detects an IAB listing for my company?
A: Treat it as a confirmed breach and trigger your incident response plan immediately. Contact forensics, credential rotation teams, and your cyber insurer. Conduct urgent threat hunting to find how the IAB got in and what persistence they may have left behind. Revoke all potentially compromised credentials. The goal is to close the door before the ransomware buyer gets there.
Is your company exposed on the dark web right now?
Scan dark web forums, breach dumps, stealer logs & 50,000+ threat sources. Results in seconds, completely free.
Get Your Free Dark Web Exposure Report
Find exposed credentials, mentions, and risky chatter tied to your brand — fast.
- Email & domain exposure insights
- Threat actors & forums mentioning your brand
- Practical next steps to mitigate risk
No credit card required. Quick turnaround. Trusted by security teams worldwide.

Related Articles

Remote Work and Dark Web Exposure — Protecting Distributed Teams
Remote work tripled your attack surface. Learn how to detect credential theft on the dark web and protect distributed teams from VPN and email compromise.
Read more
PCI DSS and Dark Web Monitoring — What Merchants and Payment Processors Must Know
PCI DSS v4.0 makes dark web monitoring essential for payment security. Learn how threat intelligence addresses compliance requirements and protects cardholde...
Read more
What to Do When Your Company Data Appears on the Dark Web
You just received an alert: your company's data is on the dark web. Here's exactly what to do in the next 72 hours to contain the breach, meet regulatory dea...
Read more