Threat actors operate like businesses. They build, buy, and sell malware with the same playbook legitimate companies use.
Modern cybercrime isn’t usually a lone hacker in a basement; it’s an ecosystem. Roles are specialized, workflows are standardized, and money flows through repeatable “business” models. That’s why attacks feel more frequent, more polished, and more scalable than ever.
A simplified view of how criminal groups collaborate:
- “R&D” and tooling.
- Malware developers build and maintain toolkits (ransomware, loaders, info-stealers).
- They sell access through subscriptions, “as-a-service” offerings, or one-off builds in underground markets.
- Initial access specialists.
- Some actors focus only on getting into networks: phishing, credential stuffing, exploiting unpatched systems, or buying leaked credentials.
- They don’t always monetize themselves; instead, they sell that initial foothold to others who will carry out the main attack.
- Infrastructure and logistics.
- Separate operators provide bulletproof hosting, VPNs, proxy services, and C2 infrastructure.
- This makes takedowns harder because taking down “one group” doesn’t necessarily remove their infrastructure.
- Monetization and laundering.
- Others specialize in cashing out: handling cryptocurrency wallets, mixing funds, converting to fiat, or using money mules.
- They often run “customer support” for victims in ransomware situations, negotiating payments and providing decryption keys.
On top of that, these groups:
- Form temporary alliances for big campaigns, sharing revenue in pre-agreed splits.
- Reuse each other’s services: a phishing group may rent ransomware, while a ransomware group may buy stolen credentials.
- Adjust strategy based on law enforcement pressure and global events, similar to how legitimate businesses react to regulation and market shifts.
For defenders and analysts, this business-like structure changes how you think about risk:
- Blocking one IP or one malware family is like blocking a single vendor, not the whole supply chain.
- Disrupting the ecosystem (payment channels, hosting, marketplaces) can have broader impact than focusing only on individual campaigns.
- Intelligence on how these groups cooperate can inform better controls: for example, hardening initial access pathways, monitoring for common monetization patterns, or building stronger processes around incident response and ransom decisions.
Understanding the “business” behind the attack helps security teams prioritize not just what to block today, but which parts of the criminal economy to pressure over time.