Cybercriminals are Recruiting Your Employees
John Iacono • February 1, 2017

February 1, 2017

Today RedOwl researchers released a report titled “Monetizing the Insider: The Growing Symbiosis of Insiders and the Dark Web”. This report is two years in the making and its findings include information that is vital for all companies. Cybercriminals are recruiting your employees. Yes, the ones on your payroll.

Here are the highlights of the report:

  • The recruitment of insiders within the dark web is active and growing.
  • The dark web has created a market for employees to easily monetize their insider access.
  • Sophisticated threat actors use the dark web to find and engage insiders to help place malware behind an organization’s perimeter security

The best way to guard against this threat is first to acknowledge it exists. This is a relatively new threat as most employees were “blissfully ignorant” about the dark web. Now that this corner of the internet is common knowledge, more and more individuals are testing the waters. The second step is to understand the types of information being accessed and then monitor and manage accordingly. Cybercriminals are recruiting with the purpose of finding employees to “steal data, make illegal trades, or otherwise generate profit.”

How Cybercriminals Turn Employees Into Rogue Insiders

“Cybercriminals are ramping up efforts to recruit employees with access to corporate networks. The Dark Web, which promises anonymity to rogue insiders, is driving that trend.

Researchers from IntSights and RedOwl spent two years studying Dark Web forums on recruiting, and working with, insiders. Today they released their findings, in a report entitled “Monetizing the Insider: The Growing Symbiosis of Insiders and the Dark Web.”

In those two years, they saw about 1,000 references to insiders in cybercrime forums, with a spike occurring towards the end of 2016. Forum discussions and insider outreach nearly doubled between 2015 and 2016.

“Recruitment of insiders is increasing, and the use of the dark web is the current methodology that malicious actors are using to find insiders,” explains researcher Tim Condello, technical account manager and security researcher at RedOwl.

Cybercriminals recruit with the goal of finding insiders to steal data, make illegal trades, or otherwise generate profit. Advanced threat actors look for insiders to place malware within a business’ perimeter security. However, sophistication isn’t a requirement for success.

“Successful hacking is a mix of tech savviness and domain knowledge,” says Condello. “Hackers previously had to have a hybrid of both, or fully understand the domain they were attacking. Now, they can leverage an insider to provide domain expertise to have a successful attack.”

Think your business is safe? Think again. All insiders pose a risk, regardless of their seniority or technical ability, experts say. As major data breaches continue to make headlines, people are recognizing the tremendous impact leaked data can have on a business — and how they can profit from it.”

By John Iacono August 1, 2025
For growing businesses, IT challenges can be unpredictable. One moment everything is humming along; the next, there’s a server failure, a phishing attack or a sudden compliance audit on your doorstep. If you have internal IT staff, you may assume you’re fully prepared, but the reality is that internal IT teams often get stretched thin,... The post How an Outsourced MSP Can be the Missing Piece for Your Tech Needs appeared first on Fairdinkum.
By John Iacono July 23, 2025
Not to play on stereotypes, but Geoff Corbett, professional services manager, says he fits the “nerdy IT person” label. For the past 18 years – and really throughout his life – Geoff has propelled his love of gaming and technology into a career. And we’re grateful to have him at Fairdinkum! His wide knowledge of... The post Geoff Corbett: Professional Services Manager appeared first on Fairdinkum.
By John Iacono July 21, 2025
As more businesses shift toward cloud-first operations, moving your company’s file systems from on-premise servers to a cloud platform like Microsoft SharePoint might seem like an obvious next step. But this type of migration is not a simple “drag and drop.” It requires strategic planning, technical alignment and user preparation to ensure the transition improves... The post Strategic Steps for a Seamless Cloud File System Migration appeared first on Fairdinkum.
Show More →