REPORTS

The 2025 Access Brokers Report

August 12, 2025

Network access is the key to both private and organizational systems, and to the information stored upon them. Some of this information is of significant value, and so Initial Access Brokers (IABs) have taken up residence on dark web forums, selling network access to the highest bidders.

These forums, digital bazaars of an endless supply of compromised networks, place unauthorized access directly into the hands of those who most want it. Whether it’s a professional threat actor wanting to skip the early-stage hassle of mapping out an Initial Access Vector (IAV), or a newcomer lacking the technical skills to clear the first hurdle, a network of websites is on hand to give them what they need.

Brokers use a variety of tactics to gain a foothold into a network before going on to offer it up for sale. System vulnerabilities, phishing, social engineering, or malware may be used in order to obtain initial access. Pricing may be at least partially based around the time or complexity used to gain access. Lowhanging fruit is ideal for an IAB operation. Weak or absent multi-factor authentication (MFA), exposed and vulnerable devices, reused passwords — anything which means access is compromised so a broker can move on to their next target.

SHARE:
Price: FREE

About the Provider

Rapid7
We believe that cybersecurity should be simpler and more accessible. Trusted by more than 9,300 customers worldwide, our best-in-class technology and strategic expertise draws on the insights of industry-leading researchers and contributions from the global security community to empower security professionals. The world has changed–Rapid7 is helping protectors be ready for what comes next.

TOPICS

Access Brokers