<figure><img alt="" class="img-responsive" src="/wp-content/uploads/2025/10/BreakingBad_800_400.jpg?ver=2bEWIIgzJWCClxYkxKH2Fg%3d%3d" style="margin: 1px;" title="" />
<figcaption>
<p>Cybercrime is almost risk-free, far from laws&#39; reach, profitable and easy. Not like Breaking Bad.</p>

<h4><strong><font color="#333333"><span style="caret-color: rgb(51, 51, 51);">Cyber Crime is easy to get started in!</span></font></strong></h4>

<p>For as little as $5 an hour, cyber gangs rent cybercrime services online, sending cheap emails to an ancient list. They require very few resources, cash or education to rip people off and destroy businesses and livelihoods.&nbsp; Here&#39;s a few ways in which criminals use the Dark Web to attack businesses:&nbsp;</p>

<ul>
<li>The Black Market</li>
<li>Data breaches</li>
<li>Access to vulnerable networks</li>
<li>DDoS attacks</li>
<li>Insider Threats</li>
</ul>

<p>High-end thugs who engage in top-end cybercrime prefer&nbsp;phishing, ransomware, and personalised spear/whale phishing attacks. Some countries even regard this as Entrepreneurial.</p>

<h4><strong>The Black Market</strong></h4>

<p>The Dark Web is an Aladdin&#39;s cave&nbsp;for&nbsp;illegal goods and services, including hacking tools, stolen data, malware and ransomware. Cybercriminals can buy and sell these items anonymously and securely.</p>

<blockquote>
<p>If you spend more on coffee than on IT security, they will hack you.<br />
<span style="font-size:130%;"><b>Common Sense</b></span></p>
</blockquote>

<h4><strong>Data breaches</strong></h4>

<p>Information such as the 100 million names, emails, passwords, and phone numbers (credentials) stolen by Yevgeniy Nikulin in his LinkedIn, Dropbox, and WordPress heist of 2012 is now available on the dark web for next to nothing. Eventually convicted in California, Nikulin&nbsp;served&nbsp;just 36 months of his 88-month term in jail. He made so much money Moscow police asked him to stop posting wealth porn on Instagram and warned him not to leave Russia.</p>

<figure><img alt="cybercrime, what is data breaching, awareness training , cybersecurity" class="img-responsive" src="/wp-content/uploads/2025/10/Nikulin_lambo_800_400px.jpg?ver=gDxMYUmJgzgC1121ey4jrA%3d%3d" style="margin: auto;" title="cybercrime, what is data breaching, awareness training , cybersecurity" />
<figcaption>Stole 100 million records from LinkedIn, WordPress &amp; Dropbox data in 2012. Spent 36 months in US jail.</figcaption>
</figure>

<h4><strong>Breaking open system</strong></h4>

<p>The Dark Web hosts dozens of hacking forums where cybercriminals share tips, techniques and tools. Hackers commonly pool resources, finance, skills, and knowledge to arrange high-yield heists. Just like in normal life, you have the clients and all the providers who supply all the different expertise.</p>

<h4><font color="#333333">Client CEO True Story, April 2023</font></h4>

<p>One of our client&#39;s CEOs was hacked on his mobile phone&nbsp;using a Wi-Fi booster at an airport.&nbsp;He was immediately recognised as a high-value target (via a high-speed LinkedIn lookup bot ). A CEO of a Government body. Using his password credentials, they started sending out thousands of emails within 30 minutes using his work email address.&nbsp; &nbsp;</p>

<ol>
<li>&nbsp;Used a low-end coffee&nbsp;shop Wi-Fi.</li>
<li>&nbsp;They lifted data from Router.&nbsp;</li>
<li>&nbsp;Immediately identified High-Value target</li>
<li>&nbsp;His office email address &amp; password identified<br />
5. Gang&nbsp;started sending out 1000s of emails from his office account</li>
</ol>

<h4>&nbsp;</h4>

<h4><strong>DDoS attacks</strong></h4>

<p>Criminals regularly hire hackers to launch DDoS attacks on businesses. It is easier to arrange a denial of service attack than hire a car. Select your preferences, pay the contractor, attack businesses, and bring down websites.&nbsp;</p>

<h4><strong>Insider threats – your own staff!</strong></h4>

<p>Your own employees may be your biggest problem, distressed, in debt, depressed and turn over credentials, personal information, passwords and access to Bank accounts.</p>

<figure><img alt="internet crime, interpol, nikulin, linkedin, dropbox, hacking, malware, " class="img-responsive" src="/wp-content/uploads/2025/10/Insta_Nikulin_Mercedes.jpg?ver=KAYCGQhaNug0xlreMKb7TA%3d%3d" style="border-width: 1px; border-style: solid;" title="internet crime, interpol, nikulin, linkedin, dropbox, hacking, malware, " />
<figcaption>Russian cops told&nbsp;Nikulin don&#39;t leave Russia. He was InterPols&#39; No.1 most wanted.&nbsp;&nbsp;</figcaption>
</figure>

<section class="call-to-action with-borders button-centered mb-xl">
<div class="call-to-action-content">
<h3><font color="#333333"><strong>Let&#39;s tackle&nbsp;your organisation&#39;s security awareness &amp; readiness</strong></font>!</h3>

<p><strong>Get </strong>in touch for a <strong>Demo, Trial, Quote&nbsp;</strong>from us!</p>
</div>

<div class="call-to-action-btn"><strong><a class="btn btn-lg btn-default" href="https://calendly.com/besecureonline" target="_blank">Book a 20-minute chat with us!</a></strong></div>
</section>

<h4><br />
<strong>What makes it easier?</strong></h4>

<p>What makes cybercrime easier is that most people believe it does not exist, that they will never be the victim, that it will always be someone else, never them. Most people admit to knowing someone hit by cybercrime.</p>

<p>Here&#39;s a fact: good cybercrime prevention, awareness training, and cyber security will discourage criminals from hitting you and quickly move onto an easier mark.</p>

<h4><strong>Conclusion</strong></h4>

<p>The single greatest step towards cybersecurity any organisation can take is to train its employees in better habits. Get ready for the long haul, remember drink-driving campaign took 30 years. <strong><a href="https://calendly.com/besecureonline"><span style="color:#3333ff;">Book a 30 min chat</span></a></strong></p>

<section class="section section-default section-with-divider">
<div class="divider divider-solid divider-style-4"><em class="fas fa-chevron-down"></em></div>

<div class="container">
<div class="row">
<div class="col-md-12">
<h4 class="mb-none"><br />
<strong><span style="font-size:130%;">Articles of interest</span></strong></h4>

<p class="mb-none">Articles, links and connections from the BeSecureOnline site&nbsp;you might find interesting</p>
</div>
</div>
</div>
</section>

<ol class="list list-ordened list-ordened-style-3">
<li>Even IT pros don&#39;t know where to start.&nbsp;<a href="https://besecureonline.co.uk/Blog/entryid/379/many-it-pros-dont-know-where-to-start-when-dealing-with-security-awareness-program-for-an-organisations-it-defence"><strong><span style="color:#3333ff;">Start here</span><font color="#3333ff">!</font></strong></a>&nbsp;</li>
<li>Learn more here about Inboxguard&nbsp;- <a href="https://besecureonline.co.uk/wp-content/uploads/2025/10/InboxGuard%20-%20BeSecure%20Online.pdf?ver=0zpkvC5OGH7qwoaI0DABbQ%3d%3d&amp;timestamp=1678709803429"><strong><span style="color:#3333ff;">Data Sheet</span></strong></a></li>
<li>8 good reasons to use a <strong><a href="https://besecureonline.co.uk/Blog/entryid/352/8-benefits-to-using-password-management-software"><span style="color:#3333ff;">proper password manager</span></a></strong></li>
<li>Phishing kills!&nbsp;<strong><a href="https://besecureonline.co.uk/Blog/entryid/39/protecting-yourself-from-phishing-scams-what-to-look-out-for"><span style="color:#3333ff;">How Phishing Works!</span></a></strong></li>
<li>German Insurer Allianz says&nbsp; – <strong><a href="https://besecureonline.co.uk/Blog/entryid/81/allianz-the-german-insurer-says-cyber-threat-it-failure-is-a-bigger-threat-than-fire-theft-flood"><span style="color:#3333ff;">Businesses fear a catastrophic IT failure the most</span></a></strong></li>
<li><a href="https://besecureonline.co.uk/Blog/entryid/100/essential-cyber-security-guide-for-small-business"><strong><span style="color:#3333ff;">Cybersecurity Essentials&nbsp;for Business</span></strong></a></li>
</ol>

<div class="AW-Form-2060394137">&nbsp;</div>
<script type="text/javascript">(function(d, s, id) {
var js, fjs = d.getElementsByTagName(s)[0];
if (d.getElementById(id)) return;
js = d.createElement(s); js.id = id;
js.src = "//forms.aweber.com/form/37/2060394137.js";
fjs.parentNode.insertBefore(js, fjs);
}(document, "script", "aweber-wjs-xhnfxfxkr"));
</script></figcaption>
</figure>
<style type="text/css">
</style>
<style type="text/css">
</style>
<style type="text/css">
</style>