Stay updated with the latest Cybersecurity News on our TecnetBlog.

Cybercrime’s Hidden Market: Access for Sale, Not Malware

Written by Adriana Aguilar | Jan 20, 2026 1:00:00 PM

When you think of a cyberattack, you might picture a hacker breaking into a company, bypassing defenses, and launching malware. But today’s reality is far more fragmented and professionalized. In many cases, the attack doesn’t start with ransomware or espionage—it starts with someone who already did the groundwork: gaining access and selling it.

That’s exactly what came to light in the case of Feras Khalil Ahmad Albashiti, a Jordanian national who pleaded guilty in the U.S. for acting as an initial access broker, selling access to the networks of at least 50 companies. This case helps shed light on how the real cybercrime ecosystem works—and why these actors are so dangerous to organizations of any size.

 

Who Is Albashiti and What Did He Do?

 

Feras Khalil Ahmad Albashiti, 40, also known in underground forums as r1z, Feras Bashiti, or Firas Bashiti, was extradited from Georgia to the U.S. in July 2024 after an international investigation.

In January 2026, he pleaded guilty to fraud involving access credentials. Sentencing is set for May, with potential penalties of:

 

  1. Up to 10 years in prison
  1. Fines up to $250,000, or more depending on damage caused or profit gained

 

His critical mistake? Selling valid access directly to an undercover law enforcement agent in exchange for cryptocurrency in May 2023. That transaction exposed his identity and linked him to multiple aliases across malware forums.

 

The Critical Role of the Initial Access Broker (IAB)

 

To understand the significance of this case, you need to grasp the concept of an Initial Access Broker. These aren’t the hackers deploying ransomware or stealing data—they specialize in gaining and reselling access to corporate environments.

That access may include:

 

  1. VPN credentials

  2. RDP logins

  3. Admin accounts

  4. Misconfigured systems

  5. Pre-installed backdoors

 

Once inside, the broker often does nothing further. Instead, they document the access, assess its value based on company size, industry, or region, and sell it to the highest bidder.

 

Learn more: INTERPOL Deals a Major Blow to Global Cybercrime

 

A Profitable Business Model

 

From a cybercriminal perspective, it’s a win-win setup:

 

  1. Lower risk for the seller

  2. Faster execution for the buyer

  3. Specialization: one actor gets in, another carries out the attack

 

Ransomware groups, for instance, can skip the recon phase by purchasing ready-made access and jumping straight to encryption and extortion.

In Albashiti’s case, access to at least 50 companies was confirmed—likely just the tip of the iceberg.

 

Cybercrime as a Supply Chain

 

This case proves an uncomfortable truth: cybercrime operates like a supply chain, with distinct roles:

 

  1. Some steal credentials

  2. Others validate them

  3. Brokers sell access

  4. Another group deploys malware

 

This means even if you block malware, you may still be vulnerable to someone entering with legitimate credentials sold in underground markets.

 

Not an Isolated Case

 

Albashiti’s case isn’t unique. Other examples include:

 

  1. A Russian national pleading guilty to selling access for ransomware affiliates

  2. Microsoft warning about Storm-0249, a broker using legitimate tools to prepare ransomware attacks

 

Pattern: access first, damage later.

 

Why This Should Deeply Concern You

 

If you manage IT, security, or leadership, this hits close to home:

 

  1. The access sold is valid

  2. Firewalls may detect nothing unusual

  3. Attackers walk through the front door with correct credentials

 

Worse still, the same access can be resold to multiple bad actors.

 

The Mistaken Belief: "That Won’t Happen to Us"

 

Many businesses assume they’re too small or irrelevant to be a target. But for brokers, what matters is:

 

  1. Access works

  2. The company can pay

  3. Privilege escalation is possible

 

That means SMBs, suppliers, and regional firms are very much on the radar.

At TecnetOne, we routinely see companies where:

 

  1. Credentials aren’t rotated

  2. Remote access is poorly segmented

  3. Suspicious logins go undetected

 

Perfect conditions for an access broker.

 

How Are These Accesses Acquired?

 

Typical methods include:

 

  1. Spear phishing

  2. Reused leaked passwords

  3. Exposed internet services

  4. Weak VPN/RDP setups

  5. Silent malware stealing credentials

 

Many of these don’t trigger alerts and remain active for months before being sold.

 

Similar titles: The FBI Warns: Restarting Your Phone Is No Longer Enough to Stay Safe

 

How to Avoid Becoming a Commodity

 

There’s no silver bullet, but best practices include:

 

  1. Tight control over remote access
  1. True multi-factor authentication
  1. Monitor unusual legitimate access

  2. Network segmentation

  3. Regular credential reviews

 

And most importantly: treat access as the new security perimeter. Because today, a username and password are often all an attacker needs.

 

One Key Lesson from the Albashiti Case

 

The biggest takeaway? Cybercrime isn’t random—it’s industrialized. There are roles, markets, and specialization. As long as people are buying access, someone will keep selling it.

Your job is to make sure you’re not the next item up for sale.

 

Conclusion: The Attack Starts Before You Notice

 

Albashiti’s case is more than a criminal sentence—it’s a sign of a structural shift in cybercrime: access is now a commodity.

At TecnetOne, we emphasize one key truth: If you don’t control who gets in, nothing else matters.

Modern security begins long before ransomware shows up—

It begins with controlling access. And today, access is the most valuable currency in cybercrime.