!(https://hackernoon.com/hn-images/1*9wUbOybjTqVMiKPaAjYFCw.png)\n\nIllustration by [top10vpn.com](https://www.top10vpn.com)\n\nIt’s becoming easier than ever for wannabe cybercriminals to snag a share of the billions of dollars lost through fraud in the US each year.\n\nAll you need is some Bitcoin, some free software and no ethical objections to stealing from your fellow humans.\n\nMy latest research into dark web market pricing shows that powerful malware, readymade phishing pages and password crackers for popular brands, and an incredible array of other hacking tools are being sold on the dark markets for just a few dollars apiece.\n\nThese illicit items might be cheap and easy to buy anonymously but at least rookie fraudsters won’t have a clue about how to use them effectively and without getting caught, right? **Wrong**.\n\nTechnical know-how that was once the mark of years of experience and a badge of honor among the black-hat fraternity is now available as a series of step-by-step PDF guides for as little as 99¢.\n\n### The Research\n\nMy research team recently analyzed tens of thousands of listings across the five biggest dark web markets (Dream; Point; Wall Street Market; Berlusconi Market; and Empire) to create the latest update to our [Dark Web Market Price Index](https://www.top10vpn.com/privacy-central/cybersecurity/dark-web-market-price-index-hacking-tools-us-edition/) and it’s clear that this dark economy has democratized cybercrime by effectively removing all previous barriers of entry.\n\n!(https://hackernoon.com/hn-images/1*ijV6ru5_t9d-BGjfSimbsg.png)\n\nScreencap from Dream Market listing\n\nThese encrypted websites, which can only be reached using the [Tor browser](https://www.torproject.org/projects/torbrowser.html.en), allow criminals to anonymously sell hacking tools, along with all sorts of other contraband, such as illicit drugs, stolen info and weapons.\n\n### What We Found\n\n#### Malware\n\nSome of the most powerful items we found for sale on the markets were **remote access trojans** (RAT) with an average asking price of just $9.74.\n\nThis unpleasant strain of malware allows scammers to take full remote control of their victim’s computer. Not only can they log all keystrokes and access private files in order to commit identity theft and defraud the device owner, but it’s also disturbingly common for voyeurs to use these RATs for webcam spying.\n\nWe found listings for the notorious [Blackshades RAT](https://nakedsecurity.sophos.com/2015/06/25/blackshades-rat-co-author-sentenced-to-57-months-in-prison/) thought to have infected over half a million devices, which landed its creator in jail. This trojan also allows hackers to include infected computers in a botnet.\n\nWe also discovered RATs for use on the Android operating system, along with others written in Python and Visual Basic.\n\n#### Branded Phishing\n\nWith phishing by far the dominant cyberattack vector, it’s little surprise that enterprising hackers are selling readymade spoof pages for hundreds of popular brands, ranging from Apple and Netflix to Walmart and Dunkin’ Donuts by way of Minecraft and League of Legends.\n\nThese typically go for about $2 each — except for outlier **Apple**, which will set you back $5 on average, showing just how much of a target their customers are for identity thieves looking for “fullz”, or the full package of identifying information that enables identity theft.\n\nAnd the manual to tell you how to do it? Just $2.49.\n\n#### Password cracking\n\nA wannabe hacker doesn’t even need to bother to learn how to configure their password cracking tool to attack their target site.\n\nReadymade configuration files for an endless list of sites also proliferate on the dark web markets for $2 each. All you need is a tool like SNIPR or Sentry MBA and a handful of these files and you can get started.\n\nWe actually found a huge list posted online of valid **Spotify** logins harvested using these tools.\n\n#### Super-cheap hacking\n\nOther pocket-change hacking tools that we found included keyloggers ($2.07), WiFi hacking software ($3), Bluetooth hacking tools ($3.48) and malware for draining Bitcoin wallets ($6.07).\n\nWhat’s fascinating, if alarming, is a notable shift towards a **service model** in this dark economy. Competition is fierce and some of these cheaper tools are available on the clearnet (normal web), so vendors promise try to get an edge by offering customer support, lifetime guarantees and free guide resources to sweeten the deal. We’ve even seen money-off coupons offered on next purchases.\n\n#### End-to-end cybercrime solutions\n\nWannabe fraudsters with a bit more to spend can begin forging official documents by purchasing templates that are listed for less than $14 on average.\n\n!(https://hackernoon.com/hn-images/1*9qn8ntZ7PcZQugE1089djg.png)\n\nScreencap of fake passport scan template on Dream Market\n\nThese Photoshop files come with highly detailed guides on how to make fake ID scans look as convincing as possible. All the buyer has to do is insert the personal information into the templates, which cover the full range of official documents, from passports and driver’s licenses to utility bills and pay stubs.\n\nCombined with fullz procured through hacking tools bought elsewhere on the dark web markets, this is all that’s necessary to fraudulently apply for credit.\n\nThe dark web markets effectively offer an **end-to-end solution** for anyone wanting to learn how to commit identity theft and subsequent online fraud and then acquire the tools to carry it out.\n\nCase in point, you can even buy access to anonymous postal lockers should you want to make fraudulent purchases for resale or refund. Sure, it might set you back $150 but that’s a snip for a secure drop.\n\nOf course, there’s a choice of guides telling you all you need to know about stealthy use of the postal system ($3.35).\n\n### So what do we do about it?\n\nSo what does this mean? Well, we can’t put the genie back into the bottle. Two new marketplaces seem to spring up as soon as one is shut down. The lure of the [$16.8 billion reportedly lost to fraud in 2017](https://www.javelinstrategy.com/press-release/identity-fraud-hits-all-time-high-167-million-us-victims-2017-according-new-javelin) in the US alone is only going to get stronger as the pot gets bigger.\n\nAs consumers, we have to take protecting our personal data seriously. **Ignorance is no excuse**. Good password hygiene, two-factor authentication, limiting the personal and payment information we allow online, using privacy tools, all that good stuff.\n\n> We have to be more mindful of the priority apps and sites places on security and take our business elsewhere if we aren’t satisfied.\n\nAs developers, we have to prioritize **security over convenience** and enforce those standards on our users, whether they like it or not, ideally making that security a selling point for our products.\n\nAnd if that idealistic aim isn’t convincing enough, there’s now also the specter of GDPR, whose lower tier fines are up to €10 million or 2% of global turnover for failing to integrate data protection “by design and default” into services and products.\n\nCybersecurity — and digital privacy for that matter — must be baked in from the very start of every product development process.\n\nIf we can succeed making those values ingrained in our culture then these tools being sold so cheaply on the dark markets become all but worthless in the hands of anyone but the most skilled hackers.