Hot Cybercrime Summer: What’s driving the shift
Cybercrime is not a collection of isolated actors or incidents. It is an interconnected ecosystem, an operating model where specialized roles, shared infrastructure, and coordinated incentives enable continuous, interoperable activity.
That shift is easy to spot, but harder to really absorb. It pushes against a long-held assumption in security that incidents are one-off events you can contain and close out. What Microsoft Threat Intelligence is seeing now looks very different. It’s an ecosystem designed for scale, specialization, and constant adaptation
More than 65 financially motivated actors now operate within a structured supply chain that mirrors legitimate technology markets. Initial access brokers sell footholds into enterprise environments. Malware operators provide delivery at scale. Ransomware platforms enable repeatable execution. Affiliates carry out the final stage and monetize it.
The visible incident is only the final step.
In many cases, initial access was sold weeks earlier. Infrastructure and tooling were reused across campaigns. Multiple actors contributed to the outcome, each optimized for one part of the process. This separation of labor is not incidental. It is the model.
And it is one of the most important shifts in the threat landscape.
Follow Microsoft Security