

Digital Asset Redemption's Steve Baer on Criminal Business Models
The economics of ransomware reveal a sophisticated criminal enterprise that most security leaders dramatically underestimate. Steve Baer, Field CISO at Digital Asset Redemption, operates at the intersection of cybercrime and legitimate business, where his team's human intelligence gathering in Dark Web communities provides early warning systems that traditional security infrastructure cannot match. His insights into criminal business models, negotiation psychology, and the financial flows funding modern cybercrime offer a perspective rarely available to security practitioners.
Steve walks David through Digital Asset Redemption's evolution from facilitating compliant cryptocurrency payments to building comprehensive threat intelligence capabilities using native speakers who maintain long-term relationships with criminal actors. His team's approach has enabled them to identify targeting intelligence before attacks occur and, in one notable case, leverage personal information about an attacker to secure free decryption keys for a nonprofit organization.
Topics discussed:
- The ransomware-as-a-service ecosystem where criminal affiliates can launch operations for $40-200 monthly subscriptions and achieve 10% success rates, generating millions in revenue.
- How Dark Web markets extend beyond stolen credentials to include zero-day vulnerabilities starting at $100,000, access broker services targeting specific organizations, and complete compromise kits for enterprise security tools.
- The organizational structures of criminal enterprises that mirror RICO-era mafia operations through loose affiliations rather than hierarchical control, making traditional law enforcement approaches ineffective.
- Negotiation psychology and tactics used in ransom discussions, including the business incentives that motivate threat actors to provide working decryption keys and maintain operational reputation.
- Financial models underlying cybercrime operations, including revenue sharing with affiliate programs, bonus structures for successful targeting, and the necessity of cryptocurrency laundering services.
- Market indicators for measuring criminal enterprise growth, including quarterly analysis of unique threat actor groups, highest ransom demands, and seasonal patterns in retail-focused attacks.
- Human intelligence gathering techniques using multiple personas and native language speakers to build long-term relationships within criminal communities for early warning capabilities.
- The economic realities that enable small criminal teams to generate substantial revenue while operating from countries where attacking American institutions is legally encouraged rather than prosecuted.
- Why technical compliance frameworks provide insufficient protection against adversaries who can purchase complete compromise capabilities for mainstream security technologies.
Key Takeaways:
- Implement human intelligence capabilities to complement technical security controls, recognizing that criminal innovation often outpaces defensive technology deployment.
- Understand the true economics of ransomware operations, where criminal affiliates can achieve substantial returns with minimal upfront investment through established service models.
- Prepare comprehensive incident response plans that include professional negotiation capabilities, legal frameworks for attorney-client privilege, and understanding of criminal psychology.
- Monitor Dark Web markets not just for credential exposure but for targeting intelligence, access broker activity, and the availability of compromise kits specific to your security stack.
- Establish relationships with specialized incident response firms before needing them, understanding that ransom negotiations require specific expertise and cannot be effectively handled internally.
- Focus security education on understanding adversarial capabilities and business models rather than solely on compliance requirements or singular technology solutions.
Listen to more episodes: