Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 536

Initial Access Broker (IAB)

What is Initial Access Broker (IAB)?

Initial Access Broker (IAB)A cybercrime specialist who obtains unauthorised access to corporate networks and sells that access to other criminals, especially ransomware affiliates.


Initial Access Brokers (IABs) form a distinct layer of the cybercrime economy. They specialise in obtaining footholds in organisations via phishing, infostealer logs, valid VPN or RDP credentials, web-shell deployment, or exploitation of public vulnerabilities (Citrix, Fortinet, Pulse Secure, Ivanti, Microsoft Exchange). Access is then listed on Russian-speaking forums such as Exploit and XSS, on Telegram channels, or sold privately. Listings include the victim's industry, revenue, country, and access type, with prices from a few hundred to tens of thousands of dollars. Their main buyers are ransomware affiliates, business-email-compromise crews, and crypto-theft groups. IABs dramatically accelerate intrusions and explain why patching and credential hygiene are so important.

Examples

  1. 01

    An IAB advertises VPN access into a US healthcare provider on a Russian-speaking forum for 5,000 USD.

  2. 02

    Multiple ransomware groups including Conti and LockBit relied on IABs to scale their campaigns through 2021-2023.

Frequently asked questions

What is Initial Access Broker (IAB)?

A cybercrime specialist who obtains unauthorised access to corporate networks and sells that access to other criminals, especially ransomware affiliates. It belongs to the Defense & Operations category of cybersecurity.

What does Initial Access Broker (IAB) mean?

A cybercrime specialist who obtains unauthorised access to corporate networks and sells that access to other criminals, especially ransomware affiliates.

How does Initial Access Broker (IAB) work?

Initial Access Brokers (IABs) form a distinct layer of the cybercrime economy. They specialise in obtaining footholds in organisations via phishing, infostealer logs, valid VPN or RDP credentials, web-shell deployment, or exploitation of public vulnerabilities (Citrix, Fortinet, Pulse Secure, Ivanti, Microsoft Exchange). Access is then listed on Russian-speaking forums such as Exploit and XSS, on Telegram channels, or sold privately. Listings include the victim's industry, revenue, country, and access type, with prices from a few hundred to tens of thousands of dollars. Their main buyers are ransomware affiliates, business-email-compromise crews, and crypto-theft groups. IABs dramatically accelerate intrusions and explain why patching and credential hygiene are so important.

How do you defend against Initial Access Broker (IAB)?

Defences for Initial Access Broker (IAB) typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Initial Access Broker (IAB)?

Common alternative names include: IAB, Access broker.

Related terms

See also