Similarly to any organization, hackers want to tighten their belt on budget spending.
Time is money, even hacker time.
So instead of re-developing the wheel, hackers are looking for already-existing tools which they can re-use.
Templates and kits exist for just about every kind of attack.
For example, the phishing kit downloaded by the proxy hackers as mentioned earlier.
Off the shelf kits are not the only way to cut costs.
Different technology solutions are deployed to cut the costs of storage and hosting.
We saw how hackers were lured to use cloud technologies for their backend data collection.
But they are also using free hosting providers.
In a XSS attack campaign, the hacker was storing all the stolen credentials on such a free hosting site.
Digging deeper and the researchers found that the hosting provider was servicing in a similar manner numerous cyber-thieves.