{"content_customizations":null,"shortcut_customizations":[{"id":3544,"created_at":"2022-11-14T13:31:19.277281Z","updated_at":"2022-11-14T13:31:19.283826Z","action":"DOWNLOAD","color":"#FFFFFF","icon_url":"https://app-media-production.s3.amazonaws.com/client_docs/client_documents/557/shortcut_customizations/143cd23b47cf49cc952dd249528e8ee1/download_icon.svg","additional_data":{"download_url":"https://media.celero.io/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/original_file.pdf"},"content":4248}],"content_thumbnail":{"original":"/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/thumbnails/1.jpg","high_quality":{"small":"/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/thumbnails_high_quality/1.jpg","medium":"/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/thumbnails_high_quality/1_medium.jpg","large":"/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/thumbnails_high_quality/1_large.jpg","microsite_preview":"/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/thumbnails_high_quality/preview.jpg"}},"version":{"version_number":1,"version_details":{"uuid":"7f0afa20-9303-448c-a21b-2c8a313a2dbb","name":"Cyber_Botnet_Marketplaces_RP","is_live":true,"access_control":{"min_stage":"EVERYONE_ALLOWED","stage_options":{"UNVERIFIED_CONTACT":{"form_preview":"LANDING_PAGE","form_id":"default"},"VERIFIED_CONTACT":{"form_preview":"LANDING_PAGE"},"GDPR_CONSENT":{},"PRIVATE":{},"EVERYONE_ALLOWED":{}}},"base_shorten":null,"tags":[]},"is_active":true,"type":"DESKTOP","version":"7f0afa20-9303-448c-a21b-2c8a313a2dbb","content_uuid":"7f0afa20-9303-448c-a21b-2c8a313a2dbb","version_id":"7f0afa20-9303-448c-a21b-2c8a313a2dbb"},"custom_events":[],"content_action":null,"content_stats":{"version":"7f0afa20-9303-448c-a21b-2c8a313a2dbb","visitors_count":6,"lifetime_visitors_count":null,"last_seen":"2026-04-14T00:00:00Z","last_updated":"2026-04-17T04:25:41Z","account":"bb8a3966-0b81-40b5-9d7b-a8cd2a25ee82"},"content_meta_tags":{"url_title":"cyber-botnet-marketplaces-rp","title":"The Rise of Dark Web Botnet Marketplaces","description":"The Rise of Dark Web Botnet Marketplaces Annual Cyber Threat Intelligence Report 2021 ","og_enabled":true,"seo_enabled":true,"version":"7f0afa20-9303-448c-a21b-2c8a313a2dbb"},"keywords":[],"seo_content_version_name":"cyber-botnet-marketplaces-rp","html_snippets":null,"is_live":true,"shorten":"https://engage.cognyte.com/s/b8bea5ad/cyber-botnet-marketplaces-rp/","base_url":"/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC","config":{"pagecount":23,"bounds":[[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286]]},"annotations":{"pages":[{"page":3,"annotations":[{"type":"TextLink","bounds":[142,1193,362,12],"action":{"type":"URI","uri":"https://www.verizon.com/business/resources/reports/dbir/"}},{"type":"Link","bounds":[141,1190,402,17],"objref":"9","action":{"type":"URI","uri":"https://www.verizon.com/business/resources/reports/dbir/ "}}]},{"page":4,"annotations":[{"type":"TextLink","bounds":[141,1175,478,12],"action":{"type":"URI","uri":"https://www.cbsnews.com/news/genesis-cybercriminal-market-ransomware/"}},{"type":"TextLink","bounds":[141,1141,711,12],"action":{"type":"URI","uri":"https://www.reuters.com/business/colonial-pipeline-ceo-tells-senate-cyber-defenses-were-compromised-ahead-hack-2021-06-08/"}},{"type":"TextLink","bounds":[141,1157,112,12],"action":{"type":"URI","uri":"https://www.reuters.com/business/colonial-pipeline-ceo-tells-senate-cyber-defenses-were-compromised-ahead-hack-2021-06-08/"}},{"type":"TextLink","bounds":[141,1196,686,12],"action":{"type":"URI","uri":"https://www.vice.com/en/article/n7b3jm/genesis-market-buy-cookies-slack?utm_source=motherboard_twitter"}},{"type":"Link","bounds":[139,1172,642,19],"objref":"21","action":{"type":"URI","uri":"https://www.cbsnews.com/news/genesis-cybercriminal-market-ransomware/ "}},{"type":"Link","bounds":[139,1138,727,38],"objref":"22","action":{"type":"URI","uri":"https://www.reuters.com/business/colonial-pipeline-ceo-tells-senate-cyber-defenses-were-compromised-ahead-hack-2021-06-08/ "}},{"type":"Link","bounds":[139,1193,727,17],"objref":"23","action":{"type":"URI","uri":"https://www.vice.com/en/article/n7b3jm/genesis-market-buy-cookies-slack?utm_source=motherboard_twitter "}}]},{"page":6,"annotations":[{"type":"TextLink","bounds":[142,1180,417,11],"action":{"type":"URI","uri":"https://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer"}},{"type":"TextLink","bounds":[142,1143,637,12],"action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/vidar-stealer-abuses-mastodon-to-silently-get-c2-configuration/"}},{"type":"TextLink","bounds":[142,1158,87,12],"action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/vidar-stealer-abuses-mastodon-to-silently-get-c2-configuration/"}},{"type":"TextLink","bounds":[142,1198,217,12],"action":{"type":"URI","uri":"https://asec.ahnlab.com/en/26584/"}},{"type":"Link","bounds":[141,1175,642,17],"objref":"152","action":{"type":"URI","uri":"https://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer "}},{"type":"Link","bounds":[141,1140,727,38],"objref":"153","action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/vidar-stealer-abuses-mastodon-to-silently-get-c2-configuration/"}},{"type":"Link","bounds":[141,1195,727,17],"objref":"154","action":{"type":"URI","uri":"https://asec.ahnlab.com/en/26584/"}}]},{"page":7,"annotations":[{"type":"TextLink","bounds":[147,1169,659,12],"action":{"type":"URI","uri":"https://success.trendmicro.com/solution/000146108-azorult-malware-information-kAJ4P000000kEK2WAM"}},{"type":"TextLink","bounds":[147,1149,634,12],"action":{"type":"URI","uri":"https://www.cyberark.com/resources/threat-research-blog/raccoon-the-story-of-a-typical-infostealer"}},{"type":"TextLink","bounds":[147,1190,552,12],"action":{"type":"URI","uri":"https://securityboulevard.com/2021/05/an-in-depth-analysis-of-the-new-taurus-stealer/"}},{"type":"Link","bounds":[144,1166,727,19],"objref":"178","action":{"type":"URI","uri":"https://success.trendmicro.com/solution/000146108-azorult-malware-information-kAJ4P000000kEK2WAM "}},{"type":"Link","bounds":[144,1146,727,22],"objref":"179","action":{"type":"URI","uri":"https://www.cyberark.com/resources/threat-research-blog/raccoon-the-story-of-a-typical-infostealer "}},{"type":"Link","bounds":[144,1187,727,17],"objref":"180","action":{"type":"URI","uri":"https://securityboulevard.com/2021/05/an-in-depth-analysis-of-the-new-taurus-stealer/ "}}]},{"page":15,"annotations":[{"type":"TextLink","bounds":[144,1203,327,12],"action":{"type":"URI","uri":"https://www.cognyte.com/blog/telecom-cyber-attack"}},{"type":"Link","bounds":[141,1199,727,19],"objref":"404","action":{"type":"URI","uri":"https://www.cognyte.com/blog/telecom-cyber-attack"}}]}]},"created_at":"2022-11-14T13:31:19.066659Z","updated_at":"2026-04-17T04:50:30.352648Z","original_name":"Luminar-2022-Annual-Threat-Landscape-Report.pdf","uuid":"7f0afa20-9303-448c-a21b-2c8a313a2dbb","description":"The Rise of Dark Web Botnet Marketplaces Annual Cyber Threat Intelligence Report 2021 ","is_high_quality_thumbnails_available":true,"conversion_type":"DOCUMENT"}