What happened
Feras Khalil Ahmad Albashiti, a 40-year-old Jordanian national also known online as “r1z,” has pleaded guilty in a U.S. federal court to selling unauthorized access to the computer networks of at least 50 enterprises through an underground cybercrime forum. In May 2023, he sold access to an undercover law enforcement officer in exchange for cryptocurrency, using compromised credentials and exploit tools. Albashiti was arrested in the Republic of Georgia, extradited to the U.S. in July 2024, and faces up to 10 years in prison and significant fines when he is sentenced in May 2026.
Who is affected
The victims include at least 50 U.S. and international companies whose network credentials were sold on the criminal marketplace. Although specific firms haven’t been publicly named, this case reflects the broader ecosystem of initial access brokers, intermediaries who commoditize footholds into corporate environments for other threat actors to exploit.
Why CISOs should care
Initial access brokers like Albashiti are critical enablers in the cybercrime supply chain, lowering the barrier for sophisticated attacks such as ransomware, data exfiltration, and persistent intrusions. For security leaders such as Jen Easterly (former CISA Director, now RSA Conference CEO) or other practitioners engaged in threat intelligence and enterprise defense, this prosecution underscores that perimeter compromises are not isolated events; they are often monetized and traded long before an attack manifests. The case highlights ongoing law enforcement action against criminal access markets and the need for heightened vigilance across identity and access management, detection, and response.
3 Practical Actions for CISOs
- Reduce initial access risk: Implement strong multi-factor authentication (MFA), strict network segmentation, and least-privilege access controls to make it harder for compromised credentials to be misused.
- Monitor for misuse and anomalies: Deploy advanced threat detection tooling (including UEBA and EDR/XDR) to identify unusual access patterns indicative of credential abuse or brokered access.
- Engage in threat intelligence sharing: Leverage industry and government threat feeds and communities to stay updated on emerging access broker trends and known tactics, techniques, and procedures (TTPs), integrating these insights into your detection and defense playbooks.
