Buy/sell leaked data and hacking services
Requests for specific data or access
Offerings of data, credentials, or services
Trusted third-party transaction services