Search This Blog

Powered by Blogger.

Blog Archive

Labels

Footer About

Footer About

Labels

Showing posts with label CaaS. Show all posts

Cybercrime-as-a-Service Drives Surge in Data Breaches and Stolen Credentials

 

The era of lone cybercriminals operating in isolation is over. In 2025, organized cybercrime groups dominate the threat landscape, leveraging large-scale operations and sophisticated tools to breach global organizations. Recent intelligence from Flashpoint reveals a troubling surge in cyberattacks during just the first half of the year, showing how professionalized cybercrime has become — particularly through the use of Cybercrime-as-a-Service (CaaS) offerings. 

One of the most alarming findings is the 235% rise in data breaches globally, with the United States accounting for two-thirds of these incidents. These breaches exposed an astounding 9.45 billion records. However, this number is eclipsed by the dramatic 800% increase in stolen login credentials. In total, threat actors using information-stealing malware compromised more than 1.8 billion credentials in just six months. 

These tools — such as Katz Stealer or Atlantis AIO — are widely accessible to hackers for as little as $30, yet they offer devastating capabilities, harvesting sensitive data from commonly used browsers and applications. Flashpoint’s report emphasizes that unauthorized access, largely facilitated by infostealers, was the initial attack vector in nearly 78% of breach cases. 

These tools enable threat actors to infiltrate organizations and pivot across networks and supply chains with ease. Because of their low cost and high effectiveness, infostealers are now the top choice for initial access among cybercriminals. This rise in credential theft coincides with a 179% surge in ransomware attacks during the same period. 

According to Ian Gray, Vice President of Cyber Threat Intelligence Operations at Flashpoint, this dramatic escalation highlights the industrial scale at which cybercrime is now conducted. The report suggests that to counter this growing threat, organizations must adopt a dual strategy: monitor stolen credential datasets and set up alert systems tied to specific compromised domains.  

Furthermore, the report advocates for moving beyond traditional password-based authentication. Replacing passwords and basic two-factor authentication (2FA) with passkeys or other robust methods can help reduce risk. 

As cybercriminal operations grow increasingly professional, relying on outdated security measures only makes organizations more vulnerable. With CaaS tools making sophisticated attacks more accessible than ever, companies must act swiftly to enhance identity protection, tighten access controls, and build real-time breach detection into their infrastructure. 

The rapid evolution of cybercrime in 2025 is a stark reminder that prevention and preparedness are more critical than ever.

Crimeware-as-a-Service on the Rise; Here's How to Protect Yourself

 

The global rate of cybercrime is rising. Cybercriminals exhibit no indications of slowing down, as evidenced by the recent rise in harmful web extensions (especially in the US) and the persistence of risky phishing and malware attacks—in part because of the quickly expanding Crimeware-as-a-Service (CaaS) sector. 

These terms, which also go by the names malware-as-a-service and cybercrime-as-a-service, describe the developing and incredibly lucrative practise of offering cyber goods and services to other criminals on the dark web. CaaS enables nearly anyone to buy or rent software capable of distributing harmful malware in a matter of minutes, eliminating the need to acquire the technical know-how necessary to support large-scale attacks.

For instance, attackers can now purchase phishing kits for as little as $40, which deceive victims into clicking links or accessing malicious websites that then infect their devices. On the dark web, malicious software is also easily accessible for larger-scale attacks. The Eternity Stealer, an infostealer accessible for just $260 a year and capable of extracting usernames, emails, and credit card details, is one well-known and frequently-sold malware with recent significant usage. 

The expansion of this criminal ecosystem, which sees new CaaS products appear on a regular basis, poses a serious threat to consumer safety and privacy. Users are sharing more information online than ever before, from social networking and online shopping to working and studying from home, and the CaaS market makes this information more susceptible to attackers. 

Market competition will probably increase demand for new and more sophisticated spyware, leading to the emergence of next-generation dangers that even the most informed consumer will have difficulties identifying. 

The average family hasn't made the same investments in cybersecurity practises as enterprises have, making them great candidates for the inflow of bad actors that CaaS permits. Although it may not seem like a high priority for hackers, consumers who are at home using their phone or computer to browse the internet are actually much simpler targets. Many cybercriminals have increased their consumer attacks, seeing home networks as the ideal window to access far more protected business networks, especially with the continued use of remote work. 

We anticipate industry growth in the upcoming years, particularly around novel and emerging platforms like bitcoin and the metaverse, even though the CaaS business is expanding in traditional regions of the criminal world. By advocating for more cyber education and awareness, training adult users on how to spot common risks like phishing, and instilling a culture of safety in the next generation from an early age, we can proactively seek to limit the harm it causes. 

The next stage is to implement the same calibre of cybersecurity measures across household networks that businesses do. The vulnerability of consumers to cybercrime has never been greater, so it is time for them to make the investments in defences required to thwart upcoming attacks before they fall prey, comprising three essential components: 

Endpoint protection system

Endpoint security is the best choice for home users to defend themselves against next-generation online attacks. These systems are made to protect the user device endpoints, which are frequently used by hackers as entry points and are used to communicate with other devices and end users over a network. Endpoint security measures, which were once regarded to be primarily useful for businesses, are now becoming increasingly important for consumers, especially in light of the rising number of hacker attempts to access corporate networks via home networks.

DNS filtering 

The IP address that computers use to load a webpage is translated from the domain name of a website via the domain name system (DNS). Customers can block suspicious URLs, stop hackers from tracking their behaviour, and filter out explicit information by using a DNS filter, which is readily available online. As a result, browsing is more safe and worry-free overall. 

Use of VPN 

Consumers' online activity is accessible to their internet service provider (ISP), search engines, governmental organisations, and any websites they visit, regardless of where or how they use the internet, whether at home or through a public Wi-Fi network. The IP address of the user's device is still accessible even when utilising a private mode on browsers, proving that this is true. 

The only effective option to maintain online privacy is to use a VPN, which uses encryption technology to mask users' identities. VPNs are simple to set up and use, allowing customers to surf privately, bypass geo-blocks, and access content from all over the world. 

As long as consumers do not invest in better cyber understanding and tools, the CaaS business will expand. However, we do not have to all become victims. Let us pause this narrative and use this opportunity to increase home user cyber education and protections, making the internet a safer and more pleasurable environment for all.

Russian Hackers Employ Malicious Traffic Direction Systems to Spread Malware



Researchers have discovered possible linkages among a subscription-based crimeware-as-a-service (Caas) solution as well as a cracked copy of Cobalt Strike according to what they presume is being offered as a tool for customers to stage post-exploitation operations. 

Prometheus is an open-source activity monitoring and warning system for cloud applications that are based on metrics. Nearly 800 cloud-native companies, namely Uber, Slack, Robinhood, as well as others, employ it. 

Prometheus offers convenient observation of a system's state along with hardware and software metrics like memory use, network utilization, and software-specific defined metrics by scraping real-time information from numerous endpoints (ex. number of failed login attempts to a web application).

Prometheus has an understood policy of omitting built-in support for security features like authentication and encryption because the numeric metrics it collects are not deemed sensitive data. This allows the company to focus on creating monitoring-related services. It's being advertised on Russian underground forums as a traffic direction system (TDS) which allows bulk phishing redirection to rogue landing pages, designed to deliver malware payloads on targeted computers for $250 per month. 

"A system of a malicious technology, malicious email circulation, illicit folders across authorized platforms, traffic diversion, and the capacity to deliver infected files are the significant elements of Prometheus," the BlackBerry Research and Intelligence Team stated in a report. 

The redirection comes from one of two places: malicious advertisements on normal websites, or websites that have been tampered with to install harmful code. The attack network begins with a spam email that contains an HTML file or a Google Docs page; when opened, it redirects the victim to a compromised website that hosts a PHP backdoor fingerprint smudges the machine to determine whether to serve the victim with malware or redirect the user to another page that may contain a phishing scam.

While TDS's aren't a novel concept, the level of sophistication, support, and cheap financial cost lend validity to the hypothesis that this is a trend that will likely emerge in the threat environment in the near future, the researchers wrote.

In addition to enabling these techniques, it is strongly advised for anyone with a Prometheus implementation to query the previously listed endpoints to see if sensitive data was exposed before the identification and TLS functionalities in Prometheus were implemented.

Crime-as-a-Service Makes Advanced Phishing Attacks Easier For Amateurs

 

CaaS (Crime as a Service) is a practice where veteran hackers sell tools and knowledge required to perform a cybercrime. Generally, CaaS is used for executing phishing attacks. Phishing is one of the easiest ways to hack into any organization for any hacker. Earlier, to perform a phishing attack needed an experienced threat actor's technical proficiency and knowledge of social engineering. But, with the rise of CaaS, any normal individual with no prior knowledge of cyberattacks can become a hacker. 

CaaS provides an amateur attacker with anything required to perform their personal phishing attack, varying from branded email templates to detailed target lists. There is also an option for hackers to pay for already compromised servers, it saves them from the fear of getting tracked. By minimizing risks to get caught, the trend has made it simple to carry out a cyberattack. However, it has become a major inconvenience for organizations that are becoming targets. Besides this, CaaS offers technical advantages, with the help of downloaded templates, noob attackers can execute safe attacks that will safely land in any employee's inbox. 

By using sophisticated methods like inspection blocking, content encryption, and hidden URL's in attachments to avoid detection. This enables hackers to perform high-level advanced attacks, which has become a serious issue for organizations. Besides being easy to execute, phishing campaigns are also highly effective. Phishing attacks carried out using CaaS tools are built to target employees, which makes it difficult for organizations. The attacker uses social engineering techniques to exploit end-users, by gaining trust and creating a feeling of immediacy to reply. 

Hackers can use open-source intelligence to steal data from organization websites, past breaches, and social media to execute successful spear-phishing campaigns. HelpNetSecurity says "Crime-as-a-Service has made phishing an even more attractive method of attack for cybercriminals, by making it more accessible and less labor-intensive. Why spend months looking for an organization’s security vulnerabilities when you can hit them with a ready-made phishing attack? It’s also made phishing campaigns more easily scalable because it takes criminals takes less time and effort to execute their attacks."