6 min read
|
Saved February 14, 2026
|
Copied!
Do you care about this?
Researchers reveal how service providers fuel the pig butchering scams, enabling criminal networks to launch operations with minimal effort. These services supply tools for social engineering, money laundering, and managing victims, creating a scalable online fraud economy.
If you do, here's more
Cybersecurity researchers have identified two key service providers fueling the pig butchering-as-a-service (PBaaS) economy, which has become a major avenue for online scams, particularly among Chinese-speaking criminal groups in Southeast Asia. These groups operate large-scale scam centers, luring individuals with the promise of high-paying jobs, only to exploit them under threats of violence. INTERPOL categorizes these operations as human trafficking-fueled fraud on an industrial scale. The service providers involved offer everything needed to run social engineering operations, from tools for managing scams to systems for laundering stolen funds.
One prominent actor in this space is Penguin Account Store, which sells fraud kits, scam templates, and datasets of stolen personal information. They provide pre-registered social media accounts at prices starting as low as $0.10, as well as bulk pre-registered SIM cards and software designed to facilitate automated victim engagement via social media. Another company, UWORK, specializes in customer relationship management tools that help scammers manage their operations, including creating investment scam websites that mimic legitimate trading platforms. These operations are streamlined, allowing even those with limited technical skills to launch scams quickly and efficiently.
In addition to the PBaaS providers, a concerning trend has emerged with parked domains being used to redirect unsuspecting visitors to scams and malware. Infoblox's findings indicate that over 90% of visitors to these domains are directed to illegal content or malware, depending on their IP address. On another front, the Evilginx phishing toolkit is being exploited by threat actors to steal credentials from universities across the U.S. The toolkit's low detection rates and advanced evasion techniques have made it particularly effective, highlighting the growing sophistication of cybercriminal operations.
Questions about this article
No questions yet.