Fraud as a Service (FaaS)5 Best Practices to Stop Professional Fraudsters

Mike Elliff
Mike Elliff | March 27, 2025 | 10 min read

This featured video was created using artificial intelligence. The article, however, was written and edited by actual payment experts.

What is Fraud as a Service (FaaS)?

In a Nutshell

"Fraud as a service," or "FaaS," may represent the future of online fraud. Are you ready to deal with this threat? In this article, we examine the leading FaaS tactics and explore what you can do about them.

Is “Fraud as a Service” (or FaaS) the Next Big Threat Facing Your Business?

What comes to mind when you picture online fraud? Perhaps you envision customer-turned-scammers who file invalid chargebacks to get things for free.

Or, perhaps you imagine dozens of bad actors collaborating together to steal merchandise and card numbers from you and your customers, respectively. Or, maybe you picture cunning scammers who dropship items from legitimate businesses using stolen payment information.

Digital fraud is highly organized and sophisticated. While some scammers still act alone, the largest and most egregious frauds are perpetrated by organized criminal gangs who carry out fraud on behalf of others with professional scale and efficiency.

This threat, known as fraud as a service (FaaS), is a form of productized digital cybercrime in which criminal organizations sell and carry out prepackaged fraudulent attacks upon victims on behalf of paying customers.

What is Fraud as a Service?

Fraud as a Service

[noun]/frôd • əz • ā • sərvəs/

Fraud as a Service is a process by which an individual bad actor provides tools and services to others to facilitate their commission of fraudulent online activity. FaaS can involve diverse tactics for perpetrating fraud.

In contrast to standalone fraud tactics like chargeback fraud, identity theft, SIM swapping, or account takeover fraud, fraud as a service (FaaS) involves scams carried out by professional fraudsters on behalf of paying clients.

Essentially, picture an underground version of software as a service (SaaS). But, rather than selling project management, time tracking, or sales enablement software, criminal FaaS enterprises sell prepackaged fraud or fraud kits like stolen payment information, social security numbers, business email compromise tools, and phishing scripts.

FaaS vendors will carry out scams on behalf of customers that don’t have the skills or infrastructure to do them on their own. I’ll highlight a few of the most common illicit services below.

How Does FaaS Work?

TL;DR

Fraud as a service occurs on darkweb marketplaces where cybercriminals offer phishing kits, card testing, synthetic identity creation, and other tools and services on a subscription or pay-per-use basis.

Obviously, both FaaS providers and the clients that pay for them are committing illegal acts. So, most transactions occur on underground platforms and darknet marketplaces, where they can take advantage of the lack of oversight and scrutiny.

You’ve probably somewhat familiar with how the dark web works. Using anonymous network layers like I2P and the Tor browser, criminals can access illicit marketplaces to contract all manner of illegal activities. Bad actors can order assassinations, sell stolen information, ship drugs, and distribute illegal paraphernalia.

It’s on these underground marketplaces that FaaS providers find customers willing to buy and sell fraudulent services. And, they work in a manner that’s disturbingly similar to above-ground, legal businesses.

FaaS Marketplace

FaaS is insidious because it functions exactly like a legitimate business. The only real difference is that the services offered for sale are scams.

This setup enables “ordinary” criminal buyers to carry out sophisticated attacks against unsuspecting victims with the backing and support of expert scammers working for FaaS providers.

Important!

All these transactions take place on the dark web. This makes FaaS operations especially difficult to trace and disrupt. While you might be able to intercept an individual fraud attack, the service provider is still out there, offering the same tools and services to other fraudsters.

Key Components of FaaS

Most FaaS providers fit into one or more of the following categories:

What is it?

Online platforms, often within darknet or encrypted forums, that facilitate the buying and selling of compromised data.

Includes

  • Credit card dumps
  • Stolen personally identifying information
  • Compromised login credentials

How Does it Work?

Data is obtained via malware infections, data breaches, phishing campaigns, and even insider threats.

Marketplaces may feature escrow systems, reputation ratings, and sometimes even "warranty" periods on data validity.

What is it?

Comprehensive tools and resources that allow unskilled bad actors to create and execute sophisticated phishing and social engineering campaigns.

Includes

  • Ready-made templates
  • Fake website generators

How Does it Work?

Pre-built email templates, realistic fake website replicas, malware payloads, and automated delivery systems allow buyers to launch streamlined attacks at scale.

Social engineering modules, meanwhile, will often incorporate psychological manipulation tactics and use social media platforms heavily.

What is it?

Software designed to automate and increase the throughput of brute-force scams.

Includes

  • Credential stuffing
  • Done-for-you account takeovers
  • Card testing attacks

How Does it Work?

Botnets or cloud-based infrastructure are used to launch high-volume attacks.

Penetration techniques, API manipulation, and reverse engineering tactics are used to discover vulnerabilities and bypass CAPTCHAs, multi-factor authentication, and other security measures.

What is it?

Services that facilitate the concealment of illicitly obtained funds so that they appear legitimate.

Includes

  • Cryptocurrency mixing
  • Mule network

How Does it Work?

Money is “cleaned” by layering transactions through multiple accounts, exploiting mule networks (individuals who transfer funds on behalf of others), and via the use of cryptocurrency mixers (tumblers).

Also entails conversion to other forms of assets like equities, real estate, or art.

The Global Financial Impact of FaaS Attacks

TL;DR

The global financial impact of fraud as a service (FaaS) attacks is immense, costing businesses and financial institutions billions annually through fraudulent transactions, chargebacks, and identity theft.

Because FaaS is scalable, its effects can be wide-reaching. In 2024, a single Faas-enabled, large-scale attack spanning 4,800+ incidents disrupted businesses in three verticals (social media, crypto, and payments) on every continent except for Australia and Antarctica.

No longer are fraudsters working alone to exploit vulnerabilities and steal from clients. With the help of the dark web and anonymous payment methods like cryptocurrencies, scammers are working together, sharing knowledge, and transacting with each other.

No geographic location is immune from FaaS attacks. I mentioned a second ago that Australia was exempted from one high-profile attack. But, according to a 2023 survey by Ravelin, two-thirds of businesses in Australia said they have been victims of FaaS schemes at some point. This is compared to the global average of 56% of businesses.

56%
Globally

of businesses say they've been victims of at least one FaaS scheme

Source: Ravelin

Like legitimate business ecosystems, which magnify supply-side activity, the underground platforms that allow FaaS providers to thrive are lowering the cost of scamming, increasing the prevalence of fraud, and lowering the barrier to entry for aspiring cybercriminals.

Every move you make…fraudsters are going to look for a way to respond. You need to stay two steps ahead at all times.REQUEST A DEMO

Examples of FaaS Attacks in Action

The clearnet — the legitimate, publicly-accessible web — is being ravaged by FaaS-enabled scams. Here are a few notable cases:

FaaS Cybercrimminals Steal 2 Million Card Numbers

Research published by Kaspersky Digital Footprint Intelligence revealed that FaaS “infostealers” injected malware into as many as 21 million devices between 2023 and 2024.

The outcome? Nearly 2 million primary card numbers were stolen from unsuspecting victims and dumped onto darknet marketplaces for sale. In fact, illegally-obtained payment information is so abundant that on underground marketplace B1ack’s Stash, FaaS scammers gave away 1 million debit and credit card numbers for free.

Any individual in possession of a leaked entry containing a card’s primary account number, expiration date, and CVV can use the information to carry out third-party fraud.

Need a Victim’s Health Records? That’ll Be a Hefty $1,000

Financial services firms are prime targets for hackers, accounting for 22% of all cyberattacks in 2024. But, there’s one industry that’s even more vulnerable to cybercrime: healthcare.

According to research from Kroll, healthcare providers suffered 23% of all data breaches last year, edging out financial industry firms by one percentage point.

The reason? Stolen health records are a cash cow for FaaS criminals. On the dark web, a single set of personal health records can fetch up to $1,000. By contrast, stolen card details sell for a mere $5 per set.

FaaS Criminals Sell Stolen Small Business For Just $600

Today, an estimated 16% of businesses are fully-remote. These digital-first businesses often take the form of eCommerce stores, consultancies, marketing agencies, development studios, and professional service firms.

Although these small and midsize businesses have few physical assets, they have plenty of data in the form of client lists, legal documents, employee social security numbers, payment card information, and bank account numbers.

For FaaS cybercriminals, these details are a digital treasure trove that can be stolen, exported, and resold to illegal buyers; sometimes for as little as $600.

TL;DR

Emerging trends in FaaS, like the use of LLMs, deepfakes, and cryptocurrencies, will demand an aggressive, international strategy by law enforcement.

FaaS is not static. New technologies emerge constantly, and many are co-opted by FaaS criminals, either to enhance the effectiveness of their scam services or to make them more accessible or affordable for buyers. Here are a few trends to be on the lookout for:

AI-powered fraud

AI-Powered Fraud

Large language models (LLMs) and text-to-image software enable FaaS providers to manufacture sophisticated and believable scams for cheap.

Deepfake and voice cloning

Deepfake and Voice Cloning

The accessibility of deepfake technologies and voice cloning tools means that it’s easier than ever to impersonate victims on social media and over the phone.

Cryptocurrencies

Cryptocurrencies

Privacy-focused cryptocurrencies, like Monero (XMR) and Secret (SCRT), allow buyers to make untraceable FaaS purchases, and let FaaS providers launder money with ease.

Ransomware-as-a-Service (RaaS)

Ransomware-as-a-Service (RaaS)

This growing subset of fraud involves sophisticated FaaS providers who write ransomware and then launch attacks via affiliates.

The development of scam-enhancing technologies will almost certainly outpace regulators. Governments will need to play catch-up by enacting stricter laws targeting FaaS providers, their clients, and darknet transactions at large.

Law enforcement agencies, meanwhile, will need to invest heavily in specialized cybercrime units with expertise in cryptocurrency tracking, darknet investigations, and AI-driven threat detection. 

Still, the internet’s borderless nature will render domestic regulation alone hopelessly ineffective. Instead, a coordinated global effort that involves intelligence sharing and joint investigations will become table stakes; anything less is unlikely to be sufficient.

Detecting & Preventing Fraud as a Service 

The rapid expansion of organized, for-profit cybercrime is nothing short of a five-alarm fire for eCommerce merchants and other digitally-native businesses.

Luckily, while FaaS attacks can be more scalable than rogue threats perpetrated by ragtag groups of fraudsters, the strategies for deterring FaaS-enabled attacks are basically the same as deterring any fraud attack. Here are just a few ideas that can help:

Fraud as a Service (FaaS)

Give AI Fraudsters a Taste of Their Own Medicine

Machine learning-based anomaly detection tools can help you uncover unusual buyer activity prior to checkout, identify high-risk IP addresses or geographies, and block purchase attempts before they morph into chargeback fraud or refund abuse.

AI tools can also be paired with fraud scoring tools that aid in accurate and quantifiable fraud decisioning.

Fraud as a Service (FaaS)

Verify Every Customer… Every Time

It’s no longer safe to accept automatic payments without redundant verifications, even from regular customers. You just never know whose data has been compromised.

You should integrate customer authentication software with your regular checkout processes, or ask your processor if you can upgrade to a more secure platform. You should also deploy multilayer detection software, with multiple fraud detection tools to verify your customers, including:

Fraud as a Service (FaaS)

Use the Law — It’s On Your Side

FaaS is inherently intertwined with other highly illegal activities, such as drug trafficking, human trafficking, and murders-for-hire. So, authorities have a vested interest in stamping out the threat.

If you suspect you’ve been a victim of a FaaS-enabled attack, you can lodge a complaint with the FBI’s Internet Crime Complaint Center (IC3) or file a report with the US Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA).

Fraud as a Service (FaaS)

Beware of False Declines

According to our internal research, the average merchant can experience false decline rates of 20-30%. The total cost of false declines is projected to reach $443 billion every year. That’s substantially higher than the actual cost of credit card fraud.

We are urging you to ramp up your anti-fraud efforts and verify every one of your customers before purchase. At the same time, a balance must be achieved. Here again, machine learning may offer a potential solution.

We’re talking about a process called dynamic routing. Here, machine-learning technologies can route transactions to the bank in order to clarify details and improve the odds of authorization. It can let you route a cross-border transaction through a processor located in the same country as the buyer, for instance.

Fraud as a Service (FaaS)

Employ Manual Review

There comes a point when a machine is incapable of discerning potentially fraudulent behavior from unusual but valid customer activity. In order to stave off the false declines mentioned above, it might be necessary to designate a fraud manager within your own company to manually review flagged orders before approving or denying them. 

This isn’t always easy, though. Fraud management demands specific expertise. There may not be anyone within the organization with the skills and experience necessary to oversee this process.

If you struggle to find a happy balance between false declines and stopping fraudulent transactions, perhaps it’s wise to consider hiring a third-party expert to help you optimize both.

Let the Fraud Experts Help

Fraud as a Service ultimately represents a paradigm shift in the cybercrime landscape. Like fragmented industries that gradually consolidate into multinational giants, scattered threats are coalescing into a highly organized and scalable — and wholly illegal — industry.

The takeaway? Ongoing vigilance and proactive action will be the bare minimum if you want to successfully keep emerging FaaS threats at bay.

But you don’t have to do it alone. At Chargebacks911®, our dual-layered, AI-enabled fraud prevention tools can help you safeguard your hard-earned revenue from FaaS and post-transaction scams. Get in touch with us for a free, no-obligation analysis today.

FAQs

What is fraud as a service (FaaS)?

Fraud as a Service is a process by which an individual bad actor provides tools and services to others to facilitate their commission of fraudulent online activity. FaaS can involve diverse tactics for perpetrating fraud.

How does fraud as a service work?

FaaS is not limited to a single tactic. For example, the perpetrator may conduct distributed denial of service (DDoS) attacks on behalf of their customers. They may also rent botnets to criminals, who can then use the rented tools to conduct their own botnet attacks.

FaaS providers may have access to stolen payment card information, healthcare records, or social media accounts. They can use this data to create fake users (which are then sold or rented to subscribers) or simply sell the raw data and let fraudsters create their own faux accounts.

What makes FaaS harder to identify?

Modern-day online criminals are smart and professionalized. They work with one another to brainstorm new tactics and refine their techniques. That’s bad news for you as a business because you face multiple different points of vulnerability.

The last decade has produced numerous high-profile data breaches involving still-unidentified criminals who compromised millions of customers’ records. If you find yourself a victim of this type of attack, it could have substantial ramifications for your reputation and customer confidence.

Is fraud as a service (FaaS) a growing threat?

FaaS is not only a growing threat, it’s likely going to be the next big fraud trend for the foreseeable future.

Frankly, the difference between lone-wolf cyber attacks and organized crime is glaring. A single criminal is concerning enough, but the average number of scams they can perpetrate on their own isn’t typically that high. However, when criminals team up and organize, the number of scams they can perpetrate increases exponentially.

How do I detect and prevent FaaS attacks?

Fraud prevention best practices include deploying velocity checks and other verification tools, as well as maximizing data analysis, avoiding false declines, and employing manual reviews for flagged transactions.

Like What You're Reading? Join our newsletter and stay up to date on the latest in payments and eCommerce trends.
Newsletter Signup
We’ll run the numbers; You’ll see the savings.
triangle shape background particle triangle shape background particle triangle shape background particle
Please share a few details and we'll connect with you!
Revenue Recovery icon
Over 18,000 companies recovered revenue with products from Chargebacks911
Close Form