eCommerce Fraud Knowledge Guide

Fraud as a Service (FaaS)

  1. Articles
  2. eCommerce Fraud
  3. Fraud as a Service (FaaS)
  4. How Does Fraud as a Service Work?
Fraud as a Service (FaaS)

Knowledge Guide Chapters

  1. What is Fraud as a Service?
  2. How Does Fraud as a Service Work?
  3. Fraud as a Service Statistics
  4. Fraud as a Service Examples
  5. How to Identify Fraud as a Service Attacks
  6. How to Prevent Fraud as a Service Attacks

How Does Fraud as a Service Work?How FaaS Operates in the Underworld

Harlan Hutson | December 29, 2025 | 4 min read
How Does Fraud as a Service Work?

How Does Fraud as a Service Work? Common Tactics & Practices

Fraud as a Service potentially enables any would-be fraudster to function as a solo act in a dark basement somewhere. On the other hand, it’s also streamlined and corporatized the fraud business by buying and trading fraud tools using SaaS-like elements such as money-back guarantees and tiered pricing. 

While this is happening, FaaS products themselves, are growing more sophisticated by the day. From pre-packaged phishing kits to botnets-for-hire, today’s FaaS allows even amateurs to launch professional-grade attacks at scale. In this article, we’re looking at how FaaS works and what potential threats it will likely pose in the future.

Fraud as a Service (FaaS)

Similar to software as a service (SaaS), buyers who purchase Fraud as a Service (FaaS) products don’t need to understand the inner workings of program how to carry out the fraud themselves. That’s a big problem for legitimate merchants and consumers: it means that even the least sophisticated bad actors can launch complex and large-scale attacks with nothing more than an internet connection.

How Does FaaS Work?

TL;DR

Fraud as a service occurs on darkweb marketplaces where cybercriminals offer phishing kits, card testing, synthetic identity creation, and other tools and services on a subscription or pay-per-use basis.

Obviously, both FaaS providers and the clients that pay for them are committing illegal acts. So, most transactions occur on underground platforms and darknet marketplaces, where they can take advantage of the lack of oversight and scrutiny.

You’ve probably somewhat familiar with how the dark web works. Using anonymous network layers like I2P and the Tor browser, criminals can access illicit marketplaces to contract all manner of illegal activities. Bad actors can order assassinations, sell stolen information, ship drugs, and distribute illegal paraphernalia.

It’s on these underground marketplaces that FaaS providers find customers willing to buy and sell fraudulent services. And, they work in a manner that’s disturbingly similar to above-ground, legal businesses.

FaaS Marketplace

FaaS is insidious because it functions exactly like a legitimate business. The only real difference is that the services offered for sale are scams.

This setup enables “ordinary” criminal buyers to carry out sophisticated attacks against unsuspecting victims with the backing and support of expert scammers working for FaaS providers.

Important!

All these transactions take place on the dark web. This makes FaaS operations especially difficult to trace and disrupt. While you might be able to intercept an individual fraud attack, the service provider is still out there, offering the same tools and services to other fraudsters.

FaaS attacks come from many angles at once.

Shouldn’t your chargeback management be the same? Talk to us about our end-to-end management platform.

Request a Demo
The Original End-to-End Chargeback Management Platform

Key Components of FaaS

Most FaaS providers fit into one or more of the following categories:

What is it?

Online platforms, often within darknet or encrypted forums, that facilitate the buying and selling of compromised data.

Includes

  • Credit card dumps
  • Stolen personally identifying information
  • Compromised login credentials

How Does it Work?

Data is obtained via malware infections, data breaches, phishing campaigns, and even insider threats.

Marketplaces may feature escrow systems, reputation ratings, and sometimes even "warranty" periods on data validity.

What is it?

Comprehensive tools and resources that allow unskilled bad actors to create and execute sophisticated phishing and social engineering campaigns.

Includes

  • Ready-made templates
  • Fake website generators

How Does it Work?

Pre-built email templates, realistic fake website replicas, malware payloads, and automated delivery systems allow buyers to launch streamlined attacks at scale.

Social engineering modules, meanwhile, will often incorporate psychological manipulation tactics and use social media platforms heavily.

What is it?

Software designed to automate and increase the throughput of brute-force scams.

Includes

  • Credential stuffing
  • Done-for-you account takeovers
  • Card testing attacks

How Does it Work?

Botnets or cloud-based infrastructure are used to launch high-volume attacks.

Penetration techniques, API manipulation, and reverse engineering tactics are used to discover vulnerabilities and bypass CAPTCHAs, multi-factor authentication, and other security measures.

What is it?

Services that facilitate the concealment of illicitly obtained funds so that they appear legitimate.

Includes

  • Cryptocurrency mixing
  • Mule network

How Does it Work?

Money is “cleaned” by layering transactions through multiple accounts, exploiting mule networks (individuals who transfer funds on behalf of others), and via the use of cryptocurrency mixers (tumblers).

Also entails conversion to other forms of assets like equities, real estate, or art.

TL;DR

Emerging trends in FaaS, like the use of LLMs, deepfakes, and cryptocurrencies, will demand an aggressive, international strategy by law enforcement.

FaaS is not static. New technologies emerge constantly, and many are co-opted by FaaS criminals, either to enhance the effectiveness of their scam services or to make them more accessible or affordable for buyers. Here are a few trends to be on the lookout for:

AI-powered fraud

AI-Powered Fraud

Large language models (LLMs) and text-to-image software enable FaaS providers to manufacture sophisticated and believable scams for cheap.

Deepfake and voice cloning

Deepfake and Voice Cloning

The accessibility of deepfake technologies and voice cloning tools means that it’s easier than ever to impersonate victims on social media and over the phone.

Cryptocurrencies

Cryptocurrencies

Privacy-focused cryptocurrencies, like Monero (XMR) and Secret (SCRT), allow buyers to make untraceable FaaS purchases, and let FaaS providers launder money with ease.

Ransomware-as-a-Service (RaaS)

Ransomware-as-a-Service (RaaS)

This growing subset of fraud involves sophisticated FaaS providers who write ransomware and then launch attacks via affiliates.

The development of scam-enhancing technologies will almost certainly outpace regulators. Governments will need to play catch-up by enacting stricter laws targeting FaaS providers, their clients, and darknet transactions at large.

Law enforcement agencies, meanwhile, will need to invest heavily in specialized cybercrime units with expertise in cryptocurrency tracking, darknet investigations, and AI-driven threat detection. 

Still, the internet’s borderless nature will render domestic regulation alone hopelessly ineffective. Instead, a coordinated global effort that involves intelligence sharing and joint investigations will become table stakes; anything less is unlikely to be sufficient.

Next Chapter

Fraud as a Service Statistics

We’ll run the numbers; You’ll see the savings.
triangle shape background particle triangle shape background particle triangle shape background particle
Please share a few details and we'll connect with you!
Revenue Recovery icon
Over 18,000 companies recovered revenue with products from Chargebacks911
Close Form
Embed code has been copied to clipboard