eCommerce Fraud Knowledge Guide

Fraud as a Service (FaaS)

  1. Articles
  2. eCommerce Fraud
  3. Fraud as a Service (FaaS)
  4. What is Fraud as a Service?
Fraud as a Service (FaaS)

Knowledge Guide Chapters

  1. What is Fraud as a Service?
  2. How Does Fraud as a Service Work?
  3. Fraud as a Service Statistics
  4. Fraud as a Service Examples
  5. How to Identify Fraud as a Service Attacks
  6. How to Prevent Fraud as a Service Attacks

What is Fraud as a Service?Heard About SaaS? Well, How About FaaS?

Harlan Hutson | December 26, 2025 | 4 min read
What is Fraud as a Service?

What is Fraud as a Service? Definitions & Overview

If you’re using Microsoft Office or Quickbooks, you know that these solutions don’t come with installation disks anymore. Most popular softwares these days are sold as a service on a subscription basis.

This model, known as software as a service (SaaS), provides access to software through the internet. It was popularized in the 1990s as a more efficient way to deliver the product. From a customer perspective, it saves IT departments the time and hassle of new installations and setups, constant maintenance, and ongoing upgrades. It also ensures that users are always working with the most up-to-date features and security patches.

Alarmingly, fraud appears to be heading in a similar direction. Rather than carrying out fraudulent schemes themselves, bad actors world-wide can now purchase fraud-enabling tools, data, or services from professional, organized criminal rings. Anything from account takeover kits and synthetic identities to stolen card numbers to denial-of-service capabilities purchased and used by third party fraudsers, with no need for advanced technological savvy.

In this article, we take a closer look at Fraud as a Service (FaaS), why it’s popular, how it’s used, and why it spells trouble for its victims.

Fraud as a Service (FaaS)

Similar to software as a service (SaaS), buyers who purchase Fraud as a Service (FaaS) products don’t need to understand the inner workings of program how to carry out the fraud themselves. That’s a big problem for legitimate merchants and consumers: it means that even the least sophisticated bad actors can launch complex and large-scale attacks with nothing more than an internet connection.

What is Fraud as a Service?

Fraud as a Service

[noun]/frôd • əz • ā • sərvəs/

Fraud as a Service is a process by which an individual bad actor provides tools and services to others to facilitate their commission of fraudulent online activity. FaaS can involve diverse tactics for perpetrating fraud.

In contrast to standalone fraud tactics like chargeback fraudidentity theftSIM swapping, or account takeover fraud, fraud as a service (FaaS) involves scams carried out by professional fraudsters on behalf of paying clients.

Essentially, picture an underground version of software as a service (SaaS). But, rather than selling project management, time tracking, or sales enablement software, criminal FaaS enterprises sell prepackaged fraud or fraud kits like stolen payment information, social security numbers, business email compromise tools, and phishing scripts.

FaaS vendors will carry out scams on behalf of customers that don’t have the skills or infrastructure to do them on their own. I’ll highlight a few of the most common illicit services below.

Where Are FaaS Services Sold?

TL;DR

Fraud as a Service is sold like legit B2B software, complete with pricing tiers, support, and guarantees. It can be purchased across dark web marketplaces, encrypted platforms like Telegram and Discord, and even surface-web forums disguised as legitimate tools.

As the fraud economy became more professionalized, fraud services grew beyond back-alley operations into a streamlined, corporate-style marketplace.

FaaS providers market and deliver their “products” with the same vigor as legitimate B2B companies. Some, for instance, may offer tiered pricing models, discounts, and technical support. Other established FaaS providers may even use customer review systems and performance guarantees to build trust with customers. Services can be easily purchased on both the hidden and visible web.

Distribution channels include:

Dark Web Marketplaces

Think of these encrypted bazaars as the Amazon of the criminal underworld. Like many legitimate merchants of record (MoR). Illicit dark web marketplaces may function as escrow agents, ensuring the buyer only pays once the stolen data or FaaS tool is verified as functional.

This layer of “consumer protection” for criminals means that high-value FaaS assets, such as custom-coded malware or bulk credit card dumps, can be exchanged anonymously. This service minimizes the risk of criminals being scammed by other criminals. (Goodness knows, we wouldn’t want that.)

What is Fraud as a Service?

Telegram Channels

Encrypted messaging platform Telegram has become a busy hub for all sorts of fraud. Available services range from crypto scams to social engineering and phishing attacks disguised as giveaways, fake support, or investment schemes.The platform can also provide “instant access” fraud products such as bots or tools that facilitate credential theft or OTP harvesting.

Encryption aside, Telegram’s ease of use, broadcast capabilities, and minimal identity requirements mean that FaaS operators can co-opt the platform to reach thousands of potential buyers simultaneously with real-time updates, offers, and even customer support.

What is Fraud as a Service?

Discord Servers

Originally designed for gamers, Discord is increasingly used to host private, invite-only communities where younger, novice scammers trade FaaS methods. The platform has been cited as an efficient means of distributing and trading cybercrime tools/content, likely encouraging criminal activity.

These servers sometimes operate as illicit mentorship forums, where senior fraudsters provide coaching to amateurs. This mentoring typically comes in exchange for a subscription fee or perhaps a cut of any proceeds from successful fraud.

Surface Web Forums Disguised As Legitimate Services

Some FaaS platforms operate in plain sight – or at least only partially masked – by cloaking their offerings as something more legitimate. Security research tools, load testers, “educational” resources, or even “antivirus” software can hide illicit activity.

By using plausible deniability, bad actors can potentially bypass search engine filters. The goal is to provide tools designed to exploit vulnerabilities in eCommerce checkout flows and anti-fraud filters.

Who Uses Fraud as a Service?

TL;DR

From unsophisticated novices to global fraud rings, anyone with an internet connection can theoretically purchase, use, and launch FaaS-enabled attacks.

FaaS has effectively democratized cybercrime by removing many of the technical barriers. The technical execution, previously requiring the hands of elite hackers, are now more commonly available to anyone with criminal intent.

Put another way, FaaS customers don’t actually need the skills to design and launch an attack themselves. Now, they can outsource all of that to specialized providers. All it takes to become a fraudster is a modest budget, a basic internet connection, and the ability to purchase FaaS. 

That helps big-time crooks, of course, but it also means that your neighbor, your co-worker, or even you can become a professional fraudster. You end up with a much wider pool of participants and exponentially increase overall fraud volume.

So who is actually turning to FaaS? Here are some common examples:

The Opportunistic Amateur

The Opportunistic Amateur

Individuals who possess little to no technical skill use plug-and-play FaaS kits to launch professional-grade phishing or carding attacks. By simply renting a pre-configured infrastructure, they become significant threats to eCommerce merchants overnight.

Organized Crime Syndicates

FaaS enables global criminal enterprises to scale operations without the overhead of an in-house R&D department. Crooks focus on high-level laundering and resource extraction while outsourcing labor-intensive tasks like botnet management or data harvesting.

The Opportunistic Amateur

Cyber Shoplifters

Cyber Shoplifters

“Chargeback as a Service” platforms also exist, and can be used to automate the dispute filing process. The crooks obtain goods and services from legitimate merchants using FaaS tools to hack promos and coupons, bypass merchant return policies, or force refunds through professionalized dispute manipulation.

Next Chapter

How Does Fraud as a Service Work?

We’ll run the numbers; You’ll see the savings.
triangle shape background particle triangle shape background particle triangle shape background particle
Please share a few details and we'll connect with you!
Revenue Recovery icon
Over 18,000 companies recovered revenue with products from Chargebacks911
Close Form