CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

PBaaS Providers Enable Industrial-Scale Pig Butchering Scams

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

Researchers have identified two service providers that supply tools and infrastructure to facilitate pig butchering-as-a-service (PBaaS) operations. These providers offer ready-made applications, fraud kits, and stolen identities, significantly lowering the barrier to entry for large-scale scams. The operations are linked to industrial-scale scam centers in Southeast Asia, where victims are coerced into fraudulent activities under threat of violence. The PBaaS economy includes CRM platforms for managing scam operations, mobile apps for victim engagement, and payment processing platforms like BCD Pay. Additionally, parked domains and typosquatting are being used to redirect visitors to scam and malware sites. Recent attacks using the Evilginx AitM toolkit and a sprawling gambling network with APT-like characteristics further highlight the sophistication and scale of these operations.

Timeline

  1. 12.01.2026 09:34 1 articles · 23h ago

    PBaaS Providers Enable Industrial-Scale Pig Butchering Scams

    Researchers have identified two service providers that supply tools and infrastructure to facilitate pig butchering-as-a-service (PBaaS) operations. These providers offer ready-made applications, fraud kits, and stolen identities, significantly lowering the barrier to entry for large-scale scams. The operations are linked to industrial-scale scam centers in Southeast Asia, where victims are coerced into fraudulent activities under threat of violence. The PBaaS economy includes CRM platforms for managing scam operations, mobile apps for victim engagement, and payment processing platforms like BCD Pay. Additionally, parked domains and typosquatting are being used to redirect visitors to scam and malware sites. Recent attacks using the Evilginx AitM toolkit and a sprawling gambling network with APT-like characteristics further highlight the sophistication and scale of these operations.

    Show sources

Information Snippets