2024, the year of Fraud-as-a-Service

Issue 1 2025 Information Security

AU10TIX released its 2024 Report on Global Identity Fraud. Drawing insights from millions of transactions processed around the globe from January to December 2024, the report uncovers significant trends in large-scale organised identity fraud. The report, titled 2024: The Year of Fraud-as-a-Service (FaaS) outlines how ‘the industry’s dark engine’ offers user-friendly fraud kits that enable amateurs to execute complex attacks against thousands of accounts in minutes.

“FaaS has elevated cybercrime, enabling a whole cohort of the population to join in on global fraud by launching large-scale attacks involving up to 8000+ incidents,” said Dan Yerushalmi, CEO of AU10TIX. “Using AI-driven tactics such as deepfake selfies and synthetic identities, organised fraudsters are testing traditional security measures like never before. Only by adopting more advanced fraud prevention techniques and multi-layered defences can businesses stay ahead of emerging threats and strengthen trust with their users.”

FaaS platforms provide all the tools, templates and automation that fraudsters need to commit widescale identity fraud, deepfakes, and cyberattacks, including:

• Deepfake generators to create synthetic selfies and videos.

• Botnets to automate mass-scale account creation and takeover.

• Phishing kits for email and web-based scams.

• Dark web marketplaces: a hub for buying stolen data.

Mega attack of 4580 unique permutations

In one instance, AU10TIX detected a single mega attack spanning four geographies (APAC, EMEA, LATAM, NA) and three industries (payments, crypto, social media). It involved 4580 unique permutations of the same ID template and had all the markings of a FaaS-enabled attack.

APAC led the pack as the epicentre of 2024’s mega attacks, taking 88% of the overall share.

Other 2024 trends

Social media became a critical battleground for fraud and misinformation in 2024, with a surge of activity related to elections, international conflicts, and other hot-button topics. Users also increasingly leveraged these platforms for e-commerce, which opened the door for fraudsters to conduct illicit activities that were once confined to payments, banking, crypto, and other fintech platforms. As a result, 30% of identity fraud attacks targeted social media in Q4, compared to a mere 3% in Q1.

As fraud increased on social media platforms, it declined in the payments sector, historically the most targeted industry. Payments saw 54% of attacks in Q1, but the number had declined to 43% by Q4 due to stricter law enforcement. Attacks against the crypto sector also decreased to 24% and stabilised following the implementation of MiCA regulations in 2023 [EU regulations that establish uniform market rules for crypto-assets – Ed.].

Key takeaways

AU10TIX’s 2024 report offers three actionable insights to help organisations protect against identity fraud:

1. Social media platforms must invest in smarter fraud detection. Enhanced selfie and fraud detection tools are necessary to protect social media engagement, ensure account authenticity, and prevent the risks posed by fake accounts.

2. Engage in transparent collaboration. Consortium validation and visual fraud simulations are powerful tools against FaaS-driven mega attacks. Organisations can leverage consortium insights to add a robust second layer of protection and risk mitigation.

3. Be proactive. Do not just react to what is happening now; prepare for what is coming next. Futureproofing means adopting AI-driven validation and multi-layer defences to combat deepfakes, synthetic identities, and emerging threats.

The report is available at https://tinyurl.com/39ahbxpu




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
Check Point launches African Perspectives on Cybersecurity report
News & Events Information Security
Check Point Software Technologies released its African Perspectives on Cybersecurity Report 2025, revealing a sharp rise in attacks across the continent and a major shift in attacker tactics driven by artificial intelligence

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
Sophos announces evolution of its security operations portfolio
Information Security
Sophos has announced significant enhancements to its security operations portfolio via Sophos XDR and Sophos MDR offerings, marking an important milestone in its integration journey following the acquisition of Secureworks in February 2025.

Read more...
Cybersecurity operations done right
LanDynamix SMART Security Solutions Technews Publishing Information Security
For smaller companies, the costs associated with acquiring the necessary skills and tools can be very high. So, how can these organisations establish and maintain their security profile amid constant attacks and evolving technology?

Read more...
AI security with AI Cloud Protect
Information Security
AI Cloud Protect is now available for on-premises enterprise deployments to secure AI model development, agentic AI applications, and inference workloads with zero impact on performance.

Read more...
Kaspersky finds security flaws that threaten vehicle safety.
News & Events Information Security Transport (Industry)
At its Security Analyst Summit 2025, Kaspersky presented the results of a security audit that exposed a significant security flaw enabling unauthorised access to all connected vehicles of one automotive manufacturer.

Read more...
The overlooked risks of everyday connectivity
Information Security
That free Wi-Fi you are using could end up costing you a lot more money than your hotspot data if it has been compromised, says Richard Frost, head of technology solutions and consulting at Armata Cyber Security.

Read more...
Syndicates exploit insider vulnerabilities in SA
Information Security Security Services & Risk Management
Today’s cyber criminals do not just exploit vulnerabilities in your systems; they exploit your people, turning trusted team members into unwitting accomplices or deliberate collaborators in their schemes.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.