Connect with us

Published

on

“Looking back to the 1990s and early 2000s, you needed to have a reasonable level of technical competence to pull off these types of crimes,” Nicholas Court, assistant director of Interpol’s Financial Crime and Anti-Corruption Centre, told CNBC.

Imaginima | E+ | Getty Images

An expanding network of cybercrime marketplaces is making it easier than ever to become a professional fraudster, posing unprecedented cybersecurity threats worldwide, experts warn.

Cybercriminals are often portrayed in popular media as rogue and highly skilled individuals, wielding coding and hacking abilities from a dimly lit room. But such stereotypes are becoming outdated. 

“Looking back to the 1990s and early 2000s, you needed to have a reasonable level of technical competence to pull off these types of crimes,” Nicholas Court, assistant director of Interpol’s Financial Crime and Anti-Corruption Centre, tells CNBC. 

Today, the barriers to entry have come down “quite significantly,” Court said. For example, obtaining personal data, such as email addresses, and sending them spam messages en masse — one of the oldest online scams in the book — has never been easier.

Cybersecurity experts say the change is due to advances in scam technology and the growth of organized online markets where cybercrime expertise and resources are bought and sold. 

A growing cybercrime economy 

“The last decade or so has seen an evolution of rogue cybercriminals into organized groups and networks all of which are part of a thriving underground economy,” said Tony Burnside, vice president and head of Asia-Pacific at Netskope, a cloud security company.

Driving that trend has been the emergence of global underground markets that offer “cybercrime-as-a-service” or “CaaS,” through which vendors charge customers for different types of malicious tools and cybercrime services, he added.

Examples of CaaS include ransomware and hacking tools, botnets for rent, stolen data, and anything else that may aid cybercriminals in their illicit activities.

“The availability of these services certainly helps in enabling more cybercriminals, allowing them to scale up and sophisticate their crime while reducing the technical expertise required,” Burnside said. 

CaaS is often hosted on markets in the “darknet” — a part of the internet that uses encryption technology to protect the anonymity of users.

Examples include Abacus Market, Torzon Market and Styx, though the top markets often change as authorities shut them down and new ones emerge. 

Burnside adds that the criminal gangs operating CaaS services and markets have begun to operate like “legitimate organizations in their structure and processes.”

Meanwhile, vendors on these illicit exchanges tend to accept payments only in cryptocurrency in attempts to remain anonymous, obscure proceeds and evade detection. 

Silk Road, an infamous dark web marketplace that was shut down by law enforcement in 2013, is recognized by many as one of the earliest large-scale applications of cryptocurrency.

Darknet emerges from shadows 

Though the use of cryptocurrencies in the cybercrime market can help obscure the identities of participants, it can also make their activities more traceable on the blockchain, according to Chainalysis, a blockchain research firm that traces illicit crypto transactions. 

According to Chainalysis data, while darknet markets remain a major factor in the global cybercrime ecosystem, more activity is moving to the public internet and secure messaging services like Telegram. 

The largest of those marketplaces identified by Chainalysis is Huione Guarantee — a platform affiliated with Cambodian conglomerate Huione Group — which the firm says acts as a “one-stop shop for nearly every form of cybercrime.”

The Chinese-language platform operates as a peer-to-peer marketplace where vendors offer services Chainalysis says are linked to illicit activity like money laundering and crypto-based scams.

Vendors pay to advertise on the Huione website, often directing interested parties into private Telegram groups. If a sale is made, Huione appears to act as an escrow and dispute intermediary to “guarantee” the exchange.

Chainalysis data shows that vendors on Huione Guarantee have processed a staggering $70 billion in crypto transactions since 2021. Meanwhile, Elliptic, another blockchain analytics firm, estimates that Huione Group entities have received at least $89 billion in crypto assets, making it “the largest ever illicit online marketplace.

The platform advertises and directs potential buyers to vendor groups on Telegram that offer everything from scam technology and money laundering to escort services and illicit goods. 

Judging from the scale and volume of the transactions on Huione Guarantee, it is likely leveraged by numerous organized criminal groups, according to Andrew Fierman, head of national security intelligence at Chainlaysis.

However, he adds that the many services don’t cost much money, providing a low barrier to entry and access point into cybercrime for “anyone with internet connection.” 

According to Chainalysis, individuals looking to facilitate “romance” or investment scams may be able to purchase the necessary tools and services on Huione for just a couple of hundred dollars. Costs can reach thousands of dollars, depending on the level of complexity they are looking to execute.

Investing or romance scams involve a fraudster building a relationship with a victim via social media or dating apps, intending to con them out of money through a sham investment opportunity.

A scammer attempting to pull off this type of scam might shop Huione Guarantee for a portfolio of potential victims’ data, such as phone numbers; old social media accounts that appear to be from real people; and AI-powered facial and voice manipulation software, which can be used by a scammer to digitally disguise themselves. 

Other vendors on the site offer services related to the creation of fake investment and gambling platforms. Fiermen says scammers often deceive victims into depositing money on such platforms.

In a disclaimer on its website, the platform says it does not participate in or understand its customers’ specific businesses and is responsible only for guaranteeing payments between buyers and sellers, according to a CNBC translation of the Chinese-language statement.

According to Fierman, Huione Guarantee’s activity appears to be concentrated in Cambodia and China, but there’s evidence that other platforms are emerging. 

‘Child’s play’

As CaaS and cybercrime markets continue to grow, the technology that is offered and leveraged by criminal vendors has also advanced, allowing more sophisticated scams on scale — with less effort, experts say. 

AI-generated deepfake videos and voice cloning are increasingly looking more real, with previously infeasible attacks now realistic thanks to generative AI advancements, according to Kim-Hock Leow, Asia CEO of cybersecurity company Wizlynx Group. 

Last year, Hong Kong police reported that a finance worker at a multinational firm had been tricked into paying out $25 million to fraudsters using deepfake technology to pose as the company’s chief financial officer in a video conference call.

“This would have been completely impossible to pull off just a few years ago, even for criminals with technical skills, and now it is a viable attack even for those without,” added NetSkope’s Burnside.

Meanwhile, cybersecurity experts told CNBC that AI tools can be used to enhance phishing and social engineering scams, helping to write more personalized and human-like messages. 

“It has become child’s play to create really convincing fake emails, audio notes, images or videos designed to scam and trick victims,” said Burnside, noting that dark variants of legitimate generative AI tools continue to find their way into dark markets. 

Prevention efforts

Because of the global and anonymous nature of CaaS vendors and cybercrime marketplaces, they are very difficult to police, cybersecurity experts told CNBC, noting that markets that are shut down often resurface under different names or are replaced.

For that reason, Interpol’s Nicholas Court says cybercrime isn’t the type of activity “you can arrest your way out of.” 

“The volume of criminality is going up so fast that it is actually harder for law enforcement to catch the same proportion of cybercriminals,” he said, adding that this calls for a significant focus on prevention and public awareness campaigns to warn about the rapid sophistication of scams and AI tools.

“Almost everybody receives scam messages these days. While it used to be enough to tell people not to send money to someone that refuses to video call, that’s not enough anymore.” 

On the enterprise level, Wizlynx Group’s Leow says that as cybercriminals become more tech- and AI-savvy, so must companies’ cybersecurity protocols.

For example, AI tools can be used to help automate security systems on the enterprise level, lowering the threshold for detection and accelerating response times, he added.

Meanwhile, new tools are emerging, such as “dark web monitoring,” which can track cybercrime markets and underground forums for leaked or stolen data, including credentials, financial data, and intellectual property.

It’s “never been easier” to commit cybercrime, so it’s crucial to prioritize cybersecurity by investing in technological solutions and enhancing employee awareness, Leow said. 

Continue Reading

Technology

Google faces £5 billion lawsuit in the UK for abusing ‘near-total dominance’ in search

Published

on

By

Google faces £5 billion lawsuit in the UK for abusing 'near-total dominance' in search

The entrance to Google’s U.K. offices in London.

Olly Curtis | Future Publishing | via Getty Images

LONDON — Google is being sued for over £5 billion ($6.6 billion) in potential damages in the U.K. over allegations that the U.S. tech giant abused its “near-total dominance” in the online search market to drive up prices.

A class action lawsuit filed Wednesday in the U.K. Competition Appeal Tribunal claims that Google abused its position to restrict competing search engines and, in turn, bolster its dominant position in the market and make itself the only viable destination for online search advertising.

It is being brought by competition law academic Or Brook on behalf of hundreds of thousands of U.K.-based organizations that used Google’s search advertising services from Jan. 1, 2011, up until when the claim was filed. She is being represented by law firm Geradin Partners.

“Today, UK businesses and organisations, big or small, have almost no choice but to use Google ads to advertise their products and services,” Brook said in a statement Tuesday. “Regulators around the world have described Google as a monopoly and securing a spot on Google’s top pages is essential for visibility.

“Google has been leveraging its dominance in the general search and search advertising market to overcharge advertisers,” she added. “This class action is about holding Google accountable for its unlawful practices and seeking compensation on behalf of UK advertisers who have been overcharged.”

Google was not immediately available for comment when contacted by CNBC.

A 2020 market study from the Competition and Markets Authority (CMA) — the U.K.’s competition regulator — found that 90% of all revenue in the search advertising market was earned by Google.

The lawsuit claims that Google has taken a number of steps to restrict competition in search, including entering into deals with smartphone makers to pre-install Google Search and Chrome on Android devices and paying Apple billions to ensure Google is the default search engine on its Safari browser.

It also alleges Google ensures its search management tool Search Ads 360 offers better functionality and more features with its own advertising products than that of competitors.

Big Tech under fire

Continue Reading

Technology

Critical chip firm ASML flags tariff uncertainty after net bookings miss

Published

on

By

Critical chip firm ASML flags tariff uncertainty after net bookings miss

Jaap Arriens | Nurphoto | Getty Images

Dutch semiconductor equipment firm ASML on Wednesday missed on net bookings expectations, suggesting a potential slowdown in demand for its critical chipmaking machines.

ASML reported net bookings of 3.94 billion euros ($4.47 billion) for the first three months of 2025, versus a Reuters reported forecast of 4.89 billion euros.

Here’s how ASML did versus LSEG consensus estimates for the first quarter:

  • Net sales: 7.74 billion, against 7.8 billion euros expected
  • Net profit: 2.36 billion, versus 2.3 billion euros expected

In comments accompanying the results, ASML CEO Christophe Fouquet said that the demand outlook “remains strong” with artificial intelligence staying as a key driver. However, he added that “uncertainty with some of our customers” could take the company into the lower end of its full-year revenue guidance.

ASML is estimating 2025 revenue of between of 30 billion euros to 35 billion euros.

Fouquet said that tariffs are “creating a new uncertainty” both on a macroeconomic level and with respect to “our potential market demands.”

“So this is a dynamic I think we have to watch very carefully,” Fouquet said. “Now this being said, where we are today, we still see basically our revenue range for 2025 being between basically €30 and €35 billion.”

Global chip stocks have been fragile over the last two weeks amid worries about how U.S. President Donald Trump’s tariff plans will affect the semiconductor supply chain.

Last week, the U.S. administration announced smartphones, computers and semiconductors would be temporarily exempted from his so-called “reciprocal” duties on counterparties. But on Sunday, Trump and his top trade officials created confusion with comments that there would be no tariff “exception” for the electronics industry, and that these goods were instead moving to a different “bucket.”

On Tuesday, a federal government notice announced that the U.S. Commerce Department was conducting a national security investigation into imports of semiconductor technology and related downstream products. The probe will examine whether additional trade measures, including tariffs, are “necessary to protect national security.”

Continue Reading

Technology

Japan’s antitrust watchdog issues Google ‘cease and desist’ order over unfair trade practices

Published

on

By

Japan's antitrust watchdog issues Google 'cease and desist' order over unfair trade practices

An attendee takes a photograph using a Google Pixel 9 smartphone during the CP+ trade show in Yokohama, Japan on February 27, 2025.

Tomohiro Ohsumi | Getty Images News | Getty Images

The Japan Fair Trade Commission (JFTC) on Tuesday issued a cease and desist order against Google for unfair trade practices regarding search services on Android devices— a move that aligns with similar crackdowns on firms in the UK and the U.S. 

In a statement, the Commission said the American tech giant violated Japan’s anti-monopoly law by requiring Android device manufacturers to prioritize its own search apps and services through licensing agreements. 

While Google develops the Android operating system, separate manufacturing companies like Samsung and Lenovo produce handheld Android products, such as smartphones and tablets. Thus, licensing agreements are necessary to grant these manufacturers permission to preinstall Google apps, including its Play Store, onto devices.

However, JFTC said Google also used licenses to require manufacturers to preinstall and prominently feature Google Search and Chrome on devices, with at least six such agreements in effect with Android makers as of December 2024. 

The Commission added that the company required manufacturers to exclude rival search services as a condition of its advertising revenue-sharing model. 

Google-Wiz deal is a good test to see where antitrust laws sit, says Constellation's Ray Wang

Under Japan’s anti-monopoly law, businesses are prohibited from carrying out trade on restrictive terms that unjustly impede transaction partners’ business activities. 

JFTC first published the commencement of its probe into Google on October 23, 2023, and in April 2024, it approved a commitment plan from Google that addressed some of its anti-competitive concerns. 

The cease and desist order demonstrates a harder stance taken by the Japanese government as well as its first such action against a U.S. tech giant. 

The move also comes amid a trend of anti-competitive actions against Google globally. According to JFTC, it coordinated its probe with other overseas competition watchdogs that had experience investigating Google.

In a landmark case last year, a federal U.S. judge ruled that Google held an illegal monopoly in the search market, saying that its exclusive search arrangements on Android and Apple’s iPhone had helped to cement its dominance in the space.

Meanwhile, Britain’s competition watchdog opened an investigation into Google’s search services in January following the country’s implementation of new competition rules.

JFTC’s cease and desist orders that Google stop mandating that its own services be installed and featured prominently on smartphones. 

Additionally, the company should relax its restrictive conditions for the distribution of advertising revenue, allowing manufacturers to choose from a variety of options.

Google has also been asked to appoint an independent third party that will report to the JFTC on its compliance with the cease and desist order over the next five years.

Continue Reading

Trending