The Apex Predator: How Industrialisation, AI, and CaaS Models Are Defining the Future of Cybercrime

The Apex Predator: How Industrialisation, AI, and CaaS Models Are Defining the Future of Cybercrime
Photo by Immo Wegmann / Unsplash

The cybercrime ecosystem has undergone a fundamental transformation, evolving from disparate attacks into a professionalized, industrialized economy. The year 2024 marked a turning point, defined by the widespread adoption of automation, specialization, and the transformative influence of Artificial Intelligence (AI). This in-depth look examines how the industrialisation of illicit activities, powered by Cybercrime-as-a-Service (CaaS) models, is shaping global threats and how strategic responses are fighting back.


1. The Industrialisation and Specialisation of Cybercrime

The contemporary cyber threat landscape has adopted structures and processes similar to legitimate markets, focusing on the distribution, automation, and rationalisation of tasks among malicious actors. This industrialisation has led to extreme specialization, which fundamentally changed how cybercriminals interact.

  • Specialised Roles: Today, criminal groups are often composed of individuals with specific computer skills or financial capacities. They maintain close ties with money laundering operators who use both traditional methods and cryptoassets. Specialization means some actors focus exclusively on developing malware, while others concentrate on selling compromised network access or stolen data.
  • Initial Access Brokers (IABs): A prime example of this specialization is the rise of Initial Access Brokers (IABs). These malicious actors focus solely on identifying and exploiting vulnerabilities to gain initial access to a victim’s computer network. They then resell this access—often in the form of RDP or VPN credentials—to other criminal groups, who execute large-scale attacks like ransomware or data exfiltration. Access prices can range from a few hundred euros to tens of thousands, depending on the target's profile.
  • Underground Infrastructure: Cybercriminals rely on extensive communication and technical infrastructure to optimize their operations. Cybercrime forums are central to these exchanges, acting as marketplaces where actors can buy access to company servers, lease malicious software, outsource tasks, and monetize illegal services.

2. The Rise of Cybercrime-as-a-Service (CaaS)

Cybercrime-as-a-Service (CaaS) is the online provision of ready-made skills or tools in exchange for payment, typically conducted on closed forums. CaaS makes sophisticated criminal activities accessible even to individuals, such as minors and young adults, attracted by the possibility of quick financial gain.

CaaS encompasses several critical sub-categories that facilitate every stage of a cyberattack:

CaaS Sub-CategoryFunction and ImpactSources
Ransomware-as-a-Service (RaaS)This is the most common CaaS model. It involves developer groups creating ransomware and providing the tools to affiliates who deploy the software and share a percentage of the ransom proceeds.
Malware-as-a-Service (MaaS)The rental or sale of ready-to-use malicious software, notably infostealers. Infostealers—which extract sensitive data like credentials, cryptoasset wallets, and bank cards—have become one of the most critical threats in 2024.
DDoS-as-a-Service (DaaS)The rental of botnets (networks of compromised machines) to launch Distributed Denial of Service (DDoS) attacks that overload servers until saturation.
Phishing-as-a-Service (PhaaS)A turnkey service providing customers with the tools necessary to launch a phishing campaign.
Deepfake-as-a-Service (DFaaS)Platforms that emerged in 2024, enabling even non-technical people to create AI-generated fake videos and audio for malicious purposes.

A key component supporting CaaS is bulletproof hosting, which provides technical infrastructure that tolerates illegal content (such as malware hosting or C2 servers) and offers anonymization services, facilitating sustained criminal activities.

3. AI: The Unprecedented Threat and Opportunity

Artificial Intelligence (AI), especially generative AI, continued its evolution in 2024, acting as both an unprecedented threat and an unprecedented opportunity in cyberspace. Law enforcement must understand AI to effectively counter the growing criminal trend it facilitates.

AI as an Escalating Threat

AI is amplifying the scale and credibility of attacks, lowering the barrier to entry for many malicious actors.

  1. Enhanced Phishing and Social Engineering: AI is enabling actors to set up phishing campaigns that are increasingly credible and difficult for victims to detect. LLMs are used to generate thousands of personalized emails that impersonate trusted organizations, accelerating code analysis, and modifying existing malware.
  2. Deepfakes: Deepfakes—forged content capable of reproducing a person’s appearance or voice with disconcerting realism—became widely available in 2024. They are leveraged for frauds, scams, extortion (reputation harm), and disinformation, such as attempts observed during the 2024 Olympic Games.
  3. Automated Warfare: AI contributes to DDoS attacks by amplifying their impact and allowing attackers to manage multi-vector attacks in real time. Autonomous programs (agents) based on LLMs can already execute complex cyber attacks with a high success rate by exploiting documented vulnerabilities.
  4. Targeting AI Models: AI tools themselves are targets through data poisoning, where training datasets are intentionally contaminated to compromise model outputs or manipulate predictive behaviors.

AI as a Defensive Opportunity

AI is an essential tool for protecting information systems, detecting malicious behavior, and countering generative AI threats.

  1. CapIA Strategy: The Ministry of the Interior’s Cyberspace Command (COMCYBER-MI) has adopted the CapIA strategy. This collaborative approach aims to build a trusted AI system for citizen security, structured around four pillars: Sovereignty (mastery of development), Mastery (training and expertise), Responsible AI (adherence to an ethics charter), and Shared AI (partnerships).
  2. Innovative Detection Tools: AI offers the ability to process massive amounts of heterogeneous data (text, images, video) to identify imperceptible threats.
    • The Authentik AI project is a key initiative designed to identify synthetic media (deepfakes) by cross-referencing technical and contextual markers.
    • The ODIP project (Child Sexual Abuse Material Detection Tool) uses AI to create digital representations of illegal content, allowing automatic identification during digital analysis. This radically optimizes evidence processing and protects investigators from traumatic exposure.

4. Hybrid Threats and Evolving Modus Operandi

While traditional attacks like ransomware and phishing remain prevalent, cybercrime is increasingly merging the digital and physical realms, leading to hybrid operations.

  • Ransomware Shift: Although complaints fell 13% in 2024, ransomware remains significant. Attackers increasingly rely on data theft and threatening to disseminate it (double or triple extortion), rather than just encrypting data, to force payment. Groups like RansomHub have gained dominance following the weakening of LockBit due to international action.
  • Doxing and Physical Harm: Doxing involves the unauthorized public disclosure of a person's personal information (address, contact details) to intimidate or harass them. While initially observed in cybercriminal rivalries, it is now used by hacktivists for ideological reasons (e.g., during international conflicts or the Paris 2024 Olympic Games). Doxing creates a shift from digital risk to physical risk.
  • Cryptoasset Exploitation: Cryptoassets facilitate illicit transactions, serving as a means of payment (for ransomware, malware, drug trafficking), a direct source of income, or a money laundering tool. Sophisticated scams include fake investments, where victims are duped into sending cryptoassets to fabricated platforms. The rise of physical extortion of cryptoassets has also been observed in France, where organized crime groups use violence against holders, targeting high-profile individuals.
  • Spoofing: Spoofing—impersonating a legitimate organization to gain trust or access systems—is becoming increasingly sophisticated. This includes phone spoofing, widely used in corporate number impersonation (fake president scams) and fake bank adviser fraud.

To combat this industrialized threat, the European Union has adopted new legislative texts to strengthen security and regulate emerging technologies. These efforts are complemented by coordinated international law enforcement operations that dismantle core criminal infrastructure.

  1. NIS2 Directive: Effective October 17, 2024, this directive significantly strengthens cybersecurity across critical sectors (e.g., public administrations, banking, energy). It mandates technical and human measures, requires incident reporting within 72 hours (24 for serious events), and imposes steep penalties of up to €10 million or 2% of worldwide revenue for non-compliance.
  2. AI Act: In force since August 2, 2024, this regulation provides a legal framework for AI based on its level of risk. It strictly supervises high-risk uses (like biometric surveillance) and prohibits dangerous uses (like social scoring), establishing penalties of up to 7% of global revenue or €35 million.
  3. MiCA Regulation (Markets in CryptoAssets): In force since December 30, 2024, MiCA aims to regulate the cryptoasset market. It requires Virtual Assets Service Providers (VASPs) to obtain European authorization and prohibits fraudulent practices, thereby impacting how cybercriminals use cryptoassets for money laundering and payments.
  4. Evolving Case Law: Recent rulings have established strict boundaries on digital data use, requiring judge authorization to access mobile phone data in investigations (except in urgent cases) and reaffirming that the public availability of online data does not negate the need for legal compliance (GDPR principles of transparency and fairness).

Major Operational Successes

Coordinated international actions in 2024 focused on disrupting CaaS models and dismantling foundational infrastructure:

  • Operation Cronos (LockBit): In February 2024, this international operation successfully neutralized part of the LockBit RaaS network. The action resulted in the seizure of 34 servers, the freezing of more than 200 cryptoasset accounts, and the arrest of two individuals. This coordinated action severely weakened LockBit, reducing the number of attacks in France for the remainder of the year.
  • Operation Endgame: Launched in May 2024, this effort targeted several botnet networks (IceID, Smokeloader, Pikabot, BumbleBee) used to spread malware globally. The operation seized more than 100 servers, froze 99 cryptoasset wallets containing over €70 million, and seized over 2,000 malicious domains.
  • Infrastructure Takedowns: Other operations targeted specific infrastructure, such as Operation PowerOFF, which shut down 27 illegal DDoS-as-a-Service platforms, and the dismantling of encrypted messaging systems like GHOST and MATRIX, which were utilized by organized crime groups.

The current phase of cybercrime is characterized by professionalization and technological advancement, primarily driven by industrial specialization and the duality of AI. To enhance national cybersecurity resilience in the face of these sophisticated and evasive threats, governments, businesses, and citizens must prioritize the implementation of robust legal frameworks and support proactive operational strategies.

Read more