{"id":12727,"date":"2026-01-08T07:55:51","date_gmt":"2026-01-08T15:55:51","guid":{"rendered":"https:\/\/www.infoblox.com\/blog\/?p=12727"},"modified":"2026-01-09T09:51:35","modified_gmt":"2026-01-09T17:51:35","slug":"scaling-the-fraud-economy-pig-butchering-as-a-service","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/scaling-the-fraud-economy-pig-butchering-as-a-service\/","title":{"rendered":"Scaling the Fraud Economy: Pig Butchering as a Service"},"content":{"rendered":"<p><strong>Authors: Ma\u00ebl Le Touz and John W\u00f2jcik<\/strong><\/p>\n<h3>Introduction: Flooding the world<\/h3>\n<p>The scam industry has undergone massive transformations over the last decade. The clich\u00e9 image of the once-iconic Nigerian prince duping Westerners from a local cybercaf\u00e9 is now pass\u00e9. Western Africa is still a hotbed for digital fraud operations, but it has been superseded in both scale and efficiency by hundreds of industrial-scale scam centres now scattered throughout Southeast Asia.<\/p>\n<p>Over the past decade major Chinese-speaking criminal groups have managed to infiltrate a growing number of countries in Southeast Asia, securing vast amounts of land to build cities and special economic zones dedicated to crime operations. They have established sophisticated global money laundering and human trafficking networks dedicated to staffing these operations with tens of thousands of slave workers brought in from countries around the world and forced to scam from bases in Cambodia, Laos, Myanmar, the Philippines, and elsewhere.<\/p>\n<p>In this paper, we examine one of the key drivers of the ongoing sha zhu pan (pig butchering) epidemic: service providers supplying criminal networks with the tools, infrastructure, and expertise that enable their operations to scale. These providers have created a robust, booming pig butchering-as-a-service (PBaaS) economy\u2014not all that different from well-known malware and phishing-as-a-service (MaaS and PhaaS) models, that fuel cybercrime around the world.<\/p>\n<p>Here, we delve into PBaaS, discussing two specific actors in detail. The first offers customers access to all the material they need to run social engineering operations at the heart of these crimes, while the second offers the technical platforms necessary to manage the scams and their agents. We used underground forums to learn the specifics of the threat actor\u2019s offerings, including everything from stolen credentials to SIM cards. We purchased access to a management platform to get an inside look at how they scale. This very same platform was used by Chinese criminals arrested in the United States in February 2025 for defrauding victims of over US$13M.<sup>1<\/sup> In combination, these two actors demonstrate that the tools to run pig butchering scams at scale are now a commodity. Where it was once remarkable that a victim could lose US$250k or more, losses of this scale are now commonplace. Law enforcement and defenders need to look at new methods to tackle this exploding criminal ecosystem.<\/p>\n<h3>The Tools of the Trade<\/h3>\n<p>As shown below in Figure 1, sha zhu pan operations, often called pig butchering schemes, have evolved and now include a broad range of common typologies. From romance and investment scams to law enforcement impersonation and job or task scams, the tools necessary to run these operations are readily available on specific marketplaces.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/building-community-infobloxs-2025-giving-season-figure-1-scaled.png\" alt=\"Figure 1\" \/><\/p>\n<p class=\"image-caption\">Figure 1. Common types of sha zhu pan schemes running out of Southeast Asia. Elaboration based on UNODC (2025).<\/p>\n<p>Scammers need communication equipment and compelling scripts for social engineering, access to bank accounts, disposable devices, internet, social media accounts, profiles and content, and a website to direct their targets to. They also need a reliable way to quickly launder stolen funds and cryptocurrencies, and to move their wealth out of reach of law enforcement. This includes utilizing pre-registered SIM cards, fake identities and stolen social media accounts, smuggled Starlink satellites, and a rigged online investment platform. That said, while these various tools and components can be purchased, there are many, many pieces.<\/p>\n<p>Like baowangs or white labels for online gambling,<sup>2<\/sup> an entire ecosystem of service providers has quietly proliferated online in Southeast Asia, offering full packages and fraud kits containing everything required to set up shop and launch scalable online scam operations. This allows easy turnkey-like access to enter the scam trade just like phishing and malware service providers have offered for years. We have been able to track down multiple groups operating in this space and servicing criminal networks with a variety of PBaaS solutions.<\/p>\n<h3>Introducing the \u201cPenguin Account Store\u201d<\/h3>\n<p>We have identified one such group in the market using several names including Heavenly Alliance, Overseas Alliance, and Penguin Account Store (in Chinese). We\u2019ll refer to them simply as \u2018Penguin\u2019 moving forward.<\/p>\n<p>The actor openly advertises and sells fraud kits, scam templates, and other solutions to cybercriminals seeking to run their own schemes. As is characteristic of Chinese-speaking crime groups, Penguin is loosely organized and operates through a crime-as-a-service model, making it difficult to distinguish core operators from copycats.<\/p>\n<p>Penguin began with sh\u00e8 g\u014dng k\u00f9 (\u793e\u5de5\u5e93), literally, a \u201csocial worker database.\u201d This is a code word for the theft and resale of personally identifiable information (PII) belonging to Chinese citizens. This data is usually collected by state agencies and obtained via corruption or hacking.<\/p>\n<p>Sh\u00e8 g\u014dng k\u00f9 data is extensive, often containing years of bank records and travel history, documentation of political leanings and information about relatives. The scammers leverage this info to identify and target wealthy victims. Personal data is also used to establish trust and enrich social engineering tactics. After all, who other than your bank would call with knowledge of your recent transactions? And who else could possibly know about your income records besides the government? Figure 2 shows a panel containing many offerings for personal and financial data that is available for sale.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-as-a-service-figure-2.png\" alt=\"Figure 2\" \/><\/p>\n<p class=\"image-caption\">Figure 2. Sh\u00e8 g\u014dng k\u00f9 panel operated by Penguin. It includes services such as \u201chotel booking history,\u201d \u201ccriminal history,\u201d \u201cbanking history,\u201d and \u201crelatives search.\u201d<\/p>\n<p>The group also sells account data from Western social media platforms, including Tinder and WhatsApp, as well as login information from sites like Adobe and Apple\u2019s developer platforms. We show an example of the types of account information available for sale in Figure 3. The credentials they offer for sale are likely obtained through information stealers, but it is unknown whether they operate these or act as a broker for other threat actors. The prices are very affordable, with pre-registered social media accounts starting from just US$0.10 and increasing in value depending on the date of registration and authenticity.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-as-a-service-figure-3.png\" alt=\"Figure 3\" \/><\/p>\n<p class=\"image-caption\">Figure 3. Panel dedicated to stolen accounts on Western services<\/p>\n<p>The threat actor\u2019s current offerings include many other components necessary to run a large-scale pig butchering operation such as bulk pre-registered SIM cards, stolen social media accounts, 4G or 5G routers and IMSI catchers, \u201ccharacter sets\u201d (\u4eba\u8bbe\u5957\u56fe) or packages of stolen pictures used to lure victims. These are often harvested from the same social media profile to ensure authenticity and allow the scammers to deploy these images in a variety of social engineering scenarios.<\/p>\n<p>See Figures 4 and 5 for examples of some of the character sets for sale by Penguin. <\/p>\n<div class=\"img-container-3-col\">\n<img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-as-a-service-figure-4a.png\" alt=\"Figure 4a\" \/><br \/>\n<img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-as-a-service-figure-4b.png\" alt=\"Figure 4b\" \/><br \/>\n<img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-as-a-service-figure-4c.png\" alt=\"Figure 4c\" \/>\n<\/div>\n<p class=\"image-caption\">Figure 4. &#8220;Character sets&#8221; offered for sale. Those pictures\u2014stolen from social media\u2014will be used by scammers.<\/p>\n<div class=\"img-container\">\n<img decoding=\"async\" style=\"width:230px\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-as-a-service-figure-5b.png\" alt=\"Figure 5b\"><br \/>\n<img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-as-a-service-figure-5a.png\" alt=\"Figure 5a\">\n<\/div>\n<p class=\"image-caption\">Figure 5. The Penguin Account Store selling anonymous SIM cards and credit cards in bulk.<\/p>\n<p>To further accelerate the scamming process and reduce manual tasks, Penguin even offers a Social Customer Relationship Management (SCRM) platform that they call \u201cSCRM AI\u201d. SCRM platforms were created to allow legitimate brands to centralize operations and streamline community management, but are increasingly abused by scam operators for mass account takeovers and automated victim engagement on social media. It is unknown how much AI is in the SCRM AI product; see Figure 6.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-as-a-service-figure-6.png\" alt=\"Figure 6\" \/><\/p>\n<p class=\"image-caption\">Figure 6. Advertisement for Penguin&#8217;s SCRM product, which hints at the use of AI.<\/p>\n<p>The threat actor also advertises BCD Pay, a payment processing platform. BCD Pay, which links directly to the Bochuang Guarantee (\u535a\u521b\u62c5\u4fdd\u81ea), is an anonymous peer-to-peer (P2P) solution \u00e0 la Huione, with deep roots in the illegal online gambling space. This company is mysterious; <a href=\"https:\/\/web.archive.org\/web\/20250918012718\/https:\/\/tickets.sigma.world\/img\/SiGMA Asia-Event Guide-2024.pdf\" target=\"_blank\"><strong>the only place where Bochuang has been mentioned publicly was a SiGMA trade show<\/strong><\/a>, a casino event sponsored by DB Gaming aka <a href=\"https:\/\/insights.infoblox.com\/resources-report\/infoblox-report-vigorish-viper-a-venomous-bet\" target=\"_blank\"><strong>Vigorish Viper<\/strong><\/a>. See Figure 7.<\/p>\n<div class=\"img-container\">\n<img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-as-a-service-figure-7a.png\" alt=\"Figure 7a\"><br \/>\n<img decoding=\"async\" style=\"width:330px\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-as-a-service-figure-7b.png\" alt=\"Figure 7b\">\n<\/div>\n<p class=\"image-caption\">Figure 7. Mention of a Bochuang booth at Sigma, a gambling trade show. On the right, a money mule offering their services from Myanmar on the Bochuang Telegram channel.<\/p>\n<p>Despite all the tools offered by Penguin, scammers still need one thing: a platform they can direct victims to\u2014the actual pig butchering website and fraud content. Such platforms are provided by different groups within the PBaaS economy.<\/p>\n<h3>UWORK Customer Relationship Management (CRM)<\/h3>\n<p>There are dozens of sellers advertising kits, on Telegram and other social media sites, that allow for content and agent management. These include customer relationship management (CRM) platforms that provide centralized control over several individual agents. We were able to acquire CRM access from one of these sellers, \u201cUWORK,\u201d whose products were leveraged by Chinese criminal actors to steal in excess of US$13M. According to a recently prosecuted case<sup>3,4<\/sup> UWORK provided the template for lion-forex[.]com, known as Lion Brokers, a fake investment platform mentioned in the indictment; see Figure 8. The website queries resources from uworkcrm[.]com, a domain found in hundreds of other sha zhu pan websites. A large number of mobile app pages\u2014offering both iOS and Android downloads\u2014also use this CRM tool and domain.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-as-a-service-figure-8.png\" alt=\"Figure 8\" \/><\/p>\n<p class=\"image-caption\">Figure 8: Archived homepage of the lion-forex[.]com website showing a login to fake investment platform Lion Brokers. Accessed at: <a href=\"https:\/\/urlscan.io\/result\/32a23697-ebc8-473c-a44b-b2c456c26633\/\" target=\"_blank\"><strong>https:\/\/urlscan.io\/result\/32a23697-ebc8-473c-a44b-b2c456c26633\/<\/strong><\/a><\/p>\n<p>During our analysis of UWORK, we found DNS signatures that allow us to track their activity. Furthermore, we were able to discover that the actor was operating from Taiwan, while their customers were located throughout Southeast Asia. Access to the CRM tool gave us a better understanding of how these PBaaS offerings work.<\/p>\n<h3>Using the Template Apps<\/h3>\n<p>After successfully logging into the CRM platform with credentials supplied by the seller, we were presented with an admin panel offering a variety of customization options and support for dozens of languages. Initial setup is a multi-step process, requesting the administrator to configure settings to interface with their email provider and their trading broker. The platform offers multiple pre-made templates, including those geared towards crypto, forex or gold investment. The resulting website can also be easily geofenced\u2014i.e. restricted to IPs from certain countries\u2014in an effort to avoid law enforcement takedowns in high-risk jurisdictions. Websites can be configured to interface with email and Telegram for automated customer contacts and updates. The icing on the cake? The platform\u2019s Know Your Customer (KYC) panel requires victims to upload proof of their identity, just like on a real trading website. One can only imagine what will happen to that PII once it\u2019s in the hands of these scammers.<\/p>\n<p>When the website is up and running, the admin can create multiple profiles for the agents running the scams and set very precise rules. However, the admins don\u2019t run the scams (interface with the victims)\u2014this is done by \u201cfirst-level agents,\u201d possibly including forced labor.<\/p>\n<p>First-level agents have very restricted access and can only perform basic operations on the victim accounts that they are handling. For example, if a victim deposits more than a threshold amount, the admin will be notified, and the money will be automatically transferred from the deposit account to one inaccessible by the first-level agent. This is likely designed to prevent first-level agents from keeping the money for themselves.<\/p>\n<p>The administrators have access to multiple dashboards that display profitability metrics of the complete operation, broken down by each individual agent. They also enjoy a variety of tools at their fingertips to avoid detection, such as requiring admin review for user registration. Figures 9 and 10 show the panel used to add a new victim account to the website.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-as-a-service-figure-9.png\" alt=\"Figure 9\" \/><\/p>\n<p class=\"image-caption\">Figure 9. Admin panel from the same tool used by indicted criminals Jiao Jiao Liu et al., offering templates in over a dozen languages.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-as-a-service-figure-10.png\" alt=\"Figure 10\" \/><\/p>\n<p class=\"image-caption\">Figure 10. Panel to add a new victim account and assign them a direct agent.<\/p>\n<p>The admin panel offers everything needed to run a pig butchering operation. Multiple email templates, user management, agent management, profitability metrics, as well as chat and email records. The management of agents is very complex, and agents can even be affiliates of one another.<\/p>\n<h3>Other Features of PBaaS<\/h3>\n<p>Pig butchering service providers do far more than offer static websites with simple deposit links. As the industry has evolved, they have made efforts to appear more credible and authentic, with offerings now resembling well-known finance applications. Many of the larger platforms claim integration with one of the popular online trading platforms such as MetaTrader. PBaaS providers will often rent a VPS and register as a broker with the trading platform, before leasing access to their customers. Using MetaTrader allows the scammer to display real-time financial information, which helps them appear more credible, but also grants access to a trusted mobile application and recognized brand. See Figure 11.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-as-a-service-figure-11.png\" alt=\"Figure 11\" \/><\/p>\n<p class=\"image-caption\">Figure 11. A credible-looking real-time ticker graph as displayed on the scam websites.<\/p>\n<p>Upon installation, victims are asked to choose a broker (i.e., the scammers) who will then have full access to the funds and the trading tools. MetaQuotes, the Cypriot company developing the MetaTrader platform, rejects all responsibility and claims to be a simple intermediary, leaving the victims to try to track down the individual brokers they interacted with. Figure 12 shows the attribution of a \u201cMeta number\u201d (used for trading) to new victims. <\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-as-a-service-figure-12.png\" alt=\"Figure 12\" \/><\/p>\n<p class=\"image-caption\">Figure 12. Victim panel displaying their MTAccount number and current balance for each user<\/p>\n<p>Some fraud syndicates can mix real transactions with fictional ones to obfuscate financial streams. With access to valid trading accounts, scammers can move large sums of money, from both legitimate and illegitimate sources. <\/p>\n<h3>Mobile Applications<\/h3>\n<p>Suppliers of PBaaS have also automated the provision and supply of mobile applications. On Android, this process is simple: users can install any given binary packaged as an .apk. It is more restricted on iOS. Any given iOS developer can enroll a limited number of devices and users into a \u201ctesting program,\u201d and there is a thriving shadow economy that provides developer certificates and testing accounts.<\/p>\n<p>Users (victims) receive a .mobileprovision file, and if they approve it from a mobile device, the developer will obtain access to the device\u2019s management suite and be able to install their \u2018testing\u2019 binary. This is abused to bypass China\u2019s appstore controls so that users can install gambling, pig butchering and porn apps, and it poses considerable risks to the victims. Apps distributed this way completely sidestep verification programs and can contain any sort of malware. Moreover, devices themselves can then be managed by the developer&#8217;s account, offering functionalities such as geolocation, remote wiping or traffic interception.<\/p>\n<p>Some PBaaS actors have chosen to release their apps in real stores, increasing their availability and simplifying installation considerably. To avoid detection by automatic app store code reviews, they have hidden the trading functionality behind decoys. For example, the \u201cnews app\u201d in Figure 14 below actually represents a pig butchering panel. The only way to display the trading panel is to enter a specific password in the search bar. Sidestepping the mobile app issue entirely, scammers can also develop a website that looks like a mobile app and asks the user to pin it on their phone\u2019s screen. Although cost-effective, it does not offer the same service quality and usability as a native app.<\/p>\n<div class=\"img-container-3-col\">\n<img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-as-a-service-figure-13a.png\" alt=\"Figure 13a\" \/><br \/>\n<img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-as-a-service-figure-13b.png\" alt=\"Figure 13b\" \/><br \/>\n<img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-as-a-service-figure-13c.png\" alt=\"Figure 13c\" \/>\n<\/div>\n<p class=\"image-caption\">Figure 13. A decoy news app that is secretly a scam trading platform<\/p>\n<h3>Cost Benefit Analysis<\/h3>\n<p>Website templates that include hosting can cost as little as US$50, as shown in Figure 14 below. A complete pack, including a website with admin access, VPS hosting, mobile app, access to a trading platform, company incorporation in a tax haven, and even registration with the relevant local financial regulator, can start at 20,000 yuan (about US$2,500). Through this setup, an operation the size of that in the previously mentioned Jia vs. the United States case, for instance, could achieve a return on investment (ROI) of approximately 70,000%.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-as-a-service-figure-14.png\" alt=\"Figure 14\" \/><\/p>\n<p class=\"image-caption\">Figure 14: Panel of a template seller advertising pig butchering crypto apps and fake shops, another form of cyber-enabled fraud.<\/p>\n<h3>Shell Companies&#8230; as a Service?<\/h3>\n<p>Asian crime syndicates conducting cyber-enabled fraud increasingly rely on professional enablers and facilitators not just for technical infrastructure, but also to help them mask their activities. These facilitators play an integral role in the scam ecosystem, creating ready-made front companies\u2014often registered in bulk\u2014that give scam operations a veneer of legitimacy while helping syndicates obscure complex financial flows across offshore jurisdictions. Telegram marketplaces now openly sell company registrations and nominee directors, particularly in countries such as Cyprus, Malta and the Seychelles, as well as \u201cidentity laundering\u201d packages that exploit citizenship-by-investment programs in countries including Cambodia, Dominica, St. Kitts and Nevis, and Vanuatu.<\/p>\n<p>PBaaS actors recognize this and now offer services to create companies for scammers. See Figure 15 for two examples. As we highlighted in our <a href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/pig-butchering-scams-and-their-dns-trail-linking-threats-to-malicious-compounds\/\"><strong>prior pig butchering research<\/strong><\/a> focusing on the Golden Triangle Special Economic Zone, in addition to leveraging PBaaS templates, some UK addresses, even single apartments, have been used to register tens of thousands of such entities with Chinese-linked nominees. We identified specific addresses, often apartments in the UK, where tens of thousands of companies, all with Chinese nominee directors, were registered. <\/p>\n<div class=\"img-container\">\n<img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-as-a-service-figure-15a.png\" alt=\"Figure 15a\"><br \/>\n<img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-as-a-service-figure-15b.png\" alt=\"Figure 15b\">\n<\/div>\n<p class=\"image-caption\">Figure 15. On the left, a template seller advertising incorporation services in Saint Lucia, a Caribbean tax heaven. On the right, another seller advertising some of the companies they created.<\/p>\n<p>Company creation packages often include formal corporate registration with relevant financial authorities. This helps the scammers to establish credibility. See Figure 16. <\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-as-a-service-figure-16.png\" alt=\"Figure 16\" \/><\/p>\n<p class=\"image-caption\">Figure 16. A template seller offering different decoy websites, as well as company registration and financial licenses.<\/p>\n<h3>Conclusion<\/h3>\n<p>The explosion of cyber-enabled fraud in Southeast Asia and the billions of dollars in financial losses recorded annually has far-reaching consequences increasingly felt around the world. Sophisticated Asian crime syndicates have created a global shadow economy from their safe havens in Southeast Asia. PBaaS provides the mechanisms to scale an operation with relatively little effort and cost. <\/p>\n<p>Large scam compounds such as the Golden Triangle Economic Zone (GTSEZ) are now using ready-made applications and templates from PBaaS providers. This decentralized service-based business model also makes attribution more difficult, as countless criminal networks can use the same template.<\/p>\n<p>Compounding the situation further, what once required technical expertise, or an outlay for physical infrastructure, can now be purchased as an off-the-shelf service offering everything from stolen identities and front companies to turnkey scam platforms and mobile apps, dramatically lowering the barrier to entry.<\/p>\n<p>Powerful triad networks have pivoted to scamming and cybercrime for a reason: they recognize it is more profitable and far less risky than drug dealing. They know they are safe in their special economic zones, and that international investigations, when they happen, are often too slow to stop them.<\/p>\n<p>As PBaaS continues to mature, scams are anticipated to become more automated, more global, and more adaptive. Countering this ecosystem will require a shift in focus: targeting the service providers, facilitators, financial enablers, and DNS infrastructure that make mass-scale fraud possible.<\/p>\n<h3 style=\"font-size:18px;\">Footnotes<\/h3>\n<ol style=\"font-size:14px;\">\n<li>See United States District Court for the Central District of California. Case No. 2:25-mj-00355, United States of America v. Zeyue Jia, 01\/29\/2025.<\/li>\n<li>Online illegal gambling has moved to a model of &#8216;whitelabels&#8217;, where ready-made casino websites are made available to anybody willing to pay &#8211; also called &#8220;turnkey&#8221;. Baowangs &#8211; \u5305\u7f51 &#8211; are Chinese speaking groups developing, hosting and running those websites. For more information, you can consult &#8220;Vigorish Viper : A Venomous Bet&#8221;<\/li>\n<li>Case 25-mj-00355, United States of America v Zeyue Jia, aka \u201cJiao Jiao Liu\u201d<\/li>\n<\/ol>\n<style>\n.savy-seahorse-table {font-size:14px;word-break: keep-all;}.savy-seahorse-table td:last-child, .savy-seahorse-table th:last-child {padding-right:10px;}.\/*code-format {\tfont-family: 'Courier New';}*\/.image-caption {    font-size: 12px;margin-top:auto;}.list-spacing li{margin-bottom:20px}.img-container, .img-container-3-col {display: flex;}.img-container img {    width: 67%;    margin-bottom: 10px;    height: max-content !important;}.img-container-3-col img {width: 30%;margin-bottom: 10px;}@media (max-width: 767px) {.img-container, .img-container-3-col {display: block;}.img-container img, .img-container-3-col img {width: 100%;}.grid-container {    grid-template-columns: 1fr!important;  }}@media (min-width: 767px) {.img-50{width:50%;}}.grid-container {  display: grid;  grid-template-columns: repeat(2, 1fr);  gap: 40px;  max-width: 800px;  margin: 0 auto;  align-items: stretch;}.grid-item {   display: flex;  flex-direction: column;  justify-content: flex-start;}.grid-item img {  width: 100%;  height: auto;}.image-caption {font-size: 12px;}.iti-blog-table,\n.iti-blog-table * {\n    font-size: 15px !important;\n}<\/style>\n<p><script>\njQuery('.single h1').html('<span class=\"gradient\">Scaling the Fraud Economy<\/span>: Pig Butchering as a Service');\n<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Authors: Ma\u00ebl Le Touz and John W\u00f2jcik Introduction: Flooding the world The scam industry has undergone massive transformations over the last decade. The clich\u00e9 image of the once-iconic Nigerian prince duping Westerners from a local cybercaf\u00e9 is now pass\u00e9. Western Africa is still a hotbed for digital fraud operations, but it has been superseded in [&hellip;]<\/p>\n","protected":false},"author":397,"featured_media":12761,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[254],"tags":[1222,1499,1345,1500,1501,1502,1503,1504,1505,1349,1092,1363,1350,332,1190,1506,1507,1508,1347,1509,1346,1158,780],"class_list":{"0":"post-12727","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threat-intelligence","8":"tag-pig-butchering","9":"tag-financial-fraud","10":"tag-sha-zhu-pan","11":"tag-scam-compound","12":"tag-scam-center","13":"tag-scam-centre","14":"tag-cyber-crime","15":"tag-cyber-economy","16":"tag-cyber-fraud","17":"tag-human-trafficking","18":"tag-crypto","19":"tag-southeast-asia","20":"tag-cambodia","21":"tag-china","22":"tag-telegram","23":"tag-crime-as-a-service","24":"tag-money-laundering","25":"tag-mekong","26":"tag-asia","27":"tag-apac","28":"tag-fraud","29":"tag-organized-crime","30":"tag-threat-intel","31":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Scaling the Fraud Economy: Pig Butchering as a Service<\/title>\n<meta name=\"description\" content=\"Discover how Pig Butchering as a Service (PBaaS) enables cybercrime syndicates to scale global fraud through turnkey scam platforms fuelled by stolen data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/scaling-the-fraud-economy-pig-butchering-as-a-service\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Scaling the Fraud Economy: Pig Butchering as a Service\" \/>\n<meta property=\"og:description\" content=\"Discover how Pig Butchering as a Service (PBaaS) enables cybercrime syndicates to scale global fraud through turnkey scam platforms fuelled by stolen data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/scaling-the-fraud-economy-pig-butchering-as-a-service\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-08T15:55:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-09T17:51:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-service-thumbnail.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"408\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Infoblox Threat Intel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Scaling the Fraud Economy: Pig Butchering as a Service\" \/>\n<meta name=\"twitter:description\" content=\"Discover how Pig Butchering as a Service (PBaaS) enables cybercrime syndicates to scale global fraud through turnkey scam platforms fuelled by stolen data.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-service-thumbnail.jpeg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Infoblox Threat Intel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"19 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/scaling-the-fraud-economy-pig-butchering-as-a-service\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/scaling-the-fraud-economy-pig-butchering-as-a-service\\\/\"},\"author\":{\"name\":\"Infoblox Threat Intel\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\"},\"headline\":\"Scaling the Fraud Economy: Pig Butchering as a Service\",\"datePublished\":\"2026-01-08T15:55:51+00:00\",\"dateModified\":\"2026-01-09T17:51:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/scaling-the-fraud-economy-pig-butchering-as-a-service\\\/\"},\"wordCount\":3186,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/scaling-the-fraud-economy-pig-butchering-as-a-service\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/pig-butchering-service-thumbnail.jpeg\",\"keywords\":[\"pig butchering\",\"financial fraud\",\"sha zhu pan\",\"scam compound\",\"scam center\",\"scam centre\",\"cyber crime\",\"cyber economy\",\"cyber fraud\",\"human trafficking\",\"crypto\",\"Southeast Asia\",\"Cambodia\",\"china\",\"telegram\",\"crime-as-a-service\",\"money laundering\",\"Mekong\",\"asia\",\"APAC\",\"fraud\",\"organized crime\",\"Threat Intel\"],\"articleSection\":[\"Infoblox Threat Intel\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/scaling-the-fraud-economy-pig-butchering-as-a-service\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/scaling-the-fraud-economy-pig-butchering-as-a-service\\\/\",\"name\":\"Scaling the Fraud Economy: Pig Butchering as a Service\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/scaling-the-fraud-economy-pig-butchering-as-a-service\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/scaling-the-fraud-economy-pig-butchering-as-a-service\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/pig-butchering-service-thumbnail.jpeg\",\"datePublished\":\"2026-01-08T15:55:51+00:00\",\"dateModified\":\"2026-01-09T17:51:35+00:00\",\"description\":\"Discover how Pig Butchering as a Service (PBaaS) enables cybercrime syndicates to scale global fraud through turnkey scam platforms fuelled by stolen data.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/scaling-the-fraud-economy-pig-butchering-as-a-service\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/scaling-the-fraud-economy-pig-butchering-as-a-service\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/scaling-the-fraud-economy-pig-butchering-as-a-service\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/pig-butchering-service-thumbnail.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/pig-butchering-service-thumbnail.jpeg\",\"width\":612,\"height\":408},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/scaling-the-fraud-economy-pig-butchering-as-a-service\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infoblox Threat Intel\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Scaling the Fraud Economy: Pig Butchering as a Service\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\",\"name\":\"Infoblox Threat Intel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"caption\":\"Infoblox Threat Intel\"},\"description\":\"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/infoblox-threat-intel\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Scaling the Fraud Economy: Pig Butchering as a Service","description":"Discover how Pig Butchering as a Service (PBaaS) enables cybercrime syndicates to scale global fraud through turnkey scam platforms fuelled by stolen data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/scaling-the-fraud-economy-pig-butchering-as-a-service\/","og_locale":"en_US","og_type":"article","og_title":"Scaling the Fraud Economy: Pig Butchering as a Service","og_description":"Discover how Pig Butchering as a Service (PBaaS) enables cybercrime syndicates to scale global fraud through turnkey scam platforms fuelled by stolen data.","og_url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/scaling-the-fraud-economy-pig-butchering-as-a-service\/","og_site_name":"Infoblox Blog","article_published_time":"2026-01-08T15:55:51+00:00","article_modified_time":"2026-01-09T17:51:35+00:00","og_image":[{"width":612,"height":408,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-service-thumbnail.jpeg","type":"image\/jpeg"}],"author":"Infoblox Threat Intel","twitter_card":"summary_large_image","twitter_title":"Scaling the Fraud Economy: Pig Butchering as a Service","twitter_description":"Discover how Pig Butchering as a Service (PBaaS) enables cybercrime syndicates to scale global fraud through turnkey scam platforms fuelled by stolen data.","twitter_image":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-service-thumbnail.jpeg","twitter_misc":{"Written by":"Infoblox Threat Intel","Est. reading time":"19 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/scaling-the-fraud-economy-pig-butchering-as-a-service\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/scaling-the-fraud-economy-pig-butchering-as-a-service\/"},"author":{"name":"Infoblox Threat Intel","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae"},"headline":"Scaling the Fraud Economy: Pig Butchering as a Service","datePublished":"2026-01-08T15:55:51+00:00","dateModified":"2026-01-09T17:51:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/scaling-the-fraud-economy-pig-butchering-as-a-service\/"},"wordCount":3186,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/scaling-the-fraud-economy-pig-butchering-as-a-service\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-service-thumbnail.jpeg","keywords":["pig butchering","financial fraud","sha zhu pan","scam compound","scam center","scam centre","cyber crime","cyber economy","cyber fraud","human trafficking","crypto","Southeast Asia","Cambodia","china","telegram","crime-as-a-service","money laundering","Mekong","asia","APAC","fraud","organized crime","Threat Intel"],"articleSection":["Infoblox Threat Intel"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/scaling-the-fraud-economy-pig-butchering-as-a-service\/","url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/scaling-the-fraud-economy-pig-butchering-as-a-service\/","name":"Scaling the Fraud Economy: Pig Butchering as a Service","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/scaling-the-fraud-economy-pig-butchering-as-a-service\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/scaling-the-fraud-economy-pig-butchering-as-a-service\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-service-thumbnail.jpeg","datePublished":"2026-01-08T15:55:51+00:00","dateModified":"2026-01-09T17:51:35+00:00","description":"Discover how Pig Butchering as a Service (PBaaS) enables cybercrime syndicates to scale global fraud through turnkey scam platforms fuelled by stolen data.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/scaling-the-fraud-economy-pig-butchering-as-a-service\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/threat-intelligence\/scaling-the-fraud-economy-pig-butchering-as-a-service\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/scaling-the-fraud-economy-pig-butchering-as-a-service\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-service-thumbnail.jpeg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/pig-butchering-service-thumbnail.jpeg","width":612,"height":408},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/scaling-the-fraud-economy-pig-butchering-as-a-service\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Infoblox Threat Intel","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/"},{"@type":"ListItem","position":3,"name":"Scaling the Fraud Economy: Pig Butchering as a Service"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae","name":"Infoblox Threat Intel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","caption":"Infoblox Threat Intel"},"description":"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.","url":"https:\/\/www.infoblox.com\/blog\/author\/infoblox-threat-intel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/12727","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/397"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=12727"}],"version-history":[{"count":17,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/12727\/revisions"}],"predecessor-version":[{"id":12873,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/12727\/revisions\/12873"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/12761"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=12727"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=12727"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=12727"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}