{"id":26880,"date":"2024-02-23T15:11:00","date_gmt":"2024-02-23T14:11:00","guid":{"rendered":"https:\/\/perseus.de\/unveiling-the-dark-web-phishing-as-a-service-phaas\/"},"modified":"2026-03-30T11:39:29","modified_gmt":"2026-03-30T09:39:29","slug":"unveiling-the-dark-web-phishing-as-a-service-phaas","status":"publish","type":"post","link":"https:\/\/perseus.de\/en\/unveiling-the-dark-web-phishing-as-a-service-phaas\/","title":{"rendered":"Unveiling the Dark Web: Phishing as a Service (PhaaS)"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"26880\" class=\"elementor elementor-26880 elementor-3319\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ba0588 e-flex e-con-boxed e-con e-parent\" data-id=\"2ba0588\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6459d3d elementor-widget elementor-widget-image\" data-id=\"6459d3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"512\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/erik-mclean-aielvGxZB0g-unsplash-1-768x512-1.jpg\" class=\"attachment-medium_large size-medium_large wp-image-26879\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/erik-mclean-aielvGxZB0g-unsplash-1-768x512-1.jpg 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/erik-mclean-aielvGxZB0g-unsplash-1-768x512-1-300x200.jpg 300w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: Erik Mclean via Unsplash<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4057f038 e-flex e-con-boxed e-con e-parent\" data-id=\"4057f038\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5edac35d e-n-tabs-mobile elementor-widget elementor-widget-n-tabs\" data-id=\"5edac35d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;horizontal_scroll&quot;:&quot;disable&quot;}\" data-widget_type=\"nested-tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-tabs\" data-widget-number=\"1591395165\" aria-label=\"Tabs. Open items with Enter or Space, close with Escape and navigate using the Arrow keys.\">\n\t\t\t<div class=\"e-n-tabs-heading\" role=\"tablist\">\n\t\t\t\t\t<button id=\"e-n-tab-title-15913951651\" data-tab-title-id=\"e-n-tab-title-15913951651\" class=\"e-n-tab-title\" aria-selected=\"true\" data-tab-index=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"e-n-tab-content-15913951651\" style=\"--n-tabs-title-order: 1;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tGerman\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-15913951652\" data-tab-title-id=\"e-n-tab-title-15913951652\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-15913951652\" style=\"--n-tabs-title-order: 2;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tEnglish\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t\t<\/div>\n\t\t\t<div class=\"e-n-tabs-content\">\n\t\t\t\t<div id=\"e-n-tab-content-15913951651\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-15913951651\" data-tab-index=\"1\" style=\"--n-tabs-title-order: 1;\" class=\"e-active elementor-element elementor-element-23035098 e-con-full e-flex e-con e-child\" data-id=\"23035098\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-71e6d16f e-flex e-con-boxed e-con e-child\" data-id=\"71e6d16f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-630598b e-con-full e-flex e-con e-child\" data-id=\"630598b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-51a8809 e-con-full e-flex e-con e-child\" data-id=\"51a8809\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-81e03f6 elementor-widget elementor-widget-text-editor\" data-id=\"81e03f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h6>23.02.2024<\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3bc8a7d elementor-widget elementor-widget-heading\" data-id=\"3bc8a7d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Unveiling the Dark Web: Phishing as a Service (PhaaS)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-63a235b elementor-widget elementor-widget-text-editor\" data-id=\"63a235b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Phishing | Cybercrime | Attack Vectors<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0c0f6aa e-con-full e-flex e-con e-child\" data-id=\"0c0f6aa\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1390d2f elementor-widget elementor-widget-text-editor\" data-id=\"1390d2f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>In the depths of the dark web, a market is thriving where illegal services are offered to those willing to pay a price. Among the services, phishing as a service (PhaaS) proves to be a particularly popular machine that offers access to cybercriminal craft to anyone who has a score to settle or wants to enrich themselves in an illegal way. <\/strong><\/p><div><p>These attacks not only pose a direct threat to individuals and businesses, but also erode trust in online communications. In this article, you can read about what PhaaS is exactly, how it is used and, above all, how you can protect yourself. <\/p><h4> <\/h4><h4><strong>The PhaaS Ecosystem<\/strong><\/h4><p>PhaaS providers offer a variety of services tailored to the needs of threat actors. From creating and distributing fraudulent emails to managing fake websites and bait sites, these operators provide comprehensive support to make the scam of unsuspecting targets perfect. For example, in this illicit market, ready-made phishing pages for well-known brands such as Google, Microsoft, and LinkedIn are readily available. In addition, customized phishing pages can be commissioned that target specific individuals or organizations to increase effectiveness.   <\/p><h4><strong> <\/strong><\/h4><h4><strong>Example: PhaaS in action<\/strong><\/h4><p>Imagine a scenario where an aspiring cybercriminal tries to obtain login credentials and financial information from unsuspecting victims. Instead of laboriously composing phishing emails and setting up the infrastructure from scratch, he turns to a PhaaS provider. Here, he&#8217;ll find an easy-to-use platform with a variety of pre-built templates, each optimized for maximum effectiveness. With a few simple clicks, the attacker adjusts his campaign, selects his targets, and launches the attack.   <\/p><p>An alarming example from practice (BSI 2023 situation report) is the emergence of EvilProxy, a malicious service that is not only aimed at tech giants (by imitating the login pages of e.g. Microsoft and Google), but also on platforms that are important for software development and programming language. This is a phishing proxy service in which an entity is interposed between the perpetrator and the victim that is able to steal cookie information and modify code. <\/p><p>By compromising these platforms, criminals could carry out attacks on supply chains that lead to the spread of malicious code and the theft of sensitive information.<\/p><p><strong> <\/strong><\/p><h4><strong>Threat Assessment: Phishing in the Digital Age<\/strong><\/h4><p>Despite advances in IT security, phishing remains an ongoing threat, with PhaaS facilitating access to sophisticated attack vectors. In addition to traditional email-based phishing, cybercriminals also use social media, SMS, and voice calls, varying their tactics to ensure success. <\/p><p>Artificial intelligence (AI) is also increasingly being used in this context. Composing compelling emails and personalizing messages is automated, and detection is bypassed by sophisticated techniques. AI algorithms analyze huge data sets to adapt phishing campaigns, imitate writing styles, and even generate fake audio or video files to fool targets. This allows attackers to scale their operations, increase success rates, and bypass traditional security measures.   <\/p><p><strong> <\/strong><\/p><h4><strong>Responding to the Challenge: It&#8217;s Time to Act<\/strong><\/h4><p>In response to the evolving threat landscape, organizations and individuals alike must remain vigilant and proactive. Education and awareness initiatives play a crucial role in empowering users to recognize and respond effectively to phishing attempts. <\/p><p>In addition, the use of advanced email filtering solutions can help intercept and neutralize phishing emails before they reach their actual destination. Multi-factor authentication (MFA) provides an additional layer of defense that can protect against access information being tapped. <\/p><p><em><strong> <\/strong><\/em><\/p><p><em><strong>Our white paper on protection against phishing explains the most effective measures.  <\/strong><\/em><\/p><p><strong> <\/strong><\/p><h4><strong>Stepping up IT security efforts<\/strong><\/h4><p>Phishing as a service is a formidable challenge in the ongoing fight against cyber threats. While in 2018 there were still just under 150,000 phishing login sites circulating worldwide as targets, in 2023 there were just under 1,300,000 (Statista). <\/p><p>However, if the mechanisms and evolution of the threat are understood, the widespread influence is recognized, and proactive security measures are taken, resistance can be successfully strengthened and impacts can be mitigated. Now more than ever, it is important to create a safer digital landscape for everyone. <\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-15913951652\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-15913951652\" data-tab-index=\"2\" style=\"--n-tabs-title-order: 2;\" class=\" elementor-element elementor-element-55849ea6 e-con-full e-flex e-con e-child\" data-id=\"55849ea6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-495b377 e-flex e-con-boxed e-con e-child\" data-id=\"495b377\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-f03236b e-con-full e-flex e-con e-child\" data-id=\"f03236b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0c4bc16 elementor-widget elementor-widget-text-editor\" data-id=\"0c4bc16\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h6>23.02.2024<\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a05064b elementor-widget elementor-widget-heading\" data-id=\"a05064b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Uncovering the Dark Web: Phishing as a Service (PhaaS)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-59ddf3e elementor-widget elementor-widget-text-editor\" data-id=\"59ddf3e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Phishing | Cybercrime | Attack vectors<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cb03186 e-con-full e-flex e-con e-child\" data-id=\"cb03186\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e01d86e elementor-widget elementor-widget-text-editor\" data-id=\"e01d86e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b><strong>In the depths of the dark web, a market is flourishing where illegal services are offered to those willing to pay for them. Among these services, Phishing as a Service (PhaaS) is proving to be a particularly popular mechanism, offering access to cybercriminal tools to anyone who has a score to settle or wants to enrich themselves illegally. <\/strong><\/b><\/p><p>These attacks not only pose a direct threat to individuals and businesses, but also undermine trust in online communication. Read this article to find out exactly what PhaaS is, how it is used and, most importantly, how you can protect yourself. <\/p><h4><b><strong>The PhaaS ecosystem<\/strong><\/b><\/h4><p>PhaaS providers offer a variety of services tailored to the needs of threat actors. From creating and distributing fraudulent emails to managing fake websites and bait pages, these operators offer comprehensive support to perfect the deception of unsuspecting targets. For example, ready-made phishing pages for well-known brands such as Google, Microsoft and LinkedIn are readily available on this illegal market. In addition, customised phishing pages can be commissioned to target specific individuals or organisations in order to increase effectiveness.   <\/p><h4><b>Example: PhaaS in action<\/b><\/h4><p>Imagine a scenario in which an aspiring cybercriminal is trying to obtain login credentials and financial information from unsuspecting victims. Instead of laboriously writing phishing emails and setting up the infrastructure from scratch, they turn to a PhaaS provider. Here, they find a user-friendly platform with a variety of ready-made templates, each optimised for maximum effectiveness. With a few simple clicks, the attacker customises their campaign, selects their targets and launches the attack.   <\/p><p>An alarming real-life example (BSI Situation Report 2023) is the emergence of EvilProxy, a malicious service that targets not only tech giants (by imitating the login pages of Microsoft and Google, for example) but also platforms that are important for software development and programming languages. This is a phishing proxy service that inserts an intermediary between the perpetrator and the victim that is capable of stealing cookie information and modifying code. <\/p><p>By compromising these platforms, criminals could carry out attacks on supply chains, leading to the spread of malicious code and the theft of sensitive information.<\/p><h4><b><strong>Threat assessment: Phishing in the digital age<\/strong><\/b><\/h4><p>Despite advances in IT security, phishing remains a persistent threat, with PhaaS facilitating access to sophisticated attack vectors. In addition to traditional email-based phishing, cybercriminals also use social media, SMS and voice calls and vary their tactics to ensure success. <\/p><p>Artificial intelligence (AI) is also increasingly being used in this context. The writing of convincing emails and the personalisation of messages is being automated and detection is being circumvented by sophisticated techniques. AI algorithms analyse huge data sets to tailor phishing campaigns, imitate writing styles and even generate fake audio or video files to deceive targets. This allows attackers to scale their operations, increase success rates and circumvent traditional security measures.   <\/p><h4><b><strong>Responding to the challenge: It&#8217;s time to take action<\/strong><\/b><\/h4><p>In response to the evolving threat landscape, organisations and individuals alike must remain vigilant and proactive. Education and awareness initiatives play a critical role in empowering users to recognise and respond effectively to phishing attempts. <\/p><p>In addition, the use of advanced email filtering solutions can help intercept and neutralise phishing emails before they reach their intended target. Multi-factor authentication (MFA) provides an additional layer of defence that can protect against the theft of access information. <\/p><p><b><em><strong>Our white paper on phishing protection explains the most effective measures you can take.<\/strong><\/em><\/b><\/p><h4><b><strong>Strengthening IT security efforts<\/strong><\/b><\/h4><p>Phishing as a service poses a formidable challenge in the ongoing battle against cyber threats. While there were just under 150,000 phishing login pages circulating worldwide in 2018, this figure rose to almost 1,300,000 in 2023 (Statista). <\/p><p>However, by understanding the mechanisms and evolution of the threat, recognising its widespread impact and taking proactive security measures, defences can be successfully strengthened and the impact mitigated. Today more than ever, it is essential to create a more secure digital landscape for everyone. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4d84bbc e-flex e-con-boxed e-con e-parent\" data-id=\"4d84bbc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-05a335d elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"05a335d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>In the depths of the dark web, a market is thriving where illegal services are offered to those willing to pay a price. Among the services, phishing as a service (PhaaS) proves to be a particularly popular machine that offers access to cybercriminal craft to anyone who has a score to settle or wants to enrich themselves in an illegal way. <\/p>\n","protected":false},"author":3,"featured_media":26879,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[60],"tags":[],"class_list":["post-26880","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Unveiling the Dark Web: Phishing as a Service (PhaaS) - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/en\/unveiling-the-dark-web-phishing-as-a-service-phaas\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Unveiling the Dark Web: Phishing as a Service (PhaaS) - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"In the depths of the dark web, a market is thriving where illegal services are offered to those willing to pay a price. Among the services, phishing as a service (PhaaS) proves to be a particularly popular machine that offers access to cybercriminal craft to anyone who has a score to settle or wants to enrich themselves in an illegal way.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/en\/unveiling-the-dark-web-phishing-as-a-service-phaas\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-23T14:11:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-30T09:39:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/erik-mclean-aielvGxZB0g-unsplash-1-768x512-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"768\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/unveiling-the-dark-web-phishing-as-a-service-phaas\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/unveiling-the-dark-web-phishing-as-a-service-phaas\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"Unveiling the Dark Web: Phishing as a Service (PhaaS)\",\"datePublished\":\"2024-02-23T14:11:00+00:00\",\"dateModified\":\"2026-03-30T09:39:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/unveiling-the-dark-web-phishing-as-a-service-phaas\\\/\"},\"wordCount\":2681,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/unveiling-the-dark-web-phishing-as-a-service-phaas\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/erik-mclean-aielvGxZB0g-unsplash-1-768x512-1.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/unveiling-the-dark-web-phishing-as-a-service-phaas\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/unveiling-the-dark-web-phishing-as-a-service-phaas\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/unveiling-the-dark-web-phishing-as-a-service-phaas\\\/\",\"name\":\"Unveiling the Dark Web: Phishing as a Service (PhaaS) - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/unveiling-the-dark-web-phishing-as-a-service-phaas\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/unveiling-the-dark-web-phishing-as-a-service-phaas\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/erik-mclean-aielvGxZB0g-unsplash-1-768x512-1.jpg\",\"datePublished\":\"2024-02-23T14:11:00+00:00\",\"dateModified\":\"2026-03-30T09:39:29+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/unveiling-the-dark-web-phishing-as-a-service-phaas\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/unveiling-the-dark-web-phishing-as-a-service-phaas\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/unveiling-the-dark-web-phishing-as-a-service-phaas\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/erik-mclean-aielvGxZB0g-unsplash-1-768x512-1.jpg\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/erik-mclean-aielvGxZB0g-unsplash-1-768x512-1.jpg\",\"width\":768,\"height\":512},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/unveiling-the-dark-web-phishing-as-a-service-phaas\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Unveiling the Dark Web: Phishing as a Service (PhaaS)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Unveiling the Dark Web: Phishing as a Service (PhaaS) - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/en\/unveiling-the-dark-web-phishing-as-a-service-phaas\/","og_locale":"en_US","og_type":"article","og_title":"Unveiling the Dark Web: Phishing as a Service (PhaaS) - Perseus Technologies","og_description":"In the depths of the dark web, a market is thriving where illegal services are offered to those willing to pay a price. Among the services, phishing as a service (PhaaS) proves to be a particularly popular machine that offers access to cybercriminal craft to anyone who has a score to settle or wants to enrich themselves in an illegal way.","og_url":"https:\/\/perseus.de\/en\/unveiling-the-dark-web-phishing-as-a-service-phaas\/","og_site_name":"Perseus Technologies","article_published_time":"2024-02-23T14:11:00+00:00","article_modified_time":"2026-03-30T09:39:29+00:00","og_image":[{"width":768,"height":512,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/erik-mclean-aielvGxZB0g-unsplash-1-768x512-1.jpg","type":"image\/jpeg"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Xenia Silbe","Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/en\/unveiling-the-dark-web-phishing-as-a-service-phaas\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/en\/unveiling-the-dark-web-phishing-as-a-service-phaas\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"Unveiling the Dark Web: Phishing as a Service (PhaaS)","datePublished":"2024-02-23T14:11:00+00:00","dateModified":"2026-03-30T09:39:29+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/en\/unveiling-the-dark-web-phishing-as-a-service-phaas\/"},"wordCount":2681,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/en\/unveiling-the-dark-web-phishing-as-a-service-phaas\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/erik-mclean-aielvGxZB0g-unsplash-1-768x512-1.jpg","articleSection":["Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/en\/unveiling-the-dark-web-phishing-as-a-service-phaas\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/en\/unveiling-the-dark-web-phishing-as-a-service-phaas\/","url":"https:\/\/perseus.de\/en\/unveiling-the-dark-web-phishing-as-a-service-phaas\/","name":"Unveiling the Dark Web: Phishing as a Service (PhaaS) - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/en\/unveiling-the-dark-web-phishing-as-a-service-phaas\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/en\/unveiling-the-dark-web-phishing-as-a-service-phaas\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/erik-mclean-aielvGxZB0g-unsplash-1-768x512-1.jpg","datePublished":"2024-02-23T14:11:00+00:00","dateModified":"2026-03-30T09:39:29+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/en\/unveiling-the-dark-web-phishing-as-a-service-phaas\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/en\/unveiling-the-dark-web-phishing-as-a-service-phaas\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/en\/unveiling-the-dark-web-phishing-as-a-service-phaas\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/erik-mclean-aielvGxZB0g-unsplash-1-768x512-1.jpg","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/erik-mclean-aielvGxZB0g-unsplash-1-768x512-1.jpg","width":768,"height":512},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/en\/unveiling-the-dark-web-phishing-as-a-service-phaas\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Unveiling the Dark Web: Phishing as a Service (PhaaS)"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/en\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/26880","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/comments?post=26880"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/26880\/revisions"}],"predecessor-version":[{"id":26881,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/26880\/revisions\/26881"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/media\/26879"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/media?parent=26880"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/categories?post=26880"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/tags?post=26880"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}