Malware-as-a-service (MaaS) is a criminal business model where malware developers offer their software and services for hire. It works like a subscription service, making it easy for individuals without technical skills to launch cyberattacks using malware.
Understanding Malware-as-a-Service
The shift from individually authored malware to commoditized attack services represents what researchers describe as a fundamental structural change in cybercrime. A 2025 chapter published in Springer's Advances in Information Security, authored by researchers Patsakis, Arroyo, and Casino, characterizes MaaS as a pivotal transformation in cyber threats that mirrors legitimate digital economy trends toward service-based models, one that has made difficult attack capabilities accessible through subscription frameworks to anyone willing to pay.
The same research describes MaaS as democratizing access to malware capabilities, lowering the barrier to entry so that criminals with minimal technical expertise or no infrastructure can launch sophisticated and potentially catastrophic attacks. A parallel arXiv paper on the MaaS ecosystem notes that the underground economy supporting these services is both massive and transnational, encompassing malware developers and affiliates who distribute the tools, initial access brokers who sell network footholds, payment processors, marketing specialists, and even customer support agents.
The scale of the broader criminal economy in which MaaS operates is noteworthy. According to the FBI's 2024 Internet Crime Complaint Center report, IC3 received 859,532 complaints in 2024 with reported losses exceeding $16.6 billion, a 33% increase from 2023. Ransomware, one of the most prominent MaaS products, was cited as the most pervasive threat to infrastructure, with complaints rising 9% year over year.
The impact of Malware-as-a-Service
The practical impact of MaaS on organizations is best understood through its most visible products. Ransomware-as-a-Service platforms have enabled extortion attacks at a scale that no individual group could sustain alone. The Verizon 2025 Data Breach Investigations Report, which analyzed over 22,000 incidents and 12,195 confirmed breaches, the largest dataset in DBIR history, found ransomware present in 44% of all breaches, a 37% increase from the prior year, and present in 88% of breaches affecting small and medium-sized businesses.
The infostealer segment of MaaS has proven equally damaging, and in some ways more insidious, because credential theft happens silently. The IBM X-Force Threat Intelligence Index 2025 found an 84% increase in phishing emails delivering infostealer malware in 2024 compared to the prior year, with early 2025 data suggesting a further 180% increase relative to 2023. The top five infostealers alone generated more than 8 million dark web credential advertisements in 2024, each listing potentially containing hundreds of stolen credentials. The global average cost of a data breach hit a record $4.88 million in 2024, according to IBM's research.
For healthcare specifically, MaaS-delivered malware creates direct patient safety risks alongside data security ones. According to Paubox's 2025 Healthcare Email Security Report, ransomware attacks on healthcare organizations surged 264% since 2018, according to HHS OCR data, and 180 healthcare organizations experienced email-related breaches in 2024 alone. According to Paubox's 2026 Healthcare Email Security Report, email-related breaches in 2025 affected more than 2.5 million individuals, with phishing, the primary delivery vehicle for MaaS tools, driving the largest share of exposed patient records.
How Malware-as-a-Service works
MaaS platforms operate with a degree of organizational sophistication that mirrors legitimate software businesses. The Springer research on the MaaS ecosystem identifies the major roles within these operations: malware developers who write and maintain the core tools, affiliates who license the tools and conduct campaigns, traffers who redirect traffic to infection points, initial access brokers who sell compromised network credentials to ransomware operators, and infrastructure providers who supply bulletproof hosting and anonymization services.
The commercial structure is designed to maximize reach and revenue. Operators typically offer tiered subscription plans at different price points, giving customers varying levels of capability and control. Microsoft's legal filing in the Lumma Stealer takedown described subscription tiers ranging from $250 to $20,000, with higher tiers allowing customers to create custom malware versions, add concealment tools, and track stolen data through an online portal. The structure enables operators to monetize their malware across hundreds or thousands of customers simultaneously while remaining relatively insulated from individual law enforcement actions, since affiliates rather than core developers typically conduct the actual attacks.
Payment processing and money laundering are also embedded functions within the ecosystem. A Springer-published criminology paper examining financial malware value chains describes how cybercriminals are organized around highly specialized tasks, including pay-per-install markets for infected machines, MaaS platforms, and money mule recruitment, with each component functioning as a distinct service that can be combined or contracted separately.
Types of Malware-as-a-Service
- Ransomware-as-a-Service (RaaS) is the most widely reported MaaS category. Developers build and maintain ransomware platforms, then recruit affiliates who conduct attacks and share a percentage of ransom payments with the developers. Groups such as LockBit, RansomHub, and DragonForce have operated under this model. Recorded Future's H1 2025 malware and vulnerability trends report noted that, following the collapse of BlackBasta and RansomHub in early 2025, affiliated members migrated to other groups, including Akira and Qilin, with DragonForce rebranding itself as a "cartel" model that allows affiliates to operate under independent brands using shared infrastructure.
- Infostealer-as-a-Service platforms are designed to harvest credentials, cookies, browser data, and cryptocurrency wallet contents from infected devices and return them to operator-controlled panels. The stolen data is then sold on dark web markets or used directly for follow-on attacks, including ransomware deployment. Lumma Stealer, Vidar, RedLine, and Raccoon Stealer have each operated under this model. The IBM X-Force Threat Intelligence Index 2026 reported that infostealer operators expanded their target lists in 2025 to include AI services, with over 300,000 ChatGPT credential sets advertised on dark web markets.
- Phishing-as-a-Service (PhaaS) provides ready-made phishing kits, hosting infrastructure, and even real-time credential capture panels that allow attackers to conduct large-scale credential harvesting campaigns without building the technical infrastructure themselves. IBM X-Force noted in its 2025 report that threat actors are now selling adversary-in-the-middle phishing kits and custom attack services on the dark web specifically designed to bypass multi-factor authentication.
- Botnet-as-a-Service and DDoS-as-a-Service platforms rent access to networks of compromised machines for conducting distributed denial-of-service attacks, spam campaigns, or as a distribution mechanism for delivering other MaaS payloads.
- Remote Access Trojan (RAT)-as-a-Service tools give operators persistent, covert control over infected systems. Recorded Future's 2025 infrastructure analysis identified AsyncRAT and QuasarRAT as leading the RAT landscape through 2025, with DcRAT and REMCOS RAT gaining market share in MaaS-driven campaigns.
Why Malware-as-a-Service is harder to detect and stop
The service-based model creates several structural properties that make MaaS attacks more difficult to detect and attribute than traditional malware campaigns. Because affiliates conduct attacks using shared platforms developed by separate operators, the individuals deploying the malware often have no technical knowledge of how it was built, removing the coding fingerprints that have historically helped researchers attribute malware to specific groups.
The arXiv research on the MaaS ecosystem describes traffers, the workers who deliver initial infections, as specifically instructed to stay below the radar of security providers and to use only approved toolkits to avoid detection. Many MaaS platforms also provide active evasion updates to subscribers as a service, meaning that defenders who block one variant may encounter an updated version within days or weeks.
Credential-based attacks enabled by infostealers are particularly difficult to detect because, once valid usernames and passwords are obtained, the attacker logs in normally rather than exploiting a vulnerability. The Verizon 2025 DBIR found that stolen credentials remain the most common initial access vector, used in 22% of all breaches, with 88% of basic web application attacks relying on stolen credentials. An attacker using valid credentials generates authentication traffic that is indistinguishable from legitimate user activity without additional behavioral monitoring.
The Canadian Centre for Cyber Security's National Cyber Threat Assessment 2025–2026 identifies the interconnectivity of the Cybercrime-as-a-Service ecosystem as a defining feature of the modern threat landscape, noting that cybercriminals are increasingly benefiting from new illicit business models that provide scalability, redundancy, and resilience against law enforcement disruption.
Recognizing Malware-as-a-Service activity
Organizations are unlikely to encounter MaaS platforms directly. What they encounter are the outputs: credential theft, ransomware deployment, data exfiltration, and unauthorized remote access. Recognizing early indicators of a MaaS-delivered attack requires behavioral monitoring rather than signature-based detection alone.
Warning signs of an infostealer infection include unusual authentication events from unfamiliar locations or devices, credential reuse across systems, sudden appearance of credentials on dark web monitoring services, and unexplained access to sensitive files or systems by accounts that do not normally access them. Ransomware infections often follow an infostealer compromise, sometimes weeks or months later, after credentials have been sold to a separate ransomware affiliate. The Verizon 2025 DBIR specifically tracks the timeline between infostealer log discovery and ransomware posting, finding that the lag between credential theft and ransomware deployment can span substantial periods, making early detection of the infostealer phase critical to preventing the follow-on attack.
For healthcare organizations, email remains the primary delivery vector for MaaS tools. According to Paubox's 2025 Healthcare Email Security Report, only 5% of known phishing attacks are reported by employees to their security teams, meaning the overwhelming majority of MaaS delivery attempts via email go undetected at the human level.
Best practices for defending against Malware-as-a-Service
Defending against MaaS requires layered technical controls that do not depend on individual users identifying malicious content. The service-based model means that any organization can be targeted by a criminal with no specific expertise, which eliminates the assumption that sophisticated attackers only target high-value organizations.
Multi-factor authentication remains essential but is no longer sufficient alone. IBM X-Force noted in its 2025 report that threat actors are actively selling adversary-in-the-middle kits designed to bypass MFA, and the Verizon 2025 DBIR documented prompt bombing, where users are flooded with MFA approval requests, in 14% of incidents. Phishing-resistant MFA methods that do not rely on push notifications provide stronger protection.
Dark web monitoring for leaked credentials is increasingly a practical defensive measure. Given that the top five infostealers generated more than 8 million credential listings in 2024, according to IBM X-Force, organizations that monitor for their own credentials in underground markets can identify and rotate compromised accounts before attackers use them.
Email security deserves particular focus because it remains the dominant initial access vector for MaaS delivery. According to Paubox's 2026 Healthcare Email Security Report, phishing emails increased 17% in 2025, and attacks avoiding native email defenses rose 47%. Automated inbound filtering that detects impersonation, spoofing, and malicious attachments before messages reach users removes the dependency on employees making the correct call. Paubox's Inbound Email Security is designed specifically to detect and block phishing and spoofed emails before they reach healthcare inboxes, addressing the initial delivery stage where MaaS payloads most commonly enter organizations.
CISA's ransomware guidance recommends maintaining offline backups, enforcing network segmentation to limit lateral movement, and conducting tabletop exercises for ransomware scenarios. Given the RaaS model's emphasis on rapid deployment and data exfiltration alongside or before encryption, organizations should prioritize detection and containment speed as much as prevention.
Learn more: Paubox Inbound Email Security | Paubox Email Suite | Paubox 2026 Healthcare Email Security Report
Why Malware-as-a-Service continues to grow
MaaS thrives because it solves an economic problem for criminals: it separates the risk of malware development from the risk of conducting attacks, and it separates the risk of conducting attacks from the risk of monetizing stolen data. Each participant in the ecosystem takes on only a narrow slice of exposure while benefiting from the collective operation.
Law enforcement disruptions demonstrate both the scale of the problem and its resilience. In May 2025, Microsoft's Digital Crimes Unit, the U.S. Department of Justice, Europol, and Japan's Cybercrime Control Center conducted a coordinated takedown of Lumma Stealer infrastructure, seizing approximately 2,300 malicious domains and disrupting the tool's central command structure. Microsoft's blog post on the operation noted that between March and May 2025 alone, Lumma had infected more than 394,000 Windows computers globally, and the DOJ estimated the tool had been involved in approximately 1.7 million credential-theft incidents. Within days of the takedown, competing infostealer operators were advertising migration packages to former Lumma customers, and Lumma's primary developer, identified by Microsoft as operating from Russia, was expected to rebuild.
AI is adding further momentum to MaaS expansion. Recorded Future's 2025 infrastructure analysis assessed that AI will increasingly be leveraged to support evasion and operational resilience in MaaS operations, and IBM X-Force noted that AI tools are already being used to generate more convincing phishing lures, clone websites for credential harvesting, and assist with malware code generation, all of which reduce the cost of running affiliate campaigns.
FAQs
How does MaaS work?
MaaS platforms offer malware tools and services through subscription plans. Clients register on these platforms, choose and customize the malware they need, pay for the service (usually via cryptocurrency), and deploy the malware through user-friendly interfaces provided by the platform.
How do MaaS providers maintain anonymity?
Transactions and communications are conducted through the dark web and cryptocurrencies like Bitcoin, providing anonymity to the service providers and their clients.
How can companies protect themselves from MaaS attacks?
Companies can protect themselves by practicing good cybersecurity habits, such as keeping software and operating systems updated, using strong and unique passwords, being cautious of suspicious links and attachments in emails, and using reputable antivirus software.
Subscribe to Paubox Weekly
Every Friday we bring you the most important news from Paubox. Our aim is to make you smarter, faster.
