‘Phishing kits are a force multiplier': Cheap cyber crime kits can be bought on the dark web for less than $25 – and experts warn it’s lowering the barrier of entry for amateur hackers
With anyone now able to launch an attack, the Phishing as a Service industry is booming


While inflation is rising around the world, some things are getting cheaper - and one is the cost of launching a phishing attack.
Phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25.
This means that even criminals with minimal tech skills can easily steal personal information, carry out identity theft and access bank accounts. Meanwhile, malware infections can lead to the complete loss of device control, enabling cyber criminals to steal files, encrypt sensitive data, or launch ransomware attacks.
"Phishing kits are a force multiplier for cyber crime. They put powerful attack tools into the hands of people who may not have the skills to build them on their own," said Adrianus Warmenhoven, a cybersecurity expert at NordVPN.
"With features like drag-and-drop website builders, email templates, and even contact lists, these kits enable even the least technical attackers to carry out professional-looking scams."
Phishing as a Service is booming
Meanwhile, subscription-based Phishing as a Service (PhaaS) is also on the rise, with these services handling everything from hosting to victim targeting.
“Phishing kits and PhaaS platforms lower the barrier to entry, so we’re seeing a surge in the number and variety of attacks. That means consumers need to be more alert than ever," said Warmenhoven.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
The research team found that last year's most commonly impersonated brands in phishing attacks were Google, Facebook, and Microsoft - and that fake URLs imitating these popular platforms are a primary method for cyber criminals to harvest credentials.
Nearly 85,000 fake Google URLs were discovered last year.
Similarly, .exe, .zip, .php, .dll and .pdf were the riskiest extensions when downloading files. Video hosting, entertainment and sports, meanwhile, were the domain categories with the most malware.
According to research from Barracuda Networks, the first quarter of this year showed a massive spike in phishing, with more than a million attacks detected by the firm's systems in January and February.
Tycoon 2FA was the most prominent - and sophisticated - platform, accounting for 89% of incidents in January 2025. Next came EvilProxy, with a share of 8%, followed by a new contender, Sneaky 2FA, with a 3% share of attacks.
To stay safe, Warmenhoven recommended constantly checking suspicious links for misspellings or inconsistencies before clicking, avoiding free video hosting sites, and enabling multi-factor authentication.
"Be cautious of unsolicited emails, especially those offering deals or urgent requests. Always verify the legitimacy of files before downloading and use anti-malware tools to scan them," he said.
"Protect your privacy using tracker blockers to block personal data collection, and ensure your devices are regularly updated to close security vulnerabilities."
MORE FROM ITPRO
- A new phishing campaign is exploiting Microsoft’s legacy ADFS identity solution to steal credentials and bypass MFA
- Why ‘malware as a service’ is becoming a serious problem
- Hackers are using this new phishing technique to bypass MFA
Emma Woollacott is a freelance journalist writing for publications including the BBC, Private Eye, Forbes, Raconteur and specialist technology titles.
-
Why Microsoft thinks diversity will keep security workers relevant in the age of agentic AI
News Improved AI skills and a greater focus on ensuring agents are secure at point of deployment will be key for staying ahead of attackers
By Rory Bathgate
-
Microsoft: get used to working with AI-powered "digital colleagues"
News Tech giant's report suggests we should get ready to work with AI, revealing future trends for the workplace
By Nicole Kobie
-
Healthcare organizations are turning a blind eye to phishing attacks
News A survey reveals that most attacks go unreported, putting patient data at risk
By Emma Woollacott
-
Ransomware attacks are rising — but quiet payouts could mean there's more than actually reported
News Ransomware attacks continue to climb, but they may be even higher than official figures show as companies choose to quietly pay to make such incidents go away.
By Nicole Kobie
-
Hackers are using Zoom’s remote control feature to infect devices with malware
News Security experts have issued an alert over a new social engineering campaign using Zoom’s remote control features to take over victim devices.
By Ross Kelly
-
Hackers are duping developers with malware-laden coding challenges
News A North Korean state-sponsored group has been targeting crypto developers through fake coding challenges given as part of the recruitment process.
By Emma Woollacott
-
Cleo attack victim list grows as Hertz confirms customer data stolen – and security experts say it won't be the last
News Hertz has confirmed it suffered a data breach as a result of the Cleo zero-day vulnerability in late 2024, with the car rental giant warning that customer data was stolen.
By Ross Kelly
-
Seized database helps Europol snare botnet customers in ‘Operation Endgame’ follow-up sting
News Europol has detained several people believed to be involved in a botnet operation as part of a follow-up to a major takedown last year.
By Emma Woollacott
-
This potent malware variant can hijack your Windows PC, steal passwords, and more: Neptune RAT is spreading on GitHub, Telegram, and even YouTube – and experts warn 'anyone could use it to launch attacks'
News Neptune RAT can hijack Windows PCs and steal passwords – and it's spreading fast
By Emma Woollacott
-
Warning issued over ‘fast flux’ techniques used to obscure malicious signals on compromised networks
News Cybersecurity agencies have issued a stark message that too little is being done to sniff out malware hiding in corporate networks
By Rory Bathgate