Cybercrime Supply Chain Studies

Cybercrime Supply Chain studies identify how criminals use spam, malware, and phishing campaigns in combination or sequence to perpetrate a wide range of cyberattacks.

   2025 Study      2024 Study      2023 Study  

Cybercrime Events Surge 60% Globally as Criminals Exploit Easy Access to Internet Resources, Interisle Report Finds

As reported via EIN Presswire

BOSTON, MA, UNITED STATES, November 18, 2025 /EINPresswire.com/ -- Cybercrime continues to grow at alarming rates, according to Cybercrime Supply Chain 2025, a new study released by Interisle Consulting Group. The report analyzed more than 26 million unique cybercrime events involving malware, phishing, and spam – a 60% annual growth in attacks – revealing that criminals continue to easily and cheaply acquire the resources needed to launch attacks.

The study found that nearly 20 million unique domains were used in attacks. Malicious domain registrations increased 149% year over year, and bulk registration of domains for criminal purposes surged 177%. New generic Top-Level Domains (gTLDs) were particularly exploited: though they hold just 12% of the market, they accounted for nearly half of all cybercrime domains reported and well over half of the maliciously registered cybercrime domains.

“Cybercrime has evolved into a professionalized global industry,” said Dave Piscitello, Interisle Partner. “Cybercriminal enterprises operate across both the legitimate and dark economies and are expanded their reach and impact, including through sophisticated crime-as-a-service offerings.”

Key report findings include:

  • Malware, phishing, and spam attacks grew by 60%, to over 26 million events. Spam grew at the most alarming rate, more than doubling over 2024.

  • Nearly 19.5 million compromised and maliciously registered domains were used in cyberattacks compared to 8.6 million last year – a 126% increase.

  • Domains registered for cybercrime – malicious domains – increased 149% year over year. The percentage of malicious registrations in the new TLD space was nearly five times its market share.

  • Over 7.3 million domains used in cyberattacks were registered in bulk, a 177% increase compared to last year.

  • The overall number of IP addresses reported for hosting malware, spam or phishing activity decreased by 20%. The United States, India and Hong Kong saw hosting increases.

Just as legitimate businesses optimize their logistics, criminals do the same by sourcing naming, hosting, and other resources wherever they are cheapest and easiest to secure. “We need to disrupt criminal access to these resources, starve them of supplies, and make cybercrime harder and less lucrative to perpetrate,” said Karen Rose, Interisle Partner.

The report urges greater oversight and accountability across the cybercrime supply chain, including:

  • Stronger verification of customer information, including adoption of EU NIS2 directive standards.

  • Implementing automated systems to disrupt and mitigate suspicious registration and hosting activity

  • Limitations on high-volume registration and account creation.

  • Adopting trusted reporter programs to expedite takedowns.

  • Corrective action for operations with high criminal abuse rates.

Cybercrime is projected to inflict US$10.5 trillion in global losses this year, exceeding the GDP of all nations except the U.S., China, and India. “This is not just a technical problem,” Rose added. “It’s an economic and social one.”

Interisle’s study was sponsored by the Anti Phishing Working Group (APWG, https://apwg.org), CAUCE (https://cauce.org), and the Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG, https://m3aawg.org). Collectively, these organizations represent thousands of cybersecurity, public advocacy, service providers, and industry professionals worldwide.

The full report is available at https://interisle.net/cybercrimesupplychain2025.
Media contact: media@interisle.net

Interisle Study Reveals Alarming Rise in Online Abuse and Identifies Exploitable Links in Cybercriminal Supply Chains

As reported via EIN Presswire

Year-over-year findings show that cybercriminals exploit lax policies to easily and cheaply obtain resources for phishing, malware, and spam campaigns.

HOPKINTON, MA, UNITED STATES, November 18, 2024 /EINPresswire.com/ -- Interisle Consulting Group researchers, using data from the Cybercrime Information Center, analyzed 16 million cybercrime events to expose a dramatic rise in criminal exploitation of name, address, hosting, and financial supply chains.

The Cybercrime Supply Chain 2024 report provides actionable insights for those aiming to curb cybercrime.

Cybercrime is a highly profitable business. Dave Piscitello, co-author, explains that “Cybercrime flourished in environments where permissive policies or business practices of suppliers allowed criminals to easily and cheaply access resources with little or no risk or punishment”.

Like any other business, cybercriminals must gather the supplies and services needed to conduct their operations. Interisle’s study uses a business supply chain framework to analyze how criminals obtain key Internet resources.

Co-author and Interisle Partner Karen Rose adds, “Analyzing cybercrime as a business revealed insights into the factors that fueled a criminal trade economy and made it lucrative. This economy transacts with the legitimate economy to convert illicit proceeds into cash”.

Among the major findings in the study, Interisle reports that:

  • The total number of malware, phishing, and spam attacks grew year-over-year by nearly 54%, to nearly 16.3 million attacks. Spam doubled, from 4 million to 8 million attacks.

  • Consumption of domain name resources by cybercriminals increased 81%. Over 8.6 million unique domains were used in cyberattacks compared to 4.8 million last year.

  • Over 2.6 million domains used in cyberattacks were registered in bulk, a 106% increase compared to last year.

  • Nearly 1.2 million subdomain hostnames were found to be used in attacks, an increase of over 114% compared to last year.

  • New generic top-level domains (gTLDs) accounted for 37% of cybercrime domains reported while holding only 11% of the total domain name market.

  • The number of IPv4 addresses reported for hosting cybercrime nearly doubled in both China and India. While the United States remains the top source of cybercrime reported IPv4 addresses, China’s 94% growth placed it nearly equal to the United States.

Efforts to make it more difficult and costly for criminals to acquire these resources, conduct crimes, and “launder” criminal proceeds would help reduce the profitability and allure of the business.

Among Interisle's recommendations:

  • Implement rigorous identify verification / certification requirements for parties wishing to bulk register domain names.

  • Limit the number of accounts and subdomains that a customer can register with free or inexpensive web hosting (subdomain) providers.

  • Expand the deployment of automated systems to screen for suspicious resource registration and use patterns.

  • Create “Trusted Reporter” programs across industry to facilitate swift suspension of cybercrime resources identified by recognized and trusted cybercrime monitors.

  • Penalize service providers that consistently and disproportionately supply cybercriminals with attack resources or incentivize them to stop.

Interisle notes that sustainable change will only occur if a broad range of stakeholders (including governments, where necessary) step up and implement real-world solutions to reduce criminal access to resources.

Interisle’s study was sponsored by the Anti Phishing Working Group (APWG, https://apwg.org), CAUCE (https://cauce.org), and the Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG, https://m3aawg.org). Collectively, these organizations represent thousands of cybersecurity, public advocacy, service providers, and industry professionals worldwide.

APWG Secretary General Peter Cassidy said, “this report corroborates a long-observed cybercriminal behavior: inexpensive domain registrations and lax verification policies facilitate criminality. If DNS and hosting operators won’t intervene to mitigate cybercrime by way of industry policies, they’ll be compelled by interventions under sovereign law. The NIS2 directive of 2022 is hopefully the beginning of that intervention process. APWG encourages EU member states to engage with senior Internet operations and engineering authorities to identify DNS and hosting practices as they transpose NIS2’s directives to sovereign law.”

"The report makes clear the close connections among malware, phishing, spam, and domain abuse, and presents strategies we need to effectively mitigate them," said CAUCE president John Levine.

“M3AAWG is proud to support this important work with our valued industry partners,” said M3AAWG executive director Amy Cadagin. “This report highlights the importance of best practices and anti-abuse capabilities for DNS, email, and cloud providers. Legitimate providers must remain vigilant, as they are operating in an environment that is often far from trustworthy.”

The Cybercrime Supply Chain 2024 report is available at https://interisle.net/CybercrimeSupplyChain2024.pdf.

Interisle publishes measurements of where criminals obtain resources they use to perpetrate cybercrimes at the Cybercrime Information Center and offers cybercrime awareness videos at https://www.youtube.com/@cybercrimeinfocenter.

Supplements to Cybercrime Supply Chain 2024: Tables of the rankings of TLDs, Registrars, and Hosting Networks for the period 1 May 2023 - 30 April 2024

Yearly Update:
Key Statistics
Yearly Update:
Top Level Domains
Yearly Update:
Registrars
Yearly Update:
Hosting Networks

Interisle Cybercrime Supply Chain Study Finds Persistent Patterns of Exploitation and Abuse

As reported via EIN Presswire

Study reveals that criminals benefit from readily available and cheap supply chains that provide the Internet resources for malware, spam, and phishing attacks

HOPKINTON, MA, UNITED STATES, October 23, 2023 /EINPresswire.com/ -- Interisle researchers, using data from the Cybercrime Information Center, analyzed more than 10 million cybercrime records and found distinct, persistent patterns of exploitation and abuse covering a 365-day period from September 2022 to August 2023.

The Cybercrime Supply Chain 2023 study examines malware, spam, and phishing together because they are so often used in combination or sequence. Dave Piscitello, co-author, and director of the Cybercrime Information Center project, explains that “An attacker creates or hacks into a cloud or hosting account and installs a malware that can send email. They use this malware to send phishing emails that lure users to fake sites where the user discloses their personal data. The attacker may instead send spam text messages to mobile devices that contain links to banking malware. These are but two examples of the kinds of sequences of attacks involving malware, spam, phishing, and more malware. Every incident along the way is a cybercrime. And they all make use of resources that criminals can obtain from inexpensive suppliers.”

These suppliers form an online cybercrime supply chain where everything from phishing kits and malicious software, email lists and mobile numbers, domain names and Internet addresses, and places to host attacks are readily and cheaply available. The Interisle study measures the Internet naming and addressing elements of this supply chain. The goal? To focus attention on the links in the supply chain where disruption can have meaningful impact.

Among the major findings in the study, Interisle reports that:

- Nearly 5 million domain names were identified as serving as a resource for cybercrime.

- Over 1 million domain names reported for spam activity were registered in the new gTLDs.

- Over 500,000 subdomain hostnames were reported for serving as resources for cybercrime at 229 subdomain resellers.

- Criminals acquire domain names in volume: over 1.5 million domains exhibited characteristics of malicious bulk domain registration behavior.

- Brand infringement is commonplace in domains registered purposely by criminals to perpetrate cybercrimes. Exact matches of a well-known brand name were used in over 200,000 cybercrime attacks

-The United States had the most IPv4 addresses serving as resources for cybercrime activity. China, India, Australia, and Hong Kong rounded out the top 5.

There’s simply too much cybercrime. Data Prot reports that scams comprise 2.5% of spam emails but that phishing, and the resulting identity theft, makes up 73%. The prolific Emotet banking malware is commonly distributed using spam infrastructures. IBM’s data breach report estimates that recovery cost from a data breach resulting from a successful phishing attack was nearly $4.45 million.

The report’s findings illustrate that the reactive efforts currently employed by the domain name and hosting industries, governments, and private sector organizations cannot curtail cybercrime and the harms it inflicts on Internet users. Interisle believes that adopting the well-known strategy of disrupting supply lines can be effective in mitigating cybercrime.

Interisle recommends implementation of measures that, working together, policy regimes, governments, service providers, and private sector can use to disrupt the cybercrime supply chain. These recommendations include:

1) Require registrars and registries to promptly (within 24 hours) investigate and suspend or cancel domain names that are purposely registered by criminals to commit online crimes, especially for cases where these registrants have amassed large batches of domain names.

2) Review the practice of bulk registration and develop policy to prevent abuse.

3) Adopt and enforce policies that protect Internet users from deceptive domain registrations, e.g., domains that contain exact matches of recognized brands.

4) Adopt policy to ensure that additional new TLDs do not result in a more abundant supply chain.

5) Develop a common supply chain disruption strategy for ccTLDs and gTLDs.

The report emphasizes that supply chain disruption requires cross-industry collaboration and explains that hosting operators must develop and promulgate broader web, cloud, and hosting industry best practices, including policies, operational practices, and technical solutions similar to those recommended for the domain industry.

Interisle’s study was sponsored by the AntiPhishing Working Group (APWG, https://apwg.org), the Coalition Against Unsolicited Commercial Email (CAUCE (https://cauce.org), and the Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG, https://m3aawg.org). Collectively, these organizations represent thousands of cybersecurity, public advocacy, service providers, and industry professionals worldwide. "The report makes clear the close connections among malware, phishing, spam, and domain abuse, and the strategies we need to combat them," said CAUCE president John Levine. "We're proud to have supported this important work." M3AAWG executive director Amy Cadagin concurs, adding that “This report underlines the importance of best practices and anti-abuse capabilities for DNS, email, and cloud providers. Legitimate providers must remain vigilant, as they are operating in an environment that is not always trustworthy. M3AAWG is happy to support this study with our valued industry partners.”

Supplements to Cybercrime Supply Chain 2023: Tables of the rankings of TLDs, Registrars, and Hosting Networks for the period 1 May 2022 - 30 April 2023

Yearly Update:
Key Statistics
Yearly Update:
Top Level Domains
Yearly Update:
Registrars
Yearly Update:
Hosting Networks