Skip to main content

Choose your country

F-Secure Scam Kill Chain

A definitive framework for scam tactics and techniques

Over $1 trillion was lost globally to scams in 2023. The internet, with no clear borders, is a hotbed for cyber crime, targeting consumers daily. The cyber threat landscape is overwhelmed with scam tactics, and until now, no framework has comprehensively described how scammers operate. That’s why we created the F-Secure Scam Kill Chain – a detailed breakdown of how modern online scammers operate.¹

A systematic analysis of the scam landscape

At F-Secure, we believe in the power of sharing knowledge. Our goal is to provide a comprehensive understanding of different types of scams. By doing so, we aim to build a rich and detailed knowledge base, breaking down both high-level tactics and more specific techniques. This framework serves as a formal foundation for researching and developing effective defenses against scams. ²

F-Secure Scam Kill Chain

A definitive framework for scam tactics and techniques

Goal: Identify potential victims, based on:

  • Suitability to scam

  • Availability of data

  • Personal interests

  • Demographics

Goal: Build or acquire resources needed to conduct the scam, including:

  • Infrastructure

  • Software

  • Services

  • Personas

  • Bait

Goal: Make contact with victim to deliver bait and engage victim with the bait

Goal: Get the scam to persist for as long as needed

Goal: Get access to any victim information that is needed to complete the scam

Goal: Grow the scam in size

Goal: Turn scam into money

  • 2.1.1. Email infrastructure

  • 2.1.2 SMS infrastructure

  • 2.1.3 Telephone infrastructure

  • 2.1.4 Domain services

  • 2.1.5 Website hosting

  • 2.1.6 Other cloud resources

  • 2.1.7 C2 infrastructure

  • 4.1.1 Assert authority

  • 4.1.2 Likeability, seduction

  • 4.1.3 Scarcity, urgency

  • 4.1.4 Shaming, intimidation, extortion

  • 4.1.5 Community building, peer pressure

  • 4.1.6 Gradual commitment, positive reinforcement

  • 4.1.7 Reciprocity, create obligation

  • 2.2.1 Custom malware

  • 2.2.2 OSS project code

  • 2.2.3 Website and script development (victim-side, adversary-side)

  • 2.2.4 Custom platform bots

  • Genuine small payments

  • Psychological manipulation

  • 2.3.1 Acquire human personnel

  • 2.3.2 Acquire "XYZ“-as-a-Service

  • 2.4.1 Create or acquire real world identities

  • 2.4.2 Create or acquire service identities and accounts

  • 2.4.3 Create or acquire financial

  • 2.5.1 Create Bait Email/SMS message

  • 2.5.2 Create Bait Website

  • 2.5.3 Create Bait Ads

  • 2.5.4 Create Bait Reviews, Likes, Engagement

  • 2.5.5 Create Bait Posts

  • 2.5.6 Create Bait Mobile App

  • 5.5.1 C2 channel

  • 5.5.2 Chat services

  • 5.5.3 Email forwarders

  • 5.5.4 Cloud services

  • 2.6.1 Improve Bait with AI

  • 2.6.2 Improve accuracy of brand impersonation

  • 2.6.3 Mask Suspicious URLs

  • 2.6.4 Leverage SEO poisoning

  • 2.6.5 Write social engineering scripts

Copyright F-Secure Corporation 2025. All rights reserved.

Effortlessly protect consumers from scams

The online scam landscape is extensive, making it challenging to anticipate and protect your customers from every potential threat. Partnering with F-Secure means you don’t have to face these challenges alone – our advanced scam protection technology works behind the scenes to mitigate the most prevalent online threats facing your consumers today.

Flexible integration options

Sources

¹ GASA The Global State of Scams 2023

² Inspired by the MITRE ATT&CK® framework, developed by the MITRE Corporation