Preventing Crime-as-a-Service with Cutting-Edge Tools and Intelligence

Call ID

HORIZON-CL3-2023-FCT-01

Duration

01.09.2024 – 31.08.2027

Total Budget
0 M€
Partners
0
Countries
0
Use Cases
0

The Vision

Crime-as-a-Service (Caas)

CaaS represents a worrying evolution in the cyber threat landscape, transforming criminal activities into organised and commercialised enterprises. Similar to legitimate Software-as-a-Service (SaaS) platforms, CaaS offers on-demand illicit services such as malware rentals and fraud platforms. This shift lowers barriers to entry for cybercriminals, enabling individuals without technical skills to engage in activities like identity theft and payment card fraud through digital means. The consequence is a significant amplification of criminal operations’ scale and impact.

Our Aim

SafeHorizon aims to tackle the emerging threat of Crime-as-a-Service (CaaS) by harnessing intelligence from various sources including the clear web, deep web, dark web, public dumps, and law enforcement datasets. By integrating these data streams with machine learning technologies, the project seeks to extract actionable evidence for legal use.

Use Cases

Monitoring transnational crime networks

Monitoring activities of actors in crime networks including ongoing malicious campaigns that may span across different jurisdictions and developing a set of dedicated crawlers which will provide insight and visibility of real-time activity of malicious online activity.

Criminal marketplace analysis

In order to assess the efficacy of the crawlers and the correlation engine, this use case is dedicated to the analysis of criminal marketplaces, and includes testing of the usefulness of SafeHorizon tools to identify crime networks and investigate their members.

Child sexual abuse and trafficking

This use case presents a comprehensive overview of the distribution channels and of the release dates of child sexual abuse material (CSAM).

Malware-as-a-Service

Malware-as-a-Service (MaaS) is a business model under which cybercriminals provide access to malicious software and related infrastructure for a fee, and in this use case we monitor and analyse ongoing malicious campaigns that may target organisations or individuals.

Partners

Coordinated by the Athena Research Center, SafeHorizon is a multidisciplinary research and development initiative spearheaded by an international consortium comprising 13 partners from 11 countries. Carefully selected consortium is gathering outstanding R&D centers and universities, businesses and Law enforcement agencies (LEAs) to ensure the perspective of developers, cybersecurity practitioners, researchers, and machine learning experts focusing on technical areas between security and development. Committed to contributing to cybercrime prevention improvement, the Consortium will ensure provision of a comprehensive toolbox of underdevelopment and enhanced open-source solutions for combating cybercrime designed to be user-friendly and easily adaptable.

Latest News

  • 19 November 2025|Blog|1.1 min|

    From Files to Networks: Disrupting CSAM Distribution at Its Source

    Recent arrests highlight how CSAM is distributed at scale. Targeting the digital infrastructure behind it is key to dismantling networks and protecting children.

  • 6 November 2025|Blog|2.2 min|

    Crime-as-a-Service and Malware-as-a-Service: The Professionalisation of Cyber Crime

    Cybercrime has evolved into a professional underground economy driven by Crime-as-a-Service (CaaS) and Malware-as-a-Service (MaaS), where even non-experts can launch sophisticated attacks. These “cybercrime-for-hire” models are reshaping the threat landscape, demanding stronger defences and global cooperation.

  • 22 October 2025|Blog|1.3 min|

    Operation SIMCARTEL: Inside the Infrastructure Powering Crime-as-a-Service

    Operation SIMCARTEL exposes the hidden infrastructure of Crime-as-a-Service, showing why dismantling criminal tools is key to preventing fraud.

  • 22 October 2025|Blog|0.9 min|

    From Chaos to Clarity: Real-Time Crypto Crime Intelligence with NOVA Internal AI

    NOVA detects crypto crime reports in real time, extracts wallets with AI, and sends alerts to investigators, cutting delays, errors, and fund losses.

  • 22 October 2025|Blog|1.8 min|

    Disinformation as a Disruption Tool: Outsmarting Crime-as-a-Service from the Inside

    Crime-as-a-Service turns cybercrime into a business. By targeting trust with counter-disinformation, LEAs can disrupt CaaS networks, slow attacks, and protect victims.

  • 1 October 2025|Blog|5.6 min|

    Security Challenges in Corporate Generative AI: ChatGPT, Copilot, Recall and others

    The rapid adoption of AI tools like ChatGPT in organisations is raising major cybersecurity concerns, as security teams lack visibility into which tools are used and what sensitive data is being processed.

  • 1 October 2025|Blog|2 min|

    Pig Butchering Scams: The Long Con Behind Crypto Romance Frauds

    Pig butchering (sha zhu pan) is a fast-growing crypto fraud that combines romance scams, investment fraud, and social engineering. Victims are groomed emotionally and financially before being tricked into transferring their savings to fake crypto platforms.

  • 22 September 2025|Blog|1.4 min|

    Exploring Digital Drug Trading Ecologies

    New study by Tampere University compares Finnish, Polish and English darknet platforms, showing how language, culture and tech shape distinct drug trading ecologies.

  • 22 September 2025|Blog|1.3 min|

    Uncovering How Offenders Exploit Technology for Child Abuse

    “Tell Me More About Tech” explores how offenders exploit digital tools for child abuse, providing evidence to help policymakers and platforms strengthen child online safety.

  • 16 September 2025|Blog|2.5 min|

    Top 3 Ransomware Operations Involving Cryptocurrency in the Past Five Years

    Ransomware relies on cryptocurrency for fast, global payments, but every transaction leaves a blockchain trace, creating both challenges and investigative opportunities for law enforcement.

Events