Fraudulent phone calls have become a daily reality for millions of people worldwide. From fake law enforcement officials to bank representatives and impersonated tech support agents, victims are increasingly targeted through direct, real-time conversations designed to create urgency accompanied by high psychological pressure to extract sensitive information or money theft.
Reports show that this type of cybercrime significantly impacts society both financially and emotionally. According to the FBI, US elderly citizens (60+) lost $3.4B in 2023. Another report shows that vishing increased by 449% in 2025 and the average loss per scam call is $3,690.
In this article, we shine a light on what can be described as “Caller-as-a-Service”, which is an under-explored yet rapidly evolving facet of modern cybercrime. We examine how, much like legitimate sales organizations, threat actors have adopted structured, business-like operating models, complete with specialization, scalability, and performance-driven execution.
These ecosystems are no longer ad hoc. They are composed of distinct roles and functions, with different actors focusing on specific stages of the attack lifecycle: from infrastructure and tooling to social engineering execution.
We explore how these networks operate, including their recruitment strategies, defined roles and responsibilities, and even tailored compensation models—all of which closely mirror legitimate market dynamics.
The result is a highly organized, service-driven economy that professionalizes fraud at scale, lowering the barrier to entry while increasing both efficiency and impact.
A Structured Organized Market
The scam call ecosystem has become highly professionalized and segmented, mirroring legitimate business operations. Distinct roles now exist across the value chain, including malware developers, distributors, phishing kit builders, infrastructure operators, log sellers, data analysts, victim list traders, and finally, scam callers who execute the attacks.
This division of labor allows each participant to specialize. For callers, who are solely focused on interacting with victims, the emphasis shifts toward recruitment quality and operational professionalism rather than technical capability.
As a result, the barrier to entry is significantly lowered. Individuals no longer need to develop malware or manage infrastructure, and they can focus on refining communication skills, persuasion techniques, and social engineering tactics.
... continue reading