Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Google Warns: Hackers Use AI to Create Zero- Using Working
May 11, 2026
Go Library fsnotify: Supply Chain Alarms After Access Changes
May 11, 2026
Hackers Use PlugX DLL Sideloading in PlugX-Like Chain
May 11, 2026
Home/Threats/New ‘Penguin’ Pig Butchering as a Service Selling PII, Stolen
Threats

New ‘Penguin’ Pig Butchering as a Service Selling PII, Stolen

A dangerous evolution in cybercrime is underway as pig butchering scams transform into turnkey services, drastically lowering entry barriers for malicious actors worldwide. The “Penguin” operation...

David kimber
David kimber
January 12, 2026 3 Min Read
3 0

A dangerous evolution in cybercrime is underway as pig butchering scams transform into turnkey services, drastically lowering entry barriers for malicious actors worldwide.

The “Penguin” operation represents a growing marketplace that provides everything scammers need to launch large-scale fraud campaigns, from stolen personal data to ready-made fraud templates.

This service-based model mirrors other crime-as-a-service platforms but targets victims through social engineering schemes that drain life savings and retirement funds.

Over the past decade, Chinese-speaking criminal groups have built industrial-scale scam centers across Southeast Asia, creating special economic zones dedicated entirely to fraud operations.

These compounds staff thousands of forced workers who execute romance scams, investment fraud, and other pig butchering schemes.

The transformation from individual scammers to organized service providers has created what experts call Pig Butchering as a Service, or PBaaS.

This model supplies criminal networks with tools, stolen credentials, infrastructure, and management platforms that enable operations to scale rapidly.

Hendryadrian and Infoblox Threat Intel analysts identified the Penguin operation through underground marketplace analysis, revealing a comprehensive fraud ecosystem.

The service provider operates under multiple names including Heavenly Alliance and Overseas Alliance, advertising openly on encrypted platforms.

They offer fraud kits, pre-registered SIM cards, stolen social media accounts, and payment processing systems that allow scammers to launch operations with minimal technical knowledge.

Website templates start at just $50, while complete fraud packages cost around $2,500, making entry into this criminal economy surprisingly affordable.

Inside Penguin’s Operation and Service Offerings

Penguin began by selling shè gōng kù databases, which contain stolen personally identifiable information of Chinese citizens collected through government corruption or data breaches.

These databases include years of bank records, travel history, political affiliations, and family details that scammers use to identify wealthy targets and build trust during social engineering attacks.

The platform now sells Western social media accounts from Tinder, WhatsApp, Adobe, and Apple’s developer platforms. Pre-registered accounts cost as little as $0.10, with prices increasing based on registration date and authenticity verification.

The Penguin Account Store selling anonymous SIM cards and credit cards in bulk (Source - Infoblox)
The Penguin Account Store selling anonymous SIM cards and credit cards in bulk (Source – Infoblox)

The service extends beyond stolen data to include complete operational support. Penguin provides “character sets,” which are collections of stolen photos harvested from social media profiles used to create convincing fake identities.

They also offer 4G and 5G routers, IMSI catchers, and SCRM platforms that automate victim engagement across social channels.

The BCD Pay payment processing system connects directly to anonymous peer-to-peer networks rooted in illegal gambling operations, allowing scammers to launder stolen funds and move cryptocurrency outside law enforcement reach.

Criminal groups purchase management platforms like UWORK that centralize fraud operations through customer relationship management dashboards.

These platforms let administrators create agent profiles, set deposit thresholds, track profitability metrics, and geofence websites to avoid law enforcement in high-risk countries.

First-level agents handling direct victim contact have restricted access, preventing them from stealing money meant for operation leaders.

A decoy news app that is secretly a scam trading platform (Source – Infoblox)

The systems integrate with legitimate trading platforms like MetaTrader, displaying real-time financial data that makes fake investment sites appear credible.

Mobile apps distributed through iOS provisioning files and Android APK sideloading bypass official app store verification, installing scam platforms directly onto victim devices while potentially granting device management access to criminals.

The commodification of these fraud services has dramatically increased both the scale and sophistication of pig butchering operations globally.

Law enforcement and security professionals now face an organized, service-based criminal ecosystem rather than isolated scam groups.

Disrupting this threat requires targeting the service providers, financial enablers, company formation facilitators, and DNS infrastructure that underpin the entire PBaaS economy.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackBreachSecurityThreat

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

EDRStartupHinder Tool Blocks Antivirus on Windows Defender

Next Post

Research Reveals 28 IPs & 85 Domains Hosting Uncovers Unique

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
ShinyHunters Breaches Instructure Canvas LMS Free-
May 11, 2026
Hugging Face Repo with 200k Downloads Inst Trending Repository
May 11, 2026
GhostLock Attack Locks Files Via Windows Sharing Like Ransom
May 11, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us