Insights | Integrity360

How cybercrime gangs work: roles, structure and the SaaS model

Written by Matthew Olney | 01 April 2026 05:00:00 Z

Cyber crime is often misunderstood as the work of lone hackers operating in isolation. In reality,  cybercriminal activity more closely resembles a structured business ecosystem, with clearly defined roles, supply chains, and even performance expectations. Many cybercriminal gangs operate with the same level of organisation as legitimate enterprises, distributing responsibilities across specialised functions to maximise efficiency, reduce risk, and scale operations.

What are the differing roles in cyber crime?

Understanding these roles is critical for organisations looking to defend themselves effectively. By recognising how these groups are structured, defenders can better anticipate attack patterns, identify weak points in the cybercriminal lifecycle, and disrupt activity before it escalates into a full-scale incident.

Recruiters

Recruiters are responsible for sourcing talent into cybercriminal operations. This includes both technically skilled individuals and non-technical participants who can support broader activities. Recruitment often takes place on underground forums, encrypted messaging platforms, or even mainstream channels disguised as legitimate job opportunities.

These actors target disillusioned employees, freelancers, or individuals in regions with fewer economic opportunities. In some cases, insiders are deliberately recruited to provide access to corporate environments. This is particularly dangerous, as insider-assisted attacks bypass many traditional security controls.

Recruiters are also instrumental in scaling operations. As cybercriminal groups grow, the need for reliable personnel increases, and recruiters ensure a steady pipeline of contributors who can fulfil specific roles within the ecosystem.

 

 

Partners and affiliates

Many cybercriminal operations, particularly ransomware groups, operate using an affiliate model. In this structure, a core group develops the tools and infrastructure, while affiliates are responsible for executing attacks.

Affiliates gain access to ransomware kits, exploit frameworks, or phishing platforms, typically in exchange for a share of the profits. This model lowers the barrier to entry for cybercrime, enabling less technically skilled individuals to carry out sophisticated attacks.

The affiliate ecosystem allows cybercriminal organisations to scale rapidly without directly managing every operation. It also creates a layer of separation between developers and attackers, making attribution and disruption more challenging for law enforcement.

Technical specialists

Technical specialists form the backbone of cybercriminal operations. These individuals design, develop, and maintain the tools used in attacks. Their expertise spans malware development, exploit creation, infrastructure management, and evasion techniques.

This group includes:

    • Malware developers building ransomware, trojans, and spyware
    • Exploit developers identifying and weaponising vulnerabilities
    • Infrastructure engineers managing command-and-control servers
    • Security bypass specialists focused on evading detection tools

Technical specialists often operate as service providers within the underground economy, selling or leasing their tools to other criminals. This commoditisation of cybercrime capabilities has significantly accelerated the pace and scale of attacks.

 

 

Money launderers

Once funds are obtained, typically through ransomware payments, fraud, or data theft, they must be laundered to avoid detection. Money launderers play a critical role in converting illicit gains into usable assets.

This process often involves:

    • Cryptocurrency mixing services to obscure transaction trails
    • Conversion between different digital currencies
    • Use of mule accounts to move funds across jurisdictions
    • Integration into legitimate financial systems through shell companies or front businesses

Without effective laundering, cybercriminal operations would struggle to monetise their activities. As such, these actors are a key enabler of the entire ecosystem.

 

Forums and marketplaces

Cybercriminal forums and marketplaces act as the infrastructure of the underground economy. These platforms facilitate the buying, selling, and exchange of tools, data, and services.

Common offerings include:

    • Stolen credentials and personal data
    • Malware kits and exploit tools
    • Initial access to compromised systems
    • Tutorials and operational guidance

These marketplaces also provide reputation systems, escrow services, and dispute resolution mechanisms, mirroring legitimate e-commerce platforms. This level of sophistication helps build trust between criminals and supports long-term collaboration.

 

 

Support staff

Support staff are often overlooked but are essential to maintaining operational efficiency. In some ransomware groups, support teams even interact directly with victims.

Their responsibilities may include:

    • Managing negotiation communications during ransomware incidents
    • Providing “customer support” to victims paying ransoms
    • Maintaining documentation and operational playbooks
    • Handling logistics such as account management and access provisioning

This professionalisation highlights how cybercriminal groups prioritise user experience, even in illicit activities, to maximise payment success rates.

Operators

Operators are responsible for executing attacks at a technical level. They deploy malware, exploit vulnerabilities, and move laterally within compromised networks.

Their activities typically include:

    • Gaining initial access through phishing, credential theft, or exploitation
    • Escalating privileges within the target environment
    • Conducting reconnaissance to identify valuable assets
    • Deploying payloads such as ransomware or data exfiltration tools

Operators require a strong technical skill set and often follow structured playbooks developed by technical specialists or leadership within the group.

Operatives

While similar to operators, operatives are generally focused on specific tasks within the attack chain rather than managing the full technical execution. They may be responsible for individual stages such as phishing campaigns, social engineering, or physical access support.

Examples include:

    • Phishing campaign coordinators sending large-scale email attacks
    • Social engineers manipulating employees into revealing credentials
    • Initial access brokers selling entry points into networks
    • Insiders providing privileged access or sensitive information

Operatives enable cybercriminal groups to distribute risk and specialise tasks, making operations more efficient and harder to detect.

 

 

How cybercriminal groups operate like SaaS businesses

 

One of the most important shifts in modern cyber crime is the move towards operating models that closely resemble Software-as-a-Service (SaaS) businesses. This evolution has fundamentally changed how attacks are delivered, scaled, and monetised.

At the core of this model is Cybercrime-as-a-Service (CaaS). Instead of requiring every actor to have deep technical expertise, cybercriminal groups package their tools into accessible, subscription-based offerings. Ransomware-as-a-Service (RaaS) is the most prominent example, where affiliates can effectively “rent” ransomware platforms complete with dashboards, support, and documentation.

These platforms often include:

    • User-friendly control panels to manage campaigns
    • Built-in analytics to track infection rates and payments
    • Regular updates and feature enhancements
    • Tiered pricing or profit-sharing models
    • Customer support channels for affiliates

This mirrors legitimate SaaS businesses almost exactly. There are onboarding processes, usage guides, and even performance optimisation advice. Some groups provide service level expectations, ensuring uptime of infrastructure and reliability of their tools.

The SaaS model also enables rapid scaling. Developers focus on improving the product, while affiliates drive distribution. This separation of concerns allows cybercriminal ecosystems to grow quickly and operate across multiple geographies simultaneously.

From a defensive perspective, this model significantly increases risk. It lowers the barrier to entry, meaning more actors can launch attacks without advanced skills. It also accelerates innovation, as competing groups continuously refine their offerings to attract more affiliates.

In effect, cyber crime has adopted the efficiency, scalability, and customer-centric mindset of modern software companies. This is why organisations are now facing more frequent, more sophisticated, and more coordinated attacks than ever before.

 

Why this structure matters for defenders

 

The structured nature of cybercriminal organisations means that defending against them requires a similarly coordinated approach. Each role represents a potential point of disruption.

For example:

    • Disrupting recruitment channels can limit access to insider threats
    • Monitoring underground forums can provide early warning of planned attacks
    • Targeting infrastructure used by technical specialists can degrade capabilities
    • Tracking financial flows can expose laundering networks

Organisations must adopt a layered defence strategy that considers not just the attack itself, but the broader ecosystem enabling it.

 

 

How AI is changing the cybercrime landscape

Artificial intelligence is rapidly reshaping cyber crime, acting as a force multiplier across nearly every role within the ecosystem. What once required time, coordination, and technical depth can now be automated, refined, and scaled with far greater efficiency.

For recruiters and operatives, AI enables highly convincing social engineering. Phishing campaigns are now personalised, context-aware, and free from the errors that once made them easy to detect. Deepfake voice and video are also being used to impersonate executives, increasing the success rate of fraud and business email compromise attacks.

Technical specialists are using AI to accelerate development cycles. Malware can be adapted more quickly to evade detection, while AI-assisted tooling helps identify weaknesses in target environments and optimise attack paths.

Operators benefit from automation, with AI supporting reconnaissance, credential harvesting, and lateral movement. This reduces manual effort and allows attacks to run at scale across multiple targets simultaneously.

Crucially, AI lowers the barrier to entry. Less experienced actors can generate phishing content, scripts, and attack workflows with minimal expertise.

For defenders, this means facing faster, more targeted, and more sophisticated threats that are harder to detect using traditional methods.

By understanding the differing roles within cybercriminal gangs, organisations can move beyond reactive security measures and take a more proactive stance. This includes anticipating attacker behaviour, identifying early indicators of compromise, and disrupting operations before they reach critical stages.

In a landscape where cybercriminals operate like businesses, defenders must respond with the same level of structure, intelligence, and coordination.

If you are worried about any cyber threats or need help in determining what steps you should take to protect yourself from the most material threats facing your organisation, please get in touchto find out how you can protect your organisation.