【Notice】 We are pleased to announce that our "Good Faith Squatting Strategy (Phishing Takeover)" has been featured in 24 media outlets, including NIKKEI COMPASS, CNET Japan, ZDNET JAPAN, Sankei Shimbun, Toyo Keizai Online, and NewsPicks. Learn More

What is TaaS (Takedown As a Service)?

What is TaaS (Takedown As a Service)?

Aug. 29, 2024

TaaS (Takedown as a Service) is a service model designed to swiftly remove phishing sites and illegal content. With the rapid advancement of generative AI, fraudulent websites and malicious content have become increasingly sophisticated, posing greater threats on the internet.

1. Definition and Background of TaaS

TaaS, or Takedown As a Service, refers to the provisioning of takedown services under an "As a Service" model. While SaaS (Software As a Service) is a well-known example, the security industry has adopted various service models, including PtaaS (Pentesting As a Service).

TaaS (Takedown as a Service) is a service model designed to swiftly remove phishing sites and illegal content. With the rapid advancement of generative AI, fraudulent websites and malicious content have become increasingly sophisticated, posing greater threats on the internet. In addition to traditional phishing scams, new types of fraud, such as investment scams impersonating celebrities and scams using unconventional methods like messaging apps and voice calls, have emerged. The variety of "content types" used in scams is expanding, incorporating not just text, but also voice and video. This trend is expected to escalate as AI technology continues to evolve.

To counter these threats, TaaS is emerging as a new trend in the security industry.

2. Security Phases and the As a Service Model

Security measures typically involve several phases, such as prevention, detection, analysis, threat response, recurrence prevention, and protocol formulation. These phases often repeat in a cycle, akin to the PDCA (Plan-Do-Check-Act) cycle in incident response lifecycle management.

A critical point to note is that current "As a Service" models in the security sector are predominantly focused on passive responses (prevention, detection, analysis).

3. Differences Between Passive and Active Responses

Traditional security services have focused mainly on passive responses, such as malware detection software, threat analysis platforms, penetration testing, and vulnerability assessments. However, TaaS represents a shift towards active response phases. It is a service model specializing in the "endgame" of threat management, aimed at quickly "resolving" issues with fraudulent sites and content. For instance, in a notable case, a swift takedown of a fraudulent site shortly after the service commenced provided substantial reassurance to a financial institution with significant stakes.

Despite the high demand for threat response in the security industry, there is a notable shortage of providers offering such solutions. TaaS aims to bridge this gap.

There are several reasons for this gap, but the key takeaway is that it exists and addressing it is crucial due to its significant social impact.

【1】In the current market, solutions that address active response phases are mainly provided by Incident Response Services (CERT) and cybersecurity divisions of law enforcement agencies. The distribution clearly shows that solutions for active response are more aligned with government bodies or legal services rather than the private security industry. This is because takedown services straddle the legal and digital domains. Additionally, the need for risk management introduces a complexity that forms a "strategic tetrad" involving digital strategy, legal compliance, and ethics, making it challenging to formalize as an "As a Service" model.

4. Strategic Phases and the Role of TaaS

In security strategy, there are phases like the opening (prevention and detection), the middle game (vulnerability assessment and PtaaS), and the endgame (threat response and TaaS). TaaS is the service that fits squarely in the endgame phase. It responds to demands such as, "Can you deal with this problematic entity?" effectively "checkmating" fraudulent entities.

5. TaaS and Risk Management: TaaS as a Risk Proxy

TaaS is more than just a security service; it also plays a critical role in risk management. For large enterprises, takedown operations can be cumbersome and risky, making efficiency and risk management key priorities. Companies with a strong focus on compliance find it easier to justify outsourcing TaaS as a means of risk avoidance, thereby increasing its adoption potential. TaaS functions as a risk "proxy," enabling large enterprises to shift their risks externally.

6. Future Outlook: TaaS as the Security Endgame

Looking ahead, TaaS is poised to solidify its position as the endgame in proactive security measures. By addressing the gap between the rising demand for threat response and the shortage of providers, TaaS will become a pivotal player in shaping the future of security. From a risk management perspective, TaaS is expected to play an increasingly critical role.

To realize this future, numerous successful case studies have already been documented.

  1. 【Case Study】 Taking Down Phishing Sites in 2 Days for a Financial Institution -A Successful Phishing Site Takedown with a 1034% ROI
  2. A New Approach to Prevent the Recurrence of Phishing Domains: Introduction of the "Good Faith Squatting Strategy (Phishing Takeover)"