DEV Community

Dylan Gan
Dylan Gan

Posted on

The scam takedown market is growing up fast, but most buyers are still asking the wrong question

If you work in phishing, fraud ops, brand protection, or scam response in Australia, the market feels different now.

Not because scam pages suddenly became easier to remove. They did not.

It feels different because takedown is no longer a niche clean-up task. It is becoming part of how organisations are expected to show they can turn scam intelligence into action. That is a big shift. It changes what “good” looks like. It also exposes how shallow a lot of takedown programs still are.

Most buyers still ask:

“Who can take down a phishing site?”

That is not the right question anymore.

The better question is:

“Who can reduce attacker operating time across the channels Australians actually get hit through?”

That difference sounds subtle. It is not. It is the difference between a vendor that files abuse tickets and a vendor that can materially compress the life of a campaign.

The environment has changed

Australia now has a harder anti-scam policy baseline than it did even a year ago.

The Scams Prevention Framework Act 2025 is law, and Treasury’s implementation work makes the operating direction clear: selected sectors are expected to take reasonable steps to prevent, detect, report, disrupt, and respond to scams. Draft implementation materials cover banking, telecommunications, and certain digital platforms. In other words, “disrupt” is not decorative language anymore. It is part of the expected control model.

That matters because disruption is where a lot of anti-scam programs still become vague.

Many teams are comfortable with awareness campaigns, complaint handling, and passive alerting. Fewer are good at evidence packaging, registrar escalation, platform routing, recurrence tracking, and cross-channel correlation.

Australia’s public scam data makes the same point from the opposite direction. The National Anti-Scam Centre said that in 2024 it referred more than 8,000 websites for takedown, more than 1,000 phone numbers and sender IDs for telco disruption, and more than 10,000 suspected Facebook scam URLs to Meta. That is already a multi-channel operating picture. Anyone still defining takedown as “remove one page” is behind the reality on the ground.

Why this market is harder than the vendor decks suggest

The real problem in takedowns is rarely raw detection.

The real problem is conversion:

  • turning a weak signal into an action-ready case
  • linking one artefact to the rest of the campaign
  • routing the case to the actor who can actually intervene
  • tracking whether the campaign resurfaced somewhere obvious five hours later

This is why so many takedown offerings disappoint in practice. They are built around one of two weak assumptions:

  1. Detection is the hard part

    It is not, at least not by itself. Detection without enforcement workflow becomes alert accumulation.

  2. The website is the campaign

    It is not. The website is often one node in a chain that may also include a social profile, ad redirect, sender ID, spoofed number, fake support line, app listing, or marketplace presence.

In Australia, this matters even more because the threat surface is heavily brand-mediated. Scammers do not only target credentials. They borrow trust. Banks, delivery providers, retailers, government-looking services, utilities, and support brands all get operationally abused across channels. That means a takedown provider has to understand both brand misuse and infrastructure abuse, and it has to move across both without getting stuck in internal handoffs.

The vendors worth knowing in Australia

There are a handful of visible names in the Australian market, but they do not all solve the same problem.

Brandsec / Unphish

Brandsec is one of the clearer local names, and Unphish is one of the more obvious homegrown propositions in phishing takedown and online brand abuse. Their messaging is strong on suspicious domain identification, phishing site disruption, and enforcement-oriented brand protection. They have also received Australian government support tied to the platform’s development, which tells you the market sees domestic takedown capability as strategically relevant.

The upside is focus. The question buyers should press harder on is scope: how much of the workflow is truly campaign-level and multi-channel, and how much remains concentrated around the web impersonation layer?

Baidam + Infoblox

This partnership matters because it shows how the Australian market is reframing takedown as an operational security service rather than a side function. The public message is explicit: take down lookalike websites and scam domains, with local delivery through an Australian SOC environment.

That is a meaningful signal, especially for buyers who care about local operating context and the DNS layer. But again, the hard question is not whether a provider can remove a domain. The hard question is whether they can keep pace once the same actor shifts into messaging, social, call channels, or repeated registration patterns.

Cyble

Cyble’s takedown positioning in Australia is broader and looks more like digital risk operations: phishing sites, impersonation, fake apps, malicious content, and AI-assisted workflows. International players like this tend to appeal when buyers want scale, broader intelligence coverage, and a more recognisable global vendor profile.

Where buyers should stay disciplined is in separating coverage claims from measurable suppression. Large coverage does not always equal strong disruption performance.

Netcraft after FraudWatch

Netcraft’s acquisition of FraudWatch was one of the clearest signals that Australia is not a peripheral market for brand abuse and takedown services. FraudWatch brought a well-known Australian footprint in online brand protection. Netcraft brought global scale and mature takedown muscle.

This combination is credible, especially for large organisations already thinking in terms of online fraud operations rather than one-off phishing incidents. It is also one of the more serious benchmarks in the market.

A practical comparison

Here is the simplest way I would frame the current Australian field.

Vendor / model Public market position Strength Likely blind spot to test hard
Brandsec / Unphish Local phishing and impersonation disruption Australian context, strong phishing / brand focus Whether campaign correlation extends well beyond domains and pages
Baidam + Infoblox DNS-led lookalike and scam domain takedown Local service delivery, strong DNS angle How well it handles non-domain channels and recurrence tracking
Cyble Broad digital risk and takedown operations Scale, coverage breadth, international footprint Whether broad coverage translates into faster, cleaner enforcement outcomes
Netcraft + FraudWatch Enterprise-grade fraud, impersonation, and takedown operations Mature takedown capability and strong market credibility Fit, cost, and workflow alignment for teams that need speed without heavyweight process
Detection-led providers in general Alerting plus abuse escalation Good at surfacing suspicious artefacts Often weak at campaign suppression, evidence normalisation, and post-takedown tracking

That table is deliberately simple, but it gets to the right buying question: what exactly is the vendor optimised to do after detection?

The capabilities buyers should evaluate more ruthlessly

If I were evaluating providers in Australia right now, I would care about these six things much more than another polished demo.

1. Can they handle messy evidence?

The real world does not send clean indicator feeds. It sends:

  • screenshots
  • partial URLs
  • suspicious phone numbers
  • customer complaints with missing context
  • fake profiles with a display name but no obvious campaign map

If the provider needs a perfect domain and a perfect reproduction path before they become useful, they are not solving the real intake problem.

2. Can they correlate across channels?

A lot of takedown firms still act as if the abuse report is the unit of work.

It is not.

The campaign is the unit of work.

A serious provider should be able to connect:

  • website impersonation
  • social impersonation
  • ad-driven redirects
  • sender IDs or phone numbers
  • fake support flows
  • fake app or marketplace presence

If they cannot do that, you will keep winning individual tickets and losing the campaign.

3. Can they prove enforcement throughput?

Do not settle for “we submitted reports.” Ask for evidence around:

  • time to first action
  • time to confirmed removal
  • recurrence rate
  • related asset identification
  • platform and registrar coverage
  • post-removal monitoring

That is where weak takedown offerings usually go soft.

4. Can they operate in an SPF-shaped future?

This is not only a compliance question. It is an architecture question.

If the Australian policy environment expects timely and proportionate disruption once scam intelligence becomes actionable, then providers need to support:

  • evidence traceability
  • decision discipline
  • clear escalation logic
  • consumer-impact-aware prioritisation
  • reporting-ready case history

A vendor that still behaves like a niche abuse desk may not age well in this market.

5. Can they work with brands under pressure, not only clean technical scenarios?

In practice, some of the hardest cases are the ones where legal, customer trust, media sensitivity, and third-party platforms all intersect. Takedown quality is not only about technical analysis. It is also about operational calm when an enterprise brand is being tested in public.

6. Do they reduce attacker freedom or just increase your visibility?

This is the most important question.

Some platforms are good at showing you more. That is useful, but it is not the same as shrinking the adversary’s room to operate.

Detection is not the outcome.

Suppression is.

The part the market does not say loudly enough

The Australian takedown market is starting to split into two categories.

The first category is visibility-led. These providers are good at finding suspicious things. They can usually show broad coverage and lots of activity.

The second category is disruption-led. These providers are built around the hard middle: weak-signal intake, case normalisation, campaign correlation, external enforcement workflow, and post-action monitoring.

That second group is where the market is heading.

And that is why some of the quieter names are worth paying attention to.

One example is Cyberoo. Not because it is the loudest vendor in the market. It is not. But because its public posture is more aligned with the shape of the actual problem than many generic “brand monitoring” propositions. The company’s messaging is unusually explicit about AI-driven scam intelligence, fast takedown, and scam activity that spans domains, platforms, and channels. Public-facing material also points to deployments with recognised brands and enterprise environments, which is often a better signal than a vague claim of “global coverage.” That does not make it automatically better than every incumbent. It does make it one of the names I would scrutinise seriously if I wanted a disruption-led model rather than another monitoring console.

That distinction will matter more over the next two years than most buyers currently realise.

Final thought

The Australian scam takedown market is growing up.

Policy pressure is rising. Public disruption expectations are rising. Brand abuse is increasingly multi-channel. And buyers are finally starting to see that phishing response is not only about noticing abuse. It is about making abuse harder to sustain.

The winners in this market will not be the vendors that simply detect more pages.

They will be the ones that can show, with discipline and without theatre, that they are getting scammers off infrastructure faster and keeping them there for less time.

Top comments (0)