Title: The Legal Implications of Malware Distribution and Instructional Cybercrime: A Case Study of Cheoh Hai Beng in Singapore

Abstract
This paper examines the landmark prosecution of Cheoh Hai Beng in Singapore for creating instructional videos on malware-based scams, focusing on the legal, technical, and societal implications of his actions. By analyzing the case under Singapore’s Computer Misuse and Cybersecurity Act (CMCA), the paper explores how jurisdictions respond to the proliferation of instructional cybercrime content and highlights challenges in international cybercrime enforcement. The case serves as a precedent for addressing the deliberate dissemination of malicious technical knowledge.

  1. Introduction

The proliferation of cybercrime has outpaced traditional legal frameworks, necessitating innovative responses to evolving threats. In December 2025, Singapore’s courts sentenced Cheoh Hai Beng, a Malaysian national, for producing instructional videos demonstrating the use of malware—specifically Spymax—to commit organized fraud. This case marks a significant legal milestone as the first prosecution in Singapore for distributing content that teaches individuals how to exploit malware for financial gain. This paper analyzes the case’s technical and legal dimensions, contextualizes it within global cybercrime trends, and discusses its implications for digital ethics and cybersecurity policy.

  1. Background: The Rise of Malware-Driven Cybercrime

Cybercrime has evolved from isolated attacks to sophisticated, organized schemes often facilitated by malware. Spyscams and ransomware, such as Spymax, are particularly insidious due to their ability to remotely access devices, harvest sensitive data, and execute unauthorized transactions. Between 2023 and 2024, a transnational criminal network orchestrated a scheme targeting at least 129 victims in Singapore, resulting in $3.2 million in illicit transactions. Cheoh Hai Beng’s role in this network—creating instructional content on Spymax malware—exemplifies a growing trend where cybercriminals weaponize educational platforms to propagate malicious techniques globally.

  1. Technical Mechanisms of Malware Exploitation

3.1 Spymax Malware Overview
Spymax, a type of Android spyware, enables remote access to a victim’s device, allowing attackers to:

Monitor text messages, call logs, and camera usage.
Track location data.
Steal login credentials for banking and social media platforms.
The malware is often distributed through phishing campaigns or fake apps disguised as legitimate tools (e.g., device optimizers). Once installed, it bypasses standard security protocols by exploiting Android system vulnerabilities.

3.2 Instructional Content and Cybercrime Enablement


Cheoh’s videos, recorded across Malaysia and the Dominican Republic between February and May 2023, detailed methods for deploying Spymax, including:

Modifying existing malware to evade detection.
Creating phishing lures to trick victims into downloading malicious apps.
Monitoring victims’ devices post-infection.
This pedagogical approach lowered the barrier to entry for aspiring cybercriminals, effectively transforming instructional content into a toolkit for organized fraud.

  1. Legal Framework and Prosecution

4.1 Singapore’s Computer Misuse and Cybersecurity Act (CMCA)


Under Section 22 of the CMCA, unauthorized access to a computer program or data is punishable by up to five years in prison. Section 47 criminalizes activities involving organized crime, with enhanced penalties for transnational operations. Cheoh’s prosecution under these sections underscores Singapore’s commitment to addressing both direct cyberattacks and the indirect facilitation of such crimes through knowledge distribution.

4.2 International Jurisdiction and Enforcement


The case highlights challenges in prosecuting crimes with transnational elements. While Cheoh’s videos were distributed globally, Singapore’s legal framework allowed for jurisdiction based on the impact of the scams within the country. Collaboration with international law enforcement agencies was critical in tracing the network’s operations and securing evidence.

4.3 Sentencing and Deterrence


Cheoh received five years and six months in prison and a $3,608 fine, with an additional three-week jail sentence if the fine remains unpaid. This sentence balances punishment and deterrence, signaling that creating instructional cybercrime content is as culpable as executing attacks.

  1. Implications for Cybersecurity and Digital Ethics

5.1 Legal Precedent for Instructional Cybercrime

Cheoh’s prosecution establishes a legal precedent that deliberate dissemination of malicious technical knowledge—regardless of immediate financial gain—constitutes a separate offense. This aligns with broader global efforts, such as the EU’s General Data Protection Regulation (GDPR) and the US Computer Fraud and Abuse Act (CFAA), to criminalize preparatory cybercrime acts.

5.2 Ethical Dilemmas in Digital Knowledge Sharing


The case raises questions about the ethical responsibilities of creators and platforms. While open-source knowledge sharing is foundational to cybersecurity research, there is a clear distinction between defensive education and enabling malicious activity. Platforms must strengthen content moderation to prevent misuse, even as regulators clarify liability for user-generated harmful content.

5.3 Challenges in Combating Instructional Cybercrime

Anonymity and Jurisdiction: Cybercriminals often operate in regions with weak cybercrime laws, complicating enforcement.
Rapid Technological Evolution: Malware like Spymax evolves to bypass security measures, requiring continuous adaptation of legal and technical defenses.
Victim Awareness: Public education remains crucial to mitigate the effects of phishing and malware distribution.

  1. Comparative Analysis with Global Trends

Similar cases include the prosecution of creators of the Zeus malware trojan in the US and the takedown of the Darkode forum for cybercrime in 2015. While jurisdictions vary in their approaches, Singapore’s case distinguishes itself by focusing explicitly on the pedagogical aspect of cybercrime. This aligns with the UK’s 2023 Cyber Security Act, which criminalizes offering services for unauthorized intrusion.

  1. Conclusion and Recommendations

Cheoh Hai Beng’s prosecution represents a pivotal moment in Singapore’s fight against cybercrime, emphasizing that the dissemination of malicious technical knowledge is a culpable act in itself. Key recommendations include:

Legislative Refinement: Expanding laws to address the indirect facilitation of cybercrime, such as hosting instructional content.
International Collaboration: Strengthening cross-border partnerships to dismantle cybercrime networks effectively.
Public-Private Partnerships: Encouraging tech companies to invest in AI-driven content moderation to identify and remove harmful instructional material.
Digital Literacy Campaigns: Enhancing public awareness to reduce susceptibility to scams.

As cybercrime continues to evolve, cases like Cheoh’s will shape the regulatory landscape, ensuring that the legal system keeps pace with the digital age.

References

Singapore Computer Misuse and Cybersecurity Act (CMCA), 2017.
Ministry of Communications and Information, Singapore. (2025). Annual Cybersecurity Threat Report.
Krebs, B. (2023). “The Business of Malware.” Dark Reading.
European Union Agency for Cybersecurity (ENISA). (2024). Threat Landscape for Malware 2024.
United Nations Office on Drugs and Crime. (2025). Global Report on Transnational Organized Cybercrime.

This paper synthesizes legal, technical, and ethical perspectives to provide a comprehensive analysis of the Cheoh Hai Beng case, offering insights into the broader implications for cybersecurity governance and law enforcement in an increasingly digital world.