Cybercrime Atlas Impact Report 2025

Page 16 of 26 · WEF_Cybercrime_Atlas_Impact_Report_2025.pdf

In November 2024, the Cybercrime Atlas launched an applied research group known as Cybercrime Atlas Research and Mapping. This began with a core group drawn from Banco Santander, Group-IB, Binance and OrangeCyberDefence. In the second half of 2025, this expanded to include Mastercard, Recorded Future, Lemon Cash, SpyCloud and Scitum, and applied research institutions like TNO Nederlands.As Cybercrime Atlas research builds out, the information collected will identify where criminals are most vulnerable to disruption by highlighting single points of failure – or “choke points” – in their activities.8 This can support cyberthreat mitigation by participating organizations and identify opportunities for collective disruption of cybercriminal activities in partnership with the public sector. Operational collaborationIncentives Organization and governance ResourcesFIGURE 8 Disrupting cybercrime networks collaboration framework Source World Economic Forum. (2025). Disrupting Cybercrime Networks: A Collaboration Framework . Cybercrime Atlas participants collaborate to build a shared understanding of cybercriminal networks using OSINT. This information then supports community members in creating friction across cybercriminal activities and supports action by public-sector agencies. Participants come from different regions, different types and sizes of organization, or both because of their individual expertise. This mix of skills, cultures and legal contexts requires a balance between strict governance of some areas of activity and significant flexibility in others, so that participants can continue to collaborate despite their differences. For example, the starting point for Cybercrime Atlas information is that it is open-source and shareable. Information only becomes sensitive as assessments of criminal activity are built around it. Because the underlying information is not sensitive, the Cybercrime Atlas was able to start research while relying on already- accepted standards for information classification, such as the TLP. This allowed the Cybercrime Atlas community to build rules around the needs and activities of the community as it developed. A strong emphasis was put on information security from the outset, but the reliance on OSINT allowed the community to avoid time-consuming deliberations over the legality of sharing information generated by the collaboration between participants. This allowed for speedy set-up and the development of standard operating procedures by the Cybercrime Atlas expert community itself.BOX 3 Governing the Cybercrime Atlas collaboration: balancing formal and informal structures Cybercrime Atlas Impact Report 2025 16
Ask AI what this page says about a topic: