Cybercrime Atlas Impact Report 2025

Page 20 of 26 · WEF_Cybercrime_Atlas_Impact_Report_2025.pdf

Epieos provides insights into email addresses and phone numbers under suspicion of use by criminal threat actors or their affiliates. It reverses this information into additional insights such as social media accounts, domains, payment platforms used and more.All experts participating in the Cybercrime Atlas, and the organizations they represent, join based on an assessment of their expertise, insights and role in disrupting cybercriminal activity. By bringing these diverse capabilities and skills together, the Cybercrime Atlas community contributes new insights. The impact goes beyond what participants can create by working in isolation. This is demonstrated in Cybercrime-Atlas supported disruptions like the INTERPOL-led Operation Serengeti and 2.0. For example, Fortinet, Trend Micro and Group-IB9 provided individual support to the operations but are also members of the Cybercrime Atlas community and research groups that contributed insights to these operations. Focus on tooling Cybercrime Atlas research and impact have been enhanced through support from specialist tool providers. The Cybercrime Atlas community collaborates with these organizations based on an assessment of mission alignment and quality. Kasm is the Cybercrime Atlas’s secure workspace provider. Without access to Kasm, Cybercrime Atlas researchers could not start work. Kasm’s security has supported onboarding of new experts, allowing them to work swiftly and safely with all needed operational security measures.Maltego is an OSINT platform that supports Cybercrime Atlas researchers in analysing and visualizing connections across diverse data sources. The partnership with Maltego has allowed Atlas researchers to reliably conduct link analysis and draw new insights from their findings. Additionally, with access to Maltego’s Hunchly, Atlas researchers can capture and preserve web data in a structured way to support their investigations. Silent Push provides Cybercrime Atlas researchers with intelligence on malicious technical infrastructure. This supports the identification of criminal IT infrastructure before it is weaponized by cybercriminals. Many of the crimes investigated by the Cybercrime Atlas involve the use of domains as a primary vehicle to lure victims, which is one of several areas in which Silent Push provides Atlas investigators with unique insights.SpyCloud recaptures identity data stolen in phishing attacks, malware infections, and data breaches directly from criminal networks, enabling proactive threat hunting and criminal attribution. Cybercrime Atlas uses these capabilities for reverse engineering on passwords and obtaining insights into breach data, identifying malicious tools used by threat actors and further datapoints related to criminal actors’ additional online accounts.ShadowDragon Horizon is an intelligence platform used by the Cybercrime Atlas for trusted, ethical information collection and analysis. It enables the identification of social media accounts and the mapping of relationships between online entities worldwide – delivering actionable intelligence to drive informed decisions. FIGURE 11 Focus on OSINT tooling Cybercrime Atlas Impact Report 2025 20
Ask AI what this page says about a topic: