Fighting Cyber-Enabled Fraud 2025

Page 10 of 31 · WEF_Fighting_Cyber-Enabled_Fraud_2025.pdf

Funnull: A criminal proxy service BOX 3 In 2025, the United States Federal Bureau of Investigation (FBI) issued a cybersecurity advisory on Funnull, a criminally operated infrastructure service supporting large-scale cryptocurrency fraud and phishing campaigns.32 At the same time, the US Treasury’s Office of Foreign Assets Control (OFAC) announced sanctions on Funnull and its administrator for enabling hundreds of thousands of fraudulent sites involved in virtual currency investment scams by purchasing internet protocol (IP) addresses and registering hundreds of thousands of domains in bulk from major cloud service companies worldwide and selling them to cybercriminals to host scam platforms and other malicious web content.33,34 The case illustrates how illicit infrastructure can be purpose-built for abuse, mirroring the techniques available through legitimate services but dedicated entirely to criminal activity. Funnull’s takedown highlights the importance of targeting malicious infrastructure providers while also strengthening cooperation with legitimate intermediaries to prevent abuse. Text messaging and voice calls are a prominent and growing phishing vector: While email remains the primary phishing delivery mechanism, text messaging (smishing) and voice calls (vishing) have emerged as prominent and rapidly growing attack vectors. Fraudsters exploit SIM farms – devices that emulate large banks of cell phones – and “Cash for SMS” apps that rent unused messages to bypass legitimate channels and send scam messages at scale. The volume is immense: UK operators have blocked more than 1 billion suspected scam texts since 2023, while voice phishing attacks surged by 442% in 2024, driven by AI-powered social engineering.35,36 These attacks have affected 70% of organizations globally.37 Migration to internet- based protocols such as rich communication services (RCS) offers security improvements over traditional SMS, including verified sender identities and encryption in transit. However, implementation gaps have introduced new vulnerabilities. Attackers exploit inconsistent verification systems to spoof verified brands and bypass traditional SMS filters, taking advantage of the convergence of mobile and internet messaging to evade carrier-level controls.38 Regulatory approaches to smishing remain under development, with effective solutions, such as SMS inspection, needing to be reconciled with privacy requirements.39 Fighting Cyber-Enabled Fraud: A Systemic Defence Approach 10Cyber-enabled fraud is one of the most pressing threats facing the digital economy today. At Mastercard, we believe that a systemic defence approach – anchored in collaboration, threat intelligence and proactive controls – is essential to protecting consumers and businesses alike. As we work across the digital ecosystem to strengthen prevention, embed security-by- design and accelerate mitigation, we can raise the collective resilience of the digital infrastructure we all rely on. Johan Gerber, Global Head of Security Solutions, Mastercard
Ask AI what this page says about a topic: