Fighting Cyber-Enabled Fraud 2025
Page 12 of 31 · WEF_Fighting_Cyber-Enabled_Fraud_2025.pdf
The internet’s decentralized, multistakeholder
governance model – a deliberate design choice – has
fostered resilience, innovation and global participation
for decades. This distributed architecture enables
open access, flexibility and a diversity of voices
shaping how the internet evolves.
At the “names and numbers” layer, where the
fundamental addressing and routing functions
of the internet reside, governance is distributed
among multiple entities. The Internet Corporation
for Assigned Names and Numbers (ICANN) coordinates global policy for generic top-level
domains (gTLDs) such as “.com” or “.org” through
a multistakeholder process, while country-code
top-level domain (ccTLD) operators manage
their namespaces such as “.uk” or “.in” under
varied governance models – from independent
multistakeholder foundations to direct governmental
or commercial oversight. This distributed
governance model correlates to a divergent
cybercrime landscape. On average, the abuse rates
for ccTLDs are statistically significantly lower than
for gTLDs.412.1 Prevention
ICANN’s role in ensuring a stable, secure and unified global internet BOX 4
ICANN has progressively strengthened
requirements in its contracts with generic top-
level domain (gTLD) registry operators and
registrars. These obligations, set forth in the
Registrar Accreditation Agreement (RAA), the
Registry Agreements (RAs) and the ICANN policies
incorporated into them, include a wide range of
requirements designed to preserve the security,
stability and resilience of the DNS.
Since 2013, the RAA has required registrars
to maintain public abuse contacts, publish
a description of their abuse procedures and
reasonably investigate and respond to reports of
DNS abuse. The RAs have required registries to
publish abuse contact information and perform
technical analyses to determine whether their
sponsored domain names are being used to
perpetrate DNS abuse. Additional requirements
such as those related to the accuracy and
accessibility of registration data and taking action
to remove orphan glue records42 associated
with malicious activity are also present in the
agreements enforced by ICANN.
In 2024, amendments introduced further
enhancements: they defined DNS abuse for the purposes of the RA and RAA, required
simple abuse reporting channels with timely
acknowledgement and obligated providers to
take mitigation actions promptly once presented
with credible evidence.43,44 ICANN’s Contractual
Compliance function monitors and vigorously
enforces these contractual requirements.
As part of its wider DNS Abuse Mitigation
Program, ICANN also provides capacity
development and training to community members
engaged in combating DNS abuse. New
transparency tools, such as the Domain Metrica
platform, provide public visibility into abuse
patterns across the DNS, while the Inferential
Analysis of Maliciously Registered Domains
(INFERMAL) project aimed to better understand
attackers’ preferences regarding DNS abuse.45,46
Looking ahead, ICANN and its stakeholders are
discussing additional preventive measures. Ideas
under consideration include requiring registrars
to review associated domains once abuse is
confirmed in one of them and adding safeguards
to introduce friction to the registration process
prior to domain activation, particularly for bulk
domain purchases by new customers.47,48
This decentralized ecosystem of responsibility ensures
stability and resilience; however, malicious actors
exploit gaps among jurisdictions, governance models
and enforcement capacities – rapidly registering
domains, spinning up infrastructure and using trusted
intermediaries to operationalize fraud and scams at
scale. Abuse reporting and timely response actions
are essential to curb in-progress harms, but reactive
measures alone still leave ample opportunity for malicious actors to cause damage, making the case
for due attention to preventive measures. Some within
the industry refer to these as “anti-fraud” measures.49
For example, ICANN research found that “stringent
registrar restrictions” are associated with a 63%
decrease in the number of maliciously registered
domains, and validation of registrant information
during account creation or before domain purchase is
associated with a 70% drop.50
Fighting Cyber-Enabled Fraud: A Systemic Defence Approach
12
Ask AI what this page says about a topic: