Fighting Cyber-Enabled Fraud 2025

Page 13 of 31 · WEF_Fighting_Cyber-Enabled_Fraud_2025.pdf

Beyond the names and numbers layer, multiple infrastructure domains offer structural opportunities for upstream prevention. Telecommunications infrastructure – including mobile networks, SMS routing systems and voice services – can implement authentication and verification measures that raise the barriers to abuse. These require a close support and alignment of national authorities to enforce the homogeneous application of such measures across the ecosystem. Cloud and hosting services – including reverse proxies, content delivery networks and managed hosting – have the capability to embed abuse detection and verification mechanisms into their service offerings. Payment systems and financial intermediaries can apply risk-based controls that disrupt fraud monetization pathways, while identity and authentication services can strengthen verification processes that make impersonation more difficult. Each of these layers represents an opportunity for service providers, platforms and intermediaries to implement upstream safeguards that structurally reduce the operational capacity available to bad actors, often while improving service quality and trust for legitimate users. While the results will no doubt vary across digital infrastructure services and individual providers, the evidence points to meaningful opportunity: preventive controls reduce criminals’ ability to acquire and operationalize digital infrastructure to further their schemes. A call for industry stakeholders to strengthen preventive controls Preventive actions must focus on structurally reducing bad actors’ ability to acquire, build or operationalize upstream digital infrastructure. Rather than relying solely on reactive takedowns or end-user vigilance, prevention seeks to embed systemic safeguards at the foundational layers of the internet – where abuse begins. By reinforcing integrity and accountability in domain registration, hosting, telecommunications and identity provisioning, prevention measures can shrink the surface area available for cyber-enabled crime and protect citizens long before harm occurs. Action 1 – Strengthen risk-based customer due diligence practices in digital infrastructure services: Based on the above, upstream digital infrastructure service providers should be required to implement risk-based customer due diligence practices.51 For standard and lower-risk services, validation should at the very least include syntactical error checking and verification that key attributes (e.g. name, organization, contact information, country) are consistent, complete and demonstrably linked to a real, reachable entity.52 Such a practice would be consistent with requirements outlined in the EU’s Network and Information Systems Directive 2 (NIS2).53 For higher-risk services – such as bulk domain registration and bulk messaging services – providers should require the use of traceable The Global Cyber Alliance takes a systemic approach to fostering collective action among internet infrastructure operators. Building on the global success of MANRS for routing security, our data-driven and community-based model powers initiatives like Domain Trust and AIDE – uniting registries, registrars, hosting providers and network operators to tackle abuse and measure real-world impact. Leslie Daigle, Chief Technical Officer and Internet Integrity Program Director, Global Cyber Alliance Fighting Cyber-Enabled Fraud: A Systemic Defence Approach 13
Ask AI what this page says about a topic: