Fighting Cyber-Enabled Fraud 2025

Page 14 of 31 · WEF_Fighting_Cyber-Enabled_Fraud_2025.pdf

instruments connected to the account holder (e.g. financial/payment traceability). This practice would leverage trust frameworks long in use such as those within the financial services sector. Where available, governmental digital identity programmes – such as those in Belgium, Estonia and several US states and provided for by upcoming EU initiatives (e.g. the Regulation on Electronic Identification and Trust Services [eIDAS])54 – should be used to strengthen verification processes and reduce fraud risk. Action 2 – Tighten oversight of bulk domain registrations and subdomain services: To reduce the prevalence of malicious bulk domain registrations in phishing and cyber-enabled fraud activities, registrars should restrict high- volume registration activities to established business customers with low-risk profiles. Building on customer due diligence practices, organizational identity should be robustly verified, payment methods attributed and customers should demonstrate positive track records over time. Volume and time-based thresholds for what constitutes “bulk registration” should be established through transparent, multistakeholder policy processes. For any provider that generates subdomains for third parties, the upstream registrar should require minimum abuse-prevention practices including account verification, monitoring high- volume subdomain creation and participation in signal-sharing collaboratives. Preventive measures should focus on detecting malicious subdomains at enrolment or early in their life cycle, while avoiding blunt interventions (such as suspending entire domains) that risk collateral damage to legitimate services. ICANN, ccTLD managers and national governments should explore mechanisms to embed such requirements into registry and registrar obligations, ensuring that they flow downstream to subdomain providers. Action 3 – Explore a short public notice period before new domains go live: Phishing domains are often delegated to the DNS and weaponized within hours of registration, giving defenders very little opportunity to act before abuse begins. One potential safeguard is to require all new domains to be publicly listed upon registration but withheld from delegation for a short, fixed time period (e.g. 24–48 hours). Many legitimate registrants do not place new domains into immediate use, registering them for future needs, so such a delay would not burden most users. It would, however, create a window for pre-activation detection of abusive or deceptive domains. Some registrants may have legitimate needs for immediate delegation, so mechanisms such as a refundable deposit – combined with accurate registrant information and a trusted payment source – could provide a fast-track option while maintaining safeguards. Bad actors could attempt to use the fast-track option, but the added cost and administrative burden might not align with their business model. Other registrants might not wish to have their domain publicly listed before delegation for intellectual property-related, competitiveness or privacy reasons. In those cases, conditional exceptions as mentioned above should be introduced. Cybercrime is a global challenge that exploits legitimate infrastructure and undermines trust in our interconnected systems. Through the work of the Partnership against Cybercrime, and tools like NetBeacon Reporter, we can collaborate widely across industries, including cybersecurity specialists, governments, law enforcement and individuals, to scale the disruption of threats like phishing and malware, making the internet safer for all. Graeme Bunton, Executive Director, NetBeacon Fighting Cyber-Enabled Fraud: A Systemic Defence Approach 14
Ask AI what this page says about a topic: