Fighting Cyber-Enabled Fraud 2025

Page 16 of 31 · WEF_Fighting_Cyber-Enabled_Fraud_2025.pdf

National models for cyber defence BOX 5 Australia implements a whole-of-nation strategy emphasizing shared responsibility, which has been embodied by the creation of a multidisciplinary National Anti- Scam Centre bringing together competences from across the various government agencies dealing with fraud and scams. Its Scams Prevention Framework, which is due to come into force in 2026, imposes enforceable requirements on telecom, financial and platform providers, with penalties for non-compliance. Canada’s Centre for Cyber Security (CSE) and the Canadian Internet Registration Authority partnered to launch Canadian Shield in April 2020: a free DNS-firewall service that blocks access to malicious domains flagged for phishing, malware or scam activities. By routing users through trusted DNS resolvers, it prevents fraud efforts before they reach the end device. Over the past 12 months, Canadian Shield was used by 2.81 million users, who benefited from around 800 million DNS blocks, resulting in a reduction of visits to malware, phishing and botnet sites. India’s CERT-In, through an AI and situational awareness system, analysed more than 9,800 billion DNS queries in the course of 2024, detecting 2.2 billion queries linked to malicious domains, of which 128 million were phishing-related. A total of 3,044 phishing sites were mitigated, affecting nearly 695,000 users. CERT-In also regularly shares DNS-based threat intelligence with global partners to strengthen international cooperation and secure the digital ecosystem. Singapore adopts a whole-of-nation strategy to counter malicious online activity. The Singapore Police Force (SPF) collaborates with other government agencies, such as the Cyber Security Agency of Singapore (CSA) and the Infocomm Media Development Authority (IMDA), and the private sector to disrupt scam enablers (such as fraudulent communication and marketing channels). International collaboration is also a key pillar in enabling the SPF to take down transnational scam syndicates. These efforts are underpinned by public education campaigns aimed at cultivating digital scepticism to develop a more scam-savvy populace. Switzerland strengthens domain-level defences through proactive disruption. The 2015 Ordinance on Internet Domains (OID) empowers the national domain registry and cybercrime-recognized organizations to act swiftly against online abuse. When domains under “.ch” or “.swiss” are suspected of hosting phishing, malware distribution or botnet activity, they can be blocked or sinkholed for up to 30 days, disrupting malicious infrastructure and reducing potential harm. The United Kingdom has developed the Online Safety Act, which requires social media platforms and search engines to protect their users from fraudulent content and, for larger organizations, from fraudulent advertising. This is part of a broader national effort supported by strong public–private partnerships through an Online Fraud Charter signed by some of the biggest global tech companies and a recently updated Telecommunications Charter. Underpinning this national response, the Fraud Strategy establishes a coordinated framework built on new legislation, improved enforcement mechanisms, increased industry cooperation and public– private data-sharing to proactively identify and prevent fraud. A number of governments have implemented notable approaches to counter phishing and cyber-enabled fraud, illustrating different pathways for capacity-building, regulation and citizen engagement. While the models below have been established chiefly to deal with cybersecurity – with fraud and scams only sometimes featuring as an element of the model – some governments have gone further by establishing a dedicated coordinating body set up to focus efforts and expertise on fraud and scams. A call to accelerate user protections by default Embedding protective tools as defaults creates a more resilient ecosystem, ensuring that security reaches citizens directly and equitably. Targeted interventions can substantially reduce phishing success by hardening the interfaces where users make trust decisions: web browsers, messaging apps, voice calls and authentication methods. Each addresses a distinct attack vector while reinforcing broader protective infrastructure. Action 4 – Bring transparency to website trust and block known threats by default: Users struggle to distinguish legitimate websites from fraudulent sites because a browser’s lock icon signals an encrypted connection but not who is at the other end of it. Belgium’s Safeonweb browser extension demonstrates a user-facing solution: colour-coded trust signals based on the website owner’s level of verification and threat intelligence (see Box 6). Extended validation certificates attempted similar goals but failed after browsers removed prominent indicators around 2019.57 Given skyrocketing phishing and fraud levels, users need clear trust signals more than ever. A modernized approach requires standardized, prominent browser indicators distinguishing verified organizations from anonymous sites, leveraging governmental digital identity frameworks such as eIDAS where available alongside industry-led alternatives. Complementing browser-level signals, Fighting Cyber-Enabled Fraud: A Systemic Defence Approach 16
Ask AI what this page says about a topic: