Fighting Cyber-Enabled Fraud 2025

Page 18 of 31 · WEF_Fighting_Cyber-Enabled_Fraud_2025.pdf

When prevention and protection measures fail and digital infrastructure is abused, rapid detection and coordinated response become critical. Effective defence requires coordination among hundreds of organizations generating threat intelligence and hundreds more positioned to act – from security vendors and financial institutions to domain registrars and hosting providers. Yet no single organization can maintain bilateral relationships at the required speed and scale, creating a many-to- many coordination problem. Diverse networks have emerged to address this challenge. Industry-specific platforms such as the Financial Services Information Sharing and Analysis Center (FS-ISAC) and NetBeacon Reporter63 for domain names standardize abuse reporting within sectors. Law enforcement networks including Europol’s SIENA64 and INTERPOL’s cybercrime platforms65 facilitate intelligence exchange across jurisdictions. Cross-sector collaborations such as the APWG’s eCrime Exchange66 and the Global Signal Exchange enable real-time sharing of threat signals by technology and cybersecurity providers. Throughout the mobile communications industry, the GSM Association (GSMA)-run Telecommunication ISAC and High-Risk Number platform provide real-time means of exchanging fraud information.67 Government programmes – from citizen reporting to public–private frameworks – extend intelligence and enforcement capacity. These platforms demonstrate how signal sharing multiplies force against coordinated criminal operations. However, the ecosystem remains fragmented across organizational and jurisdictional boundaries. Government initiatives typically operate nationally; ISACs serve specific sectors; cross-sector collaboratives reach only participating members. Intelligence stays siloed due to interoperability gaps at multiple levels: inconsistent technical formats, divergent taxonomies and ontologies, variable trust between platforms and incompatible legal agreements. While standards such as Structured Threat Information Expression (STIX), Trusted Automated Exchange of Intelligence Information (TAXII) and Malware Information-Sharing Platform (MISP) enable technical exchange, semantic and governance barriers persist. Without more interoperable frameworks and clearing-house mechanisms that span technical, semantic and trust layers, critical intelligence falls through the gaps – slowing responses, limiting systemic impact and preventing those best positioned to act from receiving actionable signals.A call to scale and modernize signal sharing and abuse response Addressing these coordination and interoperability challenges requires action in three dimensions: establishing shared standards and expectations for abuse reporting and intelligence exchange; building trust frameworks that enable responsible and active participation; and deploying advanced detection capabilities that match the scale of modern threats. Action 7 – Establish signal sharing as a core industry standard: Signal sharing must become an established expectation and interoperable industry standard – underpinned by clear legal and governance frameworks that enable the responsible exchange of actionable intelligence across sectors and jurisdictions. Affected intermediaries, such as online platforms and financial institutions, should be legally authorized and incentivized to cooperate against scams and fraud based on well-governed indicators of suspicious activity. This includes the ability to share relevant information – such as account or infrastructure data – with government agencies and trusted partners for the narrow, legitimate purpose of detecting and preventing fraud. As part of this effort, “trusted reporter” programmes can enhance the efficiency and reliability of abuse reporting. Under these programmes, organizations grant priority handling to reporters who consistently demonstrate accuracy and credibility, often through low false-positive rates and established one-to-one relationships. Such mechanisms illustrate how signal sharing can evolve from isolated exchanges into structured, high-trust partnerships that accelerate collective prevention and mitigation efforts. Policy-makers should ensure that national and international legal frameworks explicitly permit privacy-preserving signal sharing between the public and private sectors, recognizing fraud prevention at scale as a matter of public interest. Clear safeguards and oversight mechanisms must protect the rights of individuals while enabling faster collective action against organized criminal networks. Establishing this shared foundation would transform fragmented initiatives into a cohesive, systemic defence capable of matching the scale and sophistication of modern online fraud.2.3 Mitigation Fighting Cyber-Enabled Fraud: A Systemic Defence Approach 18
Ask AI what this page says about a topic: