Fighting Cyber-Enabled Fraud 2025
Page 5 of 31 · WEF_Fighting_Cyber-Enabled_Fraud_2025.pdf
Introduction
Cyber-enabled fraud continues to increase in
scale and exact a heavy toll on individuals and
organizations around the world. Phishing – including
smishing, vishing and other varieties – while hardly
a novelty, remains at the core of these threats.
Despite significant public- and private-sector
efforts to pursue offenders, while also promoting
security and educating potential victims, phishing
persists as a significant vector for scams, fraud and cyber intrusion. As a result, several policy-
makers (see Box 1) have begun calling for a shift in
the cybersecurity burden of protecting consumers
from scams and fraud, away from those with
fewer resources who face the downstream effects
towards those further upstream who are in the best
position to act at scale. The goal of such shifts is
to enable implementation of systemic solutions that
operate at scale.The growing scale and impact of
cyber-enabled fraud and phishing are
escalating to become one of today’s
most pressing global challenges.
National policy on shifting the burden BOX 1
Cyber risks for members of the public will be minimised by largely removing responsibilities for
the security of digital products and services from small and medium-sized enterprises (SMEs)
and individuals, and placing them with government, manufacturers and service suppliers.
Netherlands Cybersecurity Strategy,1 p. 19
Today, end users bear too great a burden for mitigating cyber risks … The most capable and
best-positioned actors in cyberspace must be better stewards of the digital ecosystem.
US National Cybersecurity Strategy,2 p. 4
This strategy aims to remove as much of the burden of cyber security from citizens as
possible ... and transfer the burden of cyber security risk away from end users and towards
those best placed to manage it.
UK National Cyber Strategy,3 pp.36 and 66
The internet ecosystem is composed of
layers of digital infrastructure services upon
which consumer-facing online services rely, all
underpinned by the payments ecosystem (see
Figure 1). Understanding these layers in terms of
upstream and downstream positioning reveals
distinct opportunities for intervention:
–Upstream digital infrastructure services are
those that supply foundational services upon
which other companies and platforms build.
These services include backbone internet
service providers (backbone ISPs), the
domain name system (DNS), public key
infrastructure (PKI), web hosting and content
delivery networks (CDNs). Because they often
serve other businesses rather than end users
directly, upstream providers may appear more distant from consumer harms; however, their
actions to prevent fraud and abuse can have
ecosystem-wide impact.
–Downstream online consumer services are
those positioned closer to end users, and thus
such providers face more direct user-trust risks
than those upstream. These services include
“access” internet service providers (access
ISPs) and mobile network operators, consumer-
facing platforms and application providers.
Because they interact directly with end users,
harms and abuses are more visible to them,
often incentivizing bundled security services
and robust trust and safety practices. These
interventions have an immediate impact on
served end users.
Fighting Cyber-Enabled Fraud: A Systemic Defence Approach
5
Ask AI what this page says about a topic: