Fighting Cyber-Enabled Fraud 2025

Page 8 of 31 · WEF_Fighting_Cyber-Enabled_Fraud_2025.pdf

Phishing is often framed as a purely social engineering challenge, but its persistence and evolution are deeply tied to the digital infrastructure services that underpin the internet. Malicious actors exploit domain names, transport layer security (TLS) certificates, web-hosting platforms, reverse proxies and other digital infrastructure services to set up and scale phishing schemes, evade detection and increase their credibility with targets (see Box 2). This infrastructure – designed to support legitimate online activity – can be repurposed by threat actors for malicious purposes. Effective efforts to combat phishing require defenders to work collaboratively across the ecosystem, while implementing trust measures in ways that minimize inconvenience for legitimate users and preserve the internet’s benefits. Phishing-as-a-service: Crime in a box BOX 2 Phishing-as-a-service (PhaaS) – a subset of the broader portfolio of crime-as-a-service (CaaS) offerings – has transformed phishing from a technique requiring technical skill into a commodity. Criminal groups sell ready-made phishing platforms, lowering the barrier of entry for less technically adroit actors and dramatically scaling the reach of attacks. Law enforcement has been actively disrupting PhaaS operations; some recent examples include: Realtime-Phishing: A 2025 joint police operation led to the arrest of a university student in the UK who sold more than 1,000 phishing kits used to target banks and institutions worldwide, causing losses of at least £100 million globally.11 16shop: An International Criminal Police Organization (INTERPOL)-led operation in 2023 shut down this phishing platform, leading to arrests in Indonesia and Japan. 16shop sold phishing kits that enabled attacks against more than 70,000 victims in 43 countries.12 LabHost: A European Union Agency for Law Enforcement Cooperation (Europol)-coordinated action in 2024 involving 19 countries dismantled this platform, arresting 37 suspects.13 With 10,000 users and links to 40,000 phishing domains, LabHost offered subscription-based services such as phishing kits, hosting and LabRat, a tool for stealing credentials and bypassing two-factor authentication.14 Operation First Light 2024: A global police operation spanning 61 countries targeted phishing, fraud and impersonation scams. It resulted in 3,950 arrests, the identification of more than 14,600 suspects and the seizure of $257 million in assets, including cash, cryptocurrency, real estate and luxury goods.15 Phishing, as part of the broader category of online scams, tops the list of cybercrimes INTERPOL’s membership is tackling now, both by volume and economic impact. INTERPOL is actively working with partners worldwide to help law enforcement combat transnational cybercrime more effectively – and calls on all stakeholders to join these efforts. Neal Jetton, Cybercrime Director, INTERPOLPlatform set-up LabHost operated through the Lab-host.ru domain. Customer access LabHost provided online infrastructure and interactive functionality for its subscription-based services.Data collection Victims were deceived into submitting personal information such as date of birth, email address, passwords, home address and credit card details. Website spoofing Customers of LabHost used its services to create and manage more than 40,000 spoofed websites designed to look like legitimate business websites.Credential storage LabHost’s infrastructure stored more than 1 million user credentials and nearly 500,000 compromised credit card records.Financial exploitation Harvested personally identifiable information was used to carry out unauthorized financial transactions. Fighting Cyber-Enabled Fraud: A Systemic Defence Approach 8
Ask AI what this page says about a topic: