Fighting Cyber-Enabled Fraud 2025
Page 9 of 31 · WEF_Fighting_Cyber-Enabled_Fraud_2025.pdf
Phishing campaigns depend on a set of legitimate
infrastructure services that have been repurposed
for abuse. As discussed in more detail below, these
include domain names (influenced by automation
and low pricing), subdomains, reverse proxy
services and delivery mechanisms.
Malicious domain registration remains a
persistent, large-scale problem: In 2024, cyber
criminals used more than 8.6 million unique
domain names in cyberattacks – an 81% increase
over the previous year.16 The NetBeacon Institute
recently observed “the largest month-on-month
increase in unique domain names associated with
phishing (63%). Most (87%) of this phishing was
classified as ‘maliciously registered’. The bulk of
this malicious phishing was concentrated among
a few registrars […].”17 An Internet Corporation for
Assigned Names and Numbers (ICANN)-funded
study similarly found that a mere 20 registrars, out
of the more than 3,000 accredited, accounted for
nearly 84% of maliciously registered domains found
within a sample set.18 ICANN further observed
that “discounted pricing and bulk registration
opportunities were strongly associated with
abuse”.19 While it did not define a fixed numerical
or time-based threshold for “bulk” registration, the
study examined bulk-related features such as bulk
discounts, free bulk search and prerequisite-free
application programming interface (API) access as
associated indicators.
Services are a growing enabler of phishing:
Subdomains (e.g. mail.example.com) – commonly
offered through hosting providers, website builders
and software-as-a-service (SaaS) platforms – are
increasingly being exploited for phishing. Between
roughly one-quarter (24%)20 and one-third
(36.27%)21 of phishing attacks in recent years made
use of subdomains, more than doubling between
2021 and 2024.22 Additionally, Interisle’s most
recent phishing landscape report observed that
“89% of the subdomain-provider attacks occurred
on domains operated by just ten providers, which
shows how the choices made by a few companies
can affect the phishing landscape”.23 Any measures
taken to prevent abuse are voluntary, unless
required under the upstream registrar’s own terms
of service or mandated by local regulations. When
subdomain providers fail to act, registrars may be
pressed to suspend the parent domain – but such
steps carry the risk of extensive collateral damage,
disabling hundreds or thousands of legitimate
services at once.24 Automation in domain registration and
configuration fuels the speed and scale of
abuse: Bad actors leverage automation to create
multiple accounts and register domains at speed
and scale. The availability of unrestricted APIs
enables large-scale, automated domain creation
and configuration, which attackers use to rapidly
deploy phishing infrastructure.25 ICANN found that
registrars permitting API access saw a fourfold
increase in malicious activity,26 and according to
the NetBeacon Institute, introducing friction to slow
abuse at scale, such as requiring new registrants to
pass a basic trust threshold at the registrar before
gaining access to programmatic registration tools,
could be part of the solution.27
Domain hijacking through account takeover
drives online fraud: Domain hijacking through
account takeover is a major driver of online fraud,
as attackers gain unauthorized access to domain
registrant accounts – often using stolen or reused
credentials – to seize control of valuable domains.28
Once hijacked, these domains can be exploited for
malicious purposes such as phishing campaigns,
spreading malware, impersonating legitimate
brands or redirecting users to fraudulent websites.
Strengthening authentication, monitoring suspicious
activity and enforcing strict access controls are key
to preventing such fraudulent takeover.
Reverse proxy services can shield and legitimize
phishing infrastructure: Reverse proxy services
serve legitimate purposes – improving performance,
providing protections against distributed denial
of service (DDoS) attacks and enhancing security
for websites worldwide. However, they also offer
concealment advantages that criminals have been
observed exploiting.29,30,31 By terminating encrypted
TLS sessions at the proxy endpoint, they mask the
true hosting origin of malicious websites, re-encrypt
traffic and present only the proxy’s reputable
infrastructure to victims and investigators. This
provides anonymity, free TLS certificates (which
enables the trusted padlock icon to appear in the
user’s browser), high performance and resilience –
key enablers for phishing. Many providers bundle
reverse proxy, content delivery network (CDN) and
security services, but it is the proxy function that
most directly facilitates abuse.1.1 Criminals exploit digital infrastructure
services at scale
Fighting Cyber-Enabled Fraud: A Systemic Defence Approach
9
Ask AI what this page says about a topic: