FBI: $262 M Lost to Account‑Takeover Fraud Amid Surge in AI‑Powered Phishing and Holiday Scams

Related

10 CISOs to Watch in Washington

Washington remains a center of cybersecurity leadership. Federal agencies,...

10 CISOs to Watch in Memphis

Memphis has a growing cybersecurity scene. The city’s mix...

10 CISOs to Watch in San Antonio

San Antonio has grown into one of the strongest...

10 CISOs to Watch in Houston

Houston is one of the most active cybersecurity hubs...

Share

What happened

The Federal Bureau of Investigation (FBI) has issued a warning that cybercriminals impersonating banks and financial institutions have carried out account‑takeover (ATO) fraud schemes resulting in over US$262 million in losses so far this year. The agency has already logged more than 5,100 complaints linked to these attacks. 

Attackers use social engineering via phishing emails, fake support calls, or bogus websites to trick victims into revealing their login credentials and MFA codes. Once they have access, they log in to legitimate banking or payroll portals, reset passwords, and transfer funds to accounts they control, often rapidly converting funds into cryptocurrency to obscure the trail. 

Who is affected

The fraud campaigns span individuals, businesses, and organizations of all sizes. No sector appears immune: personal banking customers, enterprise payroll or treasury systems, and even health‑savings accounts are at risk.

Given the rise of AI-powered phishing tools and seasonal scams targeting shoppers, such as fake Black Friday or holiday-themed offers, the window for exploitation is especially wide around this time of year.

Why CISOs should care

  • Identity and credentials remain the weak link. Even with strong perimeters and detection tools, attackers can still acquire valid credentials through social engineering or phishing and bypass many defenses.
  • Financial liability and reputational risk. ATO fraud can lead to direct monetary loss, potential regulatory exposure, and damage to customer/employee trust, especially if payroll or corporate accounts are compromised.
  • Scale and sophistication are increasing. Use of AI to craft believable phishing campaigns lowers the barrier for attackers. What once required advanced social‑engineering skills can now be automated at scale, increasing volume and chances of success.

As noted by industry security leaders, many ATO incidents exploit compromised credentials, often because organizations still rely on traditional password‑based authentication even when more secure, passwordless options are available.

3 Practical Actions for CISOs

  1. Accelerate adoption of passwordless and MFA‑backed access controls. Consider moving away from static credentials. Leverage modern authentication mechanisms where possible to reduce reliance on passwords and OTPs.
  2. Implement out-of-band verification for sensitive transactions. For high-value fund transfers, payroll disbursements, or account changes, require secondary confirmation to reduce risk even if credentials have been compromised.
  3. Launch end‑user awareness and phishing‑resilience training now, especially ahead of holiday seasons. Remind employees and customers (if relevant) to: verify sender identities, avoid clicking unexpected links, check URLs carefully, never share MFA codes, and flag suspicious calls or messages. Test resilience with simulated phishing campaigns and monitor account activity for anomalies.