Skip to content
Breach Spot
  • The Breach News
  • Check your exposure
REPORT BREACH
Breach SpotBreach Spot
  • The Breach News
  • Check your exposure
REPORT BREACH
Breach SpotBreach Spot

Fraudsters Continue to Rely on Proven Tactics Despite Advancements in AI

  • adminadmin
  • January 5, 2026
  • data-breaches

Account Takeover Fraud,
Fraud Management & Cybercrime

Reflecting on 2025’s Key Trends in Identity Fraud

Suparna Goswami
(gsuparna)
•
December 30, 2025

Fraudsters Stick to What Works Even in the Age of AI
Image: Shutterstock/ISMG

The landscape of fraud continues to highlight that traditional methods remain effective for cybercriminals. Despite the influx of artificial intelligence-driven threats like deepfakes, scammers are finding success with age-old strategies such as synthetic identities and account takeovers. A focus on emerging technologies in the security realm often leaves basic fraud prevention measures under-prioritized.

See Also: Going Beyond the Copilot Pilot – A CISO’s Perspective

While fraud prevention teams swiftly adopt AI-powered solutions to address evolving threats, criminals continue to exploit familiar tactics. Organizations confronting identity fraud are not oblivious but often divert attention and resources toward more glamorous AI-related risks, neglecting the crucial tasks of strengthening identity verification and monitoring account activity.

Three prominent trends in identity fraud illustrate the expanding crisis as it stood in 2025.

Synthetic Identity Fraud

Synthetic identity fraud has identified auto lenders as prime targets. Rather than engaging in minor schemes, criminals have turned to fake identities to secure substantial auto loans, leading to reported losses of $2.1 billion in this sector alone in 2024, per a TransUnion report. The method typically involves combining legitimate Social Security numbers—usually of individuals who are less likely to monitor their credit—with fictitious personal information. The past five years have seen over 16,000 data breaches providing a wealth of stolen credentials, enhancing access to fraud-as-a-service offerings that facilitate identity creation on various platforms.

Account Takeover Fraud

Account takeover fraud has evolved, with attackers increasingly opting for stealthy methods to assume control over accounts, biding their time before draining funds. In 2025, the sophistication of these scams became evident, as cybercriminals preferred to impersonate users rather than lure them into voluntary transactions. During the first ten months of the year, the FBI reported over 5,100 complaints related to account takeover scams impersonating bank support teams, amounting to a staggering $262 million in losses.

The typical scenario involves a victim receiving a call from someone feigning to be from their bank’s fraud department. The provided reassurance masks ulterior motives, leading victims to relinquish account control. This is not solely a U.S. issue; globally, account takeover fraud cost businesses nearly $13 billion in 2023, reflecting an increase from $11 billion in 2022. Notably, the first half of 2025 saw a 21% surge in reported ATO incidents compared to the previous year.

A study by TransUnion revealed that fraud accounts for approximately 7.7% of annual revenue for global companies, with a substantial portion attributed to account takeovers. A recent Entrust report further illustrated that 82% of fraudulent activities occur during the authentication process, underscoring the gravity of the situation.

New Account Fraud

New account fraud remains a persistent challenge, with malicious actors leveraging the onboarding process to establish illegitimate accounts for illicit gain. Industries that offer upfront incentives are notably susceptible, with crypto platforms experiencing a staggering 67% of their fraud attempts during the account creation phase. Fraudulent documents are the linchpin of this type of fraud, with Entrust indicating that national ID cards constitute nearly half of all fraudulent documents detected globally in 2025, followed closely by driver’s licenses and passports.

The trend towards digital document forgery has intensified, propelled by generative AI technologies that enable fraudsters to produce convincing replicas using open-source models and straightforward prompts. Digital forgeries now represent half of attempts targeting crypto companies, with a notable increase in the pairing of fraudulent documents with biometric spoofing techniques.

Source link

Help Prevent Exploitation, Report Breaches

Help to prevent further data unauthorized access or potential exploitation. Protect others by sharing vital breach information. If you’ve discovered a new data breach

REPORT HERE
Trending now

"Fortinet" AI Android Apple artificial intelligence Artificial Intelligence & Machine Learning AT&T AWS CISA Cisco Cloudflare cloud security compliance CrowdStrike cryptocurrency Cybercrime cybersecurity data breach data breaches data privacy data security encryption ESET Facebook FBI Fraud Management GitHub Google healthcare HIPAA Kaspersky machine learning Malware Mandiant Meta Microsoft Multi-Factor Authentication OpenAI Palo Alto Networks phishing ransomware Salesforce Telegram Trend Micro Windows

Sector alert bulletin

Subscribe to your sector-specific insight newsletter to stay updated on potential data breaches and ongoing cyber-attacks targeting your industry

Stay informed and prepared against emerging security threats.

SUSCRIBE NOW

Related Posts

🔍 Weekly Roundup: iPhone Spyware, Microsoft 0-Day Vulnerability, TokenBreak Breach, AI Data Leaks, and More!

  • April 30, 2026

⚡ Weekly Cybersecurity Update: BadCam Attack, WinRAR Exploits, EDR Threats, NVIDIA Vulnerabilities, Ransomware Incidents & More

Published: Aug 11, 2025

This week has highlighted the rapid pace of cyber threats, urging businesses to remain vigilant. Attackers are uncovering vulnerabilities in widely-used software and utilizing innovative tactics to bypass security measures. Even a single unpatched vulnerability can create pathways for data breaches or unauthorized system access. Time is of the essence—failure to regularly update defenses can result in severe consequences. The imperative is clear: proactive measures are essential to safeguard your business.

Here’s a summary of the most significant cybersecurity developments this week, including recent flaws in WinRAR and NVIDIA Triton, along with essential advanced attack strategies to be aware of. Let’s dive into the details.

⚡ Threat of the Week
Trend Micro Issues Warning on Actively Exploited 0-Day — Trend Micro has provided temporary mitigations to tackle serious security vulnerabilities in on-premise versions of Apex One Management Console, which are reportedly being exploited in the wild. The flaws include CVE-2025-54948 and CVE-2025-54987.

  • April 30, 2026

Cybercrime Groups ShinyHunters and Scattered Spider Unite for Targeted Extortion Campaign Against Businesses

August 12, 2025
Cybercrime / Financial Security

A continuing data extortion initiative targeting Salesforce clients may soon expand its focus to encompass financial services and tech providers, as recent findings suggest collaboration between ShinyHunters and Scattered Spider. “This latest series of attacks attributed to ShinyHunters indicates a significant tactical shift, moving past their prior methods of credential theft and database exploitation,” reports ReliaQuest to The Hacker News. Their new approach incorporates strategies akin to those used by Scattered Spider, including highly-targeted vishing (voice phishing) and social engineering tactics, the use of applications that pose as legitimate tools, and Okta-themed phishing pages to deceive victims into revealing credentials during vishing attempts, alongside VPN obfuscation for data exfiltration. ShinyHunters, which first emerged in 2020, is a financially motivated group that has executed numerous data breaches targeting major corporations.

  • April 30, 2026

Charon Ransomware Targets Middle East Industries with Advanced Evasion Techniques

Aug 13, 2025
Endpoint Security / Cybercrime

Cybersecurity researchers have unveiled a new campaign featuring an undocumented ransomware variant named Charon, targeting the public sector and aviation industry in the Middle East. According to Trend Micro, the attackers employed tactics reminiscent of advanced persistent threat (APT) groups, including DLL side-loading and process injection, successfully evading endpoint detection and response (EDR) systems. The use of DLL side-loading parallels techniques associated with the China-linked hacking group Earth Baxia, which has previously targeted government entities in Taiwan and the Asia-Pacific region to deploy a backdoor known as EAGLEDOOR, following the exploitation of a now-patched vulnerability in OSGeo GeoServer GeoTools. “The attack chain utilized a legitimate browser-related file, Edge.exe (originally cookie_exporter.exe), to sideload a…”

  • April 29, 2026

Real-time data breach monitoring by scanning public databases, criminal forums, and online markets to detect exposed credentials and sensitive data.

Industries
  • Enterprise Security Teams
  • Financial Services
  • Retail and E-commerce
  • Legal Services
  • Law Enforcement
Commonly Used For
  • Penetration Testing
  • M&A Risk Research
  • Vulnerability Assessment
  • Red Team Operation
  • Enterprise Security
Contact Us

Need help or have a question?

Email: info@breachspot.com
Phone: +1 (914) 2943243

Copyright © 2026 - Breachspot, Security Breaches Spotted