{"id":8199,"date":"2025-10-30T03:49:21","date_gmt":"2025-10-30T03:49:21","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=8199"},"modified":"2025-10-30T03:49:21","modified_gmt":"2025-10-30T03:49:21","slug":"a-brand-new-face-of-company-fraud","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=8199","title":{"rendered":"A brand new face of company fraud"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p class=\"sub-title\">Malicious use of AI is reshaping the fraud panorama, creating main new dangers for companies<\/p>\n<div class=\"article-authors d-flex flex-wrap\">\n<div class=\"article-author d-flex\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/en\/our-experts\/phil-muncaster\/\" title=\"Phil Muncaster\"><picture><source srcset=\"https:\/\/web-assets.esetstatic.com\/tn\/-x45\/wls\/2021\/04\/Phil_Muncaster.jpg\" media=\"(max-width: 768px)\"\/><img decoding=\"async\" class=\"author-image me-3\" src=\"https:\/\/web-assets.esetstatic.com\/tn\/-x45\/wls\/2021\/04\/Phil_Muncaster.jpg\" alt=\"Phil Muncaster\"\/><\/picture><\/a><\/div>\n<\/div>\n<p class=\"article-info mb-5\">\n        <span>10 Mar 2025<\/span><br \/>\n        <span class=\"d-none d-lg-inline\">\u00a0\u2022\u00a0<\/span><br \/>\n        <span class=\"d-inline d-lg-none\">, <\/span><br \/>\n        <span>4 min. learn<\/span>\n    <\/p>\n<div class=\"hero-image-container\">\n        <picture><source srcset=\"https:\/\/web-assets.esetstatic.com\/tn\/-x266\/wls\/2025\/03-25\/ai-fraud-business.jpeg\" media=\"(max-width: 768px)\"\/><source srcset=\"https:\/\/web-assets.esetstatic.com\/tn\/-x425\/wls\/2025\/03-25\/ai-fraud-business.jpeg\" media=\"(max-width: 1120px)\"\/><img decoding=\"async\" class=\"hero-image\" src=\"https:\/\/web-assets.esetstatic.com\/tn\/-x700\/wls\/2025\/03-25\/ai-fraud-business.jpeg\" alt=\"AI-driven deception: A new face of corporate fraud\"\/><\/picture>    <\/div>\n<\/div>\n<div>\n<p>Synthetic intelligence (AI) is doing fantastic issues for a lot of companies. It\u2019s serving to to automate repetitive duties for effectivity and price financial savings. It\u2019s supercharging customer support and coding. And it\u2019s serving to to unearth perception to drive improved enterprise decision-making. Method again in October 2023, <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2023-10-03-gartner-poll-finds-55-percent-of-organizations-are-in-piloting-or-production-mode-with-generative-ai\" target=\"_blank\" rel=\"noopener\">Gartner estimated<\/a> that 55% of organizations had been in pilot or manufacturing mode with generative AI (GenAI). That determine will certainly be larger right this moment. <\/p>\n<p>But legal enterprises are additionally innovating with the expertise, and that spells unhealthy information for IT and enterprise leaders all over the place. To deal with this mounting fraud menace, you want a layered response that focuses on individuals, course of and expertise.<\/p>\n<h2>What are the newest AI and deepfake threats?<\/h2>\n<p>Cybercriminals are harnessing the ability of AI and deepfakes in a number of methods. They embody:<\/p>\n<ul>\n<li><strong>Faux workers: <\/strong>A whole bunch of corporations have <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.forbes.com\/councils\/forbesbusinesscouncil\/2024\/11\/13\/how-fake-it-worker-scams-exploit-remote-hiring-practices\/\" target=\"_blank\" rel=\"noopener\">reportedly<\/a> been infiltrated by North Koreans posing as distant working IT freelancers. They use AI instruments to compile pretend resumes and cast paperwork, together with AI-manipulated pictures, with a purpose to move background checks. The tip aim is to earn cash to ship again to the North Korean regime in addition to knowledge theft, espionage and even ransomware.<\/li>\n<li><strong>A brand new breed of BEC scams: <\/strong>Deepfake audio and video clips are getting used to amplify enterprise e-mail compromise (BEC)-type fraud the place finance employees are tricked into transferring company funds to accounts underneath management of the scammer. In a single current notorious case, a finance employee was persuaded to <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/edition.cnn.com\/2024\/02\/04\/asia\/deepfake-cfo-scam-hong-kong-intl-hnk\/index.html\" target=\"_blank\" rel=\"noopener\">switch $25 million to fraudsters<\/a> who leveraged deepfakes to pose as the corporate\u2019s CFO and different members of workers in a video convention name. That is certainly not new, nevertheless \u2013 way back to 2019, a UK power govt was <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.cityam.com\/uk-energy-boss-conned-out-of-200000-in-deep-fake-fraud\/\">tricked into wiring<\/a> \u00a3200,000 to scammers after chatting with a deepfake model of his boss on the telephone.<\/li>\n<li><strong>Authentication bypass:<\/strong> Deepfakes are additionally getting used to assist fraudsters impersonate professional prospects, create new personas and bypass authentication checks for account creation and log-ins. One significantly refined piece of malware, <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/web-assets.esetstatic.com\/wls\/en\/papers\/threat-reports\/eset-threat-report-h12024.pdf#page=7\">GoldPickaxe,<\/a> is designed to reap facial recognition knowledge, which is then used to create deepfake movies. In response to <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.transunion.com\/content\/dam\/transunion\/us\/business\/collateral\/report\/GFS-23-F158127-TruVa-2024StateofOmnichannelFraudReport-RPR-US_EN-US.pdf\">one report<\/a>, 13.5% of all international digital account openings had been suspected of fraudulent exercise final 12 months.<\/li>\n<li><strong>Deepfake scams:<\/strong> Cybercriminals may also use deepfakes in much less focused methods, reminiscent of impersonating firm CEOs and different <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/2020\/07\/16\/high-profile-twitter-accounts-hacked-bitcoin-scam\/\" target=\"_blank\" rel=\"noopener\">high-profile figures on social media<\/a>, to additional funding and different scams. As ESET\u2019s <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/en\/cybersecurity\/eset-world-2024-big-prevention-bigger-ai\/\" target=\"_blank\" rel=\"noopener\">Jake Moore has demonstrated<\/a>, theoretically any company chief may very well be victimized in the identical manner. On an identical notice, as <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/web-assets.esetstatic.com\/wls\/en\/papers\/threat-reports\/eset-threat-report-h22024.pdf#page=17\" target=\"_blank\" rel=\"noopener\">ESET\u2019s newest Risk Report describes<\/a>, cybercriminals are leveraging deepfakes and company-branded social media posts to lure victims as a part of a brand new kind of funding fraud known as Nomani.<\/li>\n<li><strong>Password cracking:<\/strong> AI algorithms may be set to work cracking the passwords of shoppers and workers, enabling knowledge theft, ransomware and mass id fraud. One such instance, <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/mpost.io\/passgan-the-new-ai-can-crack-passwords-in-less-than-half-a-minute\/\">PassGAN<\/a>, can reportedly crack passwords in lower than half a minute. \u00a0<\/li>\n<li><strong>Doc forgeries:<\/strong> AI-generated or altered paperwork are one other option to bypass know your buyer (KYC) checks at banks and different corporations. They may also be used for insurance coverage fraud. Practically all (94%) <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.insurtechinsights.com\/uk-insurance-fraud-surges-as-ai-tools-aid-in-falsifying-claims\/\">claims handlers suspect<\/a> at the very least 5% of claims are being manipulated with AI, particularly decrease worth claims.<\/li>\n<li><strong>Phishing and reconnaissance:<\/strong> The UK\u2019s Nationwide Cyber Safety Centre (NCSC) <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.ncsc.gov.uk\/report\/impact-of-ai-on-cyber-threat\">has warned<\/a> of the uplift cybercriminals are getting from generative and different AI sorts. It claimed in early 2024 that the expertise will \u201cnearly definitely enhance the quantity and heighten the impression of cyber-attacks over the subsequent two years.\u201d It can have a very excessive impression on bettering the effectiveness of social engineering and reconnaissance of targets. This can gas ransomware and knowledge theft, in addition to wide-ranging phishing assaults on prospects.<\/li>\n<\/ul>\n<p><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.esetworld.com\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/web-assets.esetstatic.com\/wls\/2025\/02-25\/eset-world-2025.png\" alt=\"\" width=\"\" height=\"\"\/><\/a><\/p>\n<h2>What\u2019s the impression of AI threats?<\/h2>\n<p>The impression of AI-enabled fraud is finally monetary and reputational injury of various levels. One report <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/5310879.fs1.hubspotusercontent-na1.net\/hubfs\/5310879\/The-Battle-Against-AI-driven-Identity-Fraud-2024-Signicat.pdf\">estimates<\/a> that 38% of income misplaced to fraud over the previous 12 months was because of AI-driven fraud. Contemplate how:<\/p>\n<ul>\n<li>KYC bypass permits fraudsters to run up credit score and drain professional buyer accounts of funds.<\/li>\n<li>Faux workers may steal delicate IP and controlled buyer data, creating monetary, reputational and compliance complications.<\/li>\n<li><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/2022\/04\/26\/trouble-bec-how-stop-costliest-scam\/\" target=\"_blank\" rel=\"noopener\">BEC scams<\/a> can generate large one-off losses. The <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.ic3.gov\/AnnualReport\/Reports\/2023_IC3Report.pdf\" target=\"_blank\" rel=\"noopener\">class earned<\/a> cybercriminals over $2.9 billion in 2023 alone.<\/li>\n<li><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/en\/scams\/many-faces-impersonation-fraud-spot-imposter-too-late\/\" target=\"_blank\" rel=\"noopener\">Impersonation scams<\/a> threaten buyer loyalty. A <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.pwc.com\/us\/en\/services\/consulting\/library\/consumer-intelligence-series\/future-of-customer-experience.html\" target=\"_blank\" rel=\"noopener\">third of shoppers say<\/a> they\u2019ll stroll away from a model they love after only one unhealthy expertise.<\/li>\n<\/ul>\n<h2>Pushing again towards AI-enabled fraud<\/h2>\n<p>Preventing this surge in AI-enabled fraud requires a multi-layered response, specializing in individuals, course of and expertise. This could embody:<\/p>\n<ul>\n<li>Frequent fraud danger assessments<\/li>\n<li>An updating of anti-fraud insurance policies to make them AI-relevant<\/li>\n<li>Complete coaching and consciousness packages for workers (e.g., in <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/2022\/06\/21\/phishing-awareness-training-help-employees-avoid-hook\/\" target=\"_blank\" rel=\"noopener\">how you can spot phishing<\/a> and deepfakes)<\/li>\n<li>Schooling and consciousness packages for patrons<\/li>\n<li>Switching on multifactor authentication (MFA) for all delicate company accounts and prospects<\/li>\n<li>Improved background checks for workers, reminiscent of scanning resumes for profession inconsistencies<\/li>\n<li>Guarantee all workers are interviewed on video earlier than hiring<\/li>\n<li>Enhance collaboration between <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/en\/business-security\/untangling-hiring-dilemma-how-security-solutions-free-up-hr-processes\/\" target=\"_blank\" rel=\"noopener\">HR and cybersecurity groups<\/a><\/li>\n<\/ul>\n<p>AI tech may also be used on this combat, for instance:<\/p>\n<ul>\n<li>AI-powered instruments to detect deepfakes (e.g., in KYC checks).<\/li>\n<li>Machine studying algorithms to detect patterns of suspicious habits in workers and buyer knowledge.<\/li>\n<li>GenAI to generate artificial knowledge, with which new fraud fashions may be developed, examined and educated.<\/li>\n<\/ul>\n<p>Because the battle between malicious and benevolent AI enters an intense new section, organizations should replace their cybersecurity and anti-fraud insurance policies to make sure they hold tempo with the evolving menace panorama. With a lot at stake, failure to take action would possibly impression long-term buyer loyalty, model worth and even derail necessary digital transformation initiatives.<\/p>\n<p>AI has the potential to alter the sport for our adversaries. However it might probably additionally accomplish that for company safety and danger groups.<\/p>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>Malicious use of AI is reshaping the fraud panorama, creating main new dangers for companies 10 Mar 2025 \u00a0\u2022\u00a0 , 4 min. learn Synthetic intelligence (AI) is doing fantastic issues for a lot of companies. It\u2019s serving to to automate repetitive duties for effectivity and price financial savings. It\u2019s supercharging customer support and coding. And [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":8201,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[1668,3102,968],"class_list":["post-8199","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-corporate","tag-face","tag-fraud"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/8199","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=8199"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/8199\/revisions"}],"predecessor-version":[{"id":8200,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/8199\/revisions\/8200"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/8201"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=8199"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=8199"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=8199"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-14 08:32:19 UTC -->