{"id":861174,"date":"2025-07-09T07:11:53","date_gmt":"2025-07-09T12:11:53","guid":{"rendered":"https:\/\/newsycanuse.com\/index.php\/2025\/07\/09\/battling-next-gen-financial-fraud\/"},"modified":"2025-07-09T07:11:53","modified_gmt":"2025-07-09T12:11:53","slug":"battling-next-gen-financial-fraud","status":"publish","type":"post","link":"https:\/\/newsycanuse.com\/index.php\/2025\/07\/09\/battling-next-gen-financial-fraud\/","title":{"rendered":"Battling next-gen financial fraud\u00a0"},"content":{"rendered":"<div>\n<p>From a cluster of call centers in Canada, a criminal network defrauded elderly victims in the US out of $21 million in total between 2021 and 2024. The fraudsters <strong><a href=\"https:\/\/www.forbes.com\/sites\/steveweisman\/2025\/03\/14\/25-canadians-charged-in-multimillion-dollar-grandparent-scam\/\" target=\"_blank\">used voice over internet protocol technology<\/a> <\/strong>to\u00a0dupe victims into believing the calls came from their grandchildren in the US, customizing conversations using banks of personal data, including ages, addresses, and the estimated incomes of their victims.\u00a0<\/p>\n<p>The proliferation of large language models (LLMs) <strong><a href=\"https:\/\/cltc.berkeley.edu\/2025\/01\/16\/beyond-phishing-exploring-the-rise-of-ai-enabled-cybercrime\/\" target=\"_blank\">has also made it possible to clone a voice<\/a> <\/strong>with nothing more than an hour of YouTube footage and an $11 subscription. And fraudsters are using such tools to create increasingly more sophisticated attacks to deceive victims with alarming success. But phone scams are just one way that bad actors are weaponizing technology to refine and scale attacks.\u00a0<\/p>\n<\/p><\/div>\n<div>\n<figure><a href=\"https:\/\/plaid.com\/ai-fraud-detection-mit\/?utm_source=MIT&#038;utm_medium=PaidNewsletter&#038;utm_campaign=MIT_Technology_Fraud_Report_2025&#038;utm_content=Fraud_Report \" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" height=\"2000\" width=\"1555\" src=\"https:\/\/wp.technologyreview.com\/wp-content\/uploads\/2025\/06\/MITTR_Plaid2025_V10_Cover61625.png?w=1555\" alt><\/a><\/figure>\n<p>Synthetic identity fraud now costs banks $6 billion a year, <strong><a href=\"https:\/\/kpmg.com\/us\/en\/articles\/2022\/synthetic-identity-fraud.html\" target=\"_blank\">making it the fastest-growing financial crime in the US<\/a> <\/strong>Criminals are able to exploit personal data breaches to fabricate \u201cFrankenstein IDs.\u201d Cheap credential-stuffing software can be used to test thousands of stolen credentials across multiple platforms in a matter of minutes. And text-to-speech tools powered by AI can bypass voice authentication systems with ease.\u00a0<\/p>\n<p>\u201cTechnology is both catalyzing and transformative,\u201d says John Pitts, head of industry relations and digital trust at Plaid. \u201cCatalyzing in that it has accelerated and\u00a0made more intense longstanding types of fraud. And transformative in that it has created windows for new, scaled-up types of fraud.\u201d\u00a0<\/p>\n<figure><a href=\"https:\/\/plaid.com\/ai-fraud-detection-mit\/?utm_source=MIT&#038;utm_medium=PaidNewsletter&#038;utm_campaign=MIT_Technology_Fraud_Report_2025&#038;utm_content=Fraud_Report \" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/wp.technologyreview.com\/wp-content\/uploads\/2025\/06\/MITTR2024_V2_Plaid-Socials4.png\" alt><\/a><\/figure>\n<p>Fraudsters can use AI tools to multiply many times over the number of attack vectors\u2014the entry points or pathways that attackers can use to infiltrate a network or system. In advance-fee scams, for instance, where fraudsters pose as benefactors gifting large sums in exchange for an upfront fee, scammers can use AI to identify victims at a far greater rate and at a much lower\u00a0cost than ever before. They can then use AI tools to carry out tens of thousands, if not millions, of simultaneous digital conversations.\u00a0<\/p>\n<p><a href=\"https:\/\/plaid.com\/ai-fraud-detection-mit\/?utm_source=MIT&#038;utm_medium=PaidNewsletter&#038;utm_campaign=MIT_Technology_Fraud_Report_2025&#038;utm_content=Fraud_Report\" target=\"_blank\">Download the full report.<\/a><\/p>\n<p><em>This content was produced by Insights, the custom content arm of MIT Technology Review. It was not written by MIT Technology Review\u2019s editorial staff.<\/em><\/p>\n<p><em>This content was researched, designed, and written entirely by human writers, editors, analysts, and illustrators. This includes the writing of surveys and collection of data for surveys. AI tools that may have been used were limited to secondary production processes that passed thorough human review.<\/em> <\/p>\n<\/div>\n<p><a href=\"https:\/\/www.technologyreview.com\/2025\/07\/08\/1119039\/battling-next-gen-financial-fraud\/\" class=\"button purchase\" rel=\"nofollow noopener\" target=\"_blank\">Read More<\/a><br \/>\n MIT Technology Review Insights<\/p>\n","protected":false},"excerpt":{"rendered":"<p>From a cluster of call centers in Canada, a criminal network defrauded elderly victims in the US out of $21 million in total between 2021 and 2024. The fraudsters used voice over internet protocol technology to\u00a0dupe victims into believing the calls came from their grandchildren in the US, customizing conversations using banks of personal data<\/p>\n","protected":false},"author":1,"featured_media":861175,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[24566,29477,46],"tags":[],"class_list":{"0":"post-861174","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-battling","8":"category-next-gen","9":"category-technology"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts\/861174","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/comments?post=861174"}],"version-history":[{"count":0,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts\/861174\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/media\/861175"}],"wp:attachment":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/media?parent=861174"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/categories?post=861174"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/tags?post=861174"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}