How cybercriminals use AI to steal millions – and what your company needs to do now for its IT security

The latest figures from the FBI are a wake-up call for all business leaders: Over $262 million in losses due to account takeover (ATO) fraud this year alone. The perpetrators? Highly organized cybercriminals who systematically gain access to the bank accounts of companies and individuals – not through brute force, but through perfidious exploitation of trust. The method: social engineering. The goal: unrestricted access to business-critical data and assets.

What sounds like a scenario from a thriller is already a daily reality for companies worldwide – and the threat is growing rapidly. Supported by artificial intelligence and professionally organized infrastructures on the dark web, criminal groups are often several steps ahead of corporate IT departments. Their attacks are not only scalable but also highly personalized – and therefore particularly successful.

For CEOs, CISOs, and CFOs, it is therefore crucial to understand security responsibility not merely as a technical task of IT, but as a fundamental component of strategy, risk management, and corporate responsibility. But what does this mean in practical terms?

In the following, we analyze how current fraud scenarios work, where the biggest security gaps in companies exist today – and, above all, how companies can address these risks preventively and sustainably with the support of ProSec.

Table of Contents

The new level of fraud: ATO attacks 2.0

Account Takeover (ATO) refers to attack methods in which criminals gain access to digital accounts – typically online banking, personnel portals, or accounting software. What used to involve simple password phishing has now become a multi-stage deception operation centered on human error.

Cybercriminals impersonate employees of banks, police, or IT service providers and systematically trick their victims into revealing login credentials, one-time codes, or even security questions. Particularly insidious: even two-factor authentication (e.g., "TAN via app") is now being circumvented through deceptive telephone dialogues – making the human being the endpoint of the most insecure chain.

Furthermore, the use of AI allows attackers to simulate deceptively realistic emails, landing pages, and even complete support chats – with the aim of imitating entirely legitimate user behavior. The classic phishing link is now just one element among many in an orchestrated attack.

From isolated cases to systemic risk

That ATO is no longer an isolated risk is demonstrated by the reality of investigations: Over 5.100 reports filed with the FBI this year alone, resulting in $262 million in losses, and rising. Particularly alarming is the fact that a large proportion of these incidents are specifically targeting companies – often small and medium-sized enterprises with limited internal security budgets.

The fraudulent practices are as varied as they are insidious:

  • Criminals impersonate bank employees on the phone, warn of alleged suspicious transactions, and persuade the victims to reveal logins and TANs.
  • As the attack progresses, a second perpetrator appears who – credibly due to the trust previously established – poses as a police officer and demands access data, for example, for the purpose of "securing evidence".
  • Attackers use social media platforms, especially LinkedIn, Facebook, or XING, to research personal information for security questions related to account resets.
  • Through the misuse of search engine ads (so-called SEO poisoning), deceptively authentic "bank websites" or the online portals of business partners are placed at high Google rankings – every click becomes a trap.


Once compromised, criminals have access to all linked functions: payment processing, order management, personnel databases. Within a very short time, accounts are emptied, customer contacts compromised, or payment instructions manipulated to transfer money to crypto wallets.

In total, this creates a systemic risk far beyond the direct monetary damage: loss of reputation, breaches of trust with customers and a blatant loss of image in the market environment.

Holiday Season = Fraud Season

The current situation is worsening in the run-up to Christmas. Cybersecurity firms Darktrace, Flashpoint, and Forcepoint report that fraud campaigns specifically targeting consumer behavior around Black Friday and the Christmas shopping season are currently particularly active.

  • Over 750 newly registered fraudulent domains with terms like "Black Friday" or "Flash Sale" have been discovered in the last three months alone.
  • Bots and malicious advertisements are used to redirect users to fake shops that steal login data and payment information.
  • Attackers are using AI to generate mass-marketable yet personalized fake emails in the style of established brands like Amazon or Temu.
  • Mobile phishing (“mishing”) is also increasing rapidly: Smartphones are being massively targeted via fake package notifications or QR codes on fake vouchers.


For companies, this means not only an increased risk of employee absences or IT incidents due to compromises – above all, such incidents jeopardize customer trust. Now more than ever, it is crucial that companies develop an adaptive, risk-oriented, and human-centered security strategy.

Why traditional IT security no longer works

What is still considered standard practice in many companies – firewalls, endpoint protection, password policies – only addresses technical and administrative aspects. ATO and social engineering attacks, on the other hand, target the most vulnerable point: the individual employee who, in the stress of everyday work, cannot distinguish which link, call, or token is legitimate or dangerous.

This gap between technology and behavior offers attackers an ideal entry point – and is further widened by hybrid working models, cloud services and distributed access points (also through service providers).

Furthermore, many companies underestimate the fact that internal processes – such as account recovery or password reset – are often inadequately protected against misuse. An attacker who is familiar with the company's fundamental IT processes (e.g., through previous data leaks or insider information) can launch a perfectly compliant attack.

How companies can turn the tables

The good news is that companies are not powerless in the face of this situation. On the contrary, a realignment of their understanding of security presents a great opportunity not only to become more resilient but also to strategically strengthen the trust of customers, partners, and investors.

This includes, in particular, the following areas of action:

  1. Security awareness as a leadership responsibility: Security doesn't begin in IT – it begins at the board level. C-level executives, in particular, must strategically understand and promote security and integrate it into the organization, instead of "delegating" it to IT.
  2. Consolidation of access rights: Cloud computing, hybrid infrastructures, and working from home are leading to a dangerous expansion of access possibilities. An Identity & Access Management system paired with a zero-trust model is now essential, not optional.
  3. Process hardening: Internal processes for restoring account access, password reset, or authorization must be checked for abuse and secured against social engineering.
  4. Strengthening the "human firewall": The best security software is useless if employees don't recognize what constitutes a threat. Awareness training must be conducted regularly, realistically, and ideally using simulations – not just video tutorials.
  5. AI-based monitoring and anomaly detection: Traditional threshold systems are no longer effective. Only AI-supported systems can detect subtle changes in behavior and attacks early on – especially when attackers operate within legitimate usage parameters.

This is how ProSec supports your company in its security strategy.

As one of Germany's leading security consulting firms, ProSec offers exactly the support that companies need today – not as a tool provider, but as a strategic sparring partner for IT security, economic protection and operational resilience.

Our services include:

  • Penetration tests and continuous red teaming simulations to identify real-world attack scenarios early on.
  • Workshops and individual awareness programs for managers and employees
  • Development of a company-specific incident response plan, including training and crisis simulation.
  • Consulting and implementation of modern IAM and Zero Trust models along your business processes
  • Support in hardening critical system processes against social engineering and ATO attacks

Because true security doesn't come from more technology – but from greater clarity, accountability, and a prepared response. That's precisely where ProSec comes in.

Act now – before others do

The threat is real, measurable, and particularly affects those companies that have not established a comprehensive security strategy in recent years. ATO and AI-supported fraud schemes are expressions of a new digital arms race – one that only those who think proactively and act systematically can withstand.

Contact us to jointly analyze where your organization stands today, which processes are at risk – and how you can become resilient.

How do I reliably protect my company from hackers?
With the support of good hackers!
Contact us now

Do you have any questions or additions? bring it on!
Write a comment and we will reply as soon as possible!

Your email address will not be published. Required fields are marked with *.

Newsletter Form

Cybersecurity insider access with exclusive content and early access to security-relevant information

Become a Cyber ​​Security Insider

Get early access and exclusive content!


OTHER CONTRIBUTIONS

Table of Contents

Share your feedback and help us improve our services!

Share your feedback and help us improve our services!

Take 1 minute to give us some feedback. This way we can ensure that our IT security solutions meet your exact needs.