April 18, 2026 Newsletter
AI is accelerating payments fraud through impersonation, deepfakes, and faster rails. Use phishing-resistant identity and controls that block loss.
The shift: fraud moved from “skilled” to “mass-produced”
AI is lowering the cost of believable deception while increasing the speed of execution. The result is more impersonation-based fraud, more account takeover, and more losses that occur before teams can respond.
This is not theoretical. A recent report cites deepfake attempts occurring at a rate of one every five minutes in 2024 and reports digital document forgeries increasing 244% year-over-year.
Why this matters more in payments than in “normal” cyber
Payments compress decision time. Faster rails mean less time to detect, investigate, and claw back funds. When AI makes social engineering more convincing, the “approve” moment becomes the control point that matters most.
That dynamic shows up clearly in enterprise data: the Association for Financial Professionals reports 79% of organizations experienced payments fraud attacks or attempts in 2024, and 63% cite business email compromise as the number one avenue for fraud attempts.
The new fraud kill chain in 2026
AI changes the sequence, not the fundamentals. The pattern is consistent:
Impersonation gets access (executive, vendor, customer, call center).
Identity signals get spoofed (voice, video, “good enough” KYC, synthetic documents).
Authentication gets bypassed (phished credentials, session hijack, SIM swap, weak recovery).
Payments execute fast (ACH, wires, RTP) and recovery rates drop.
The European Payments Council explicitly calls out deepfake and AI-enabled scams, including voice impersonation that can bypass traditional voice biometrics, and the risk of spoofing weak identity verification and liveness checks.
Controls that reduce loss instead of producing paperwork
Most “fraud programs” still over-invest in detection and under-invest in prevention at the approval point. In 2026, the priority stack is:
1) Replace phishable login with phishing-resistant identity
Passkeys reduce exposure to credential theft and replay. The FIDO Alliance defines passkeys as FIDO cryptographic credentials tied to an account and unlocked via on-device biometrics/PIN, removing passwords from the flow.
Implementation stance: passkeys for customers and workforce where feasible, hardware-backed MFA for privileged access, and hard blocks on SMS-only recovery for high-risk actions.
2) Treat payment changes as “high-risk transactions,” not routine ops
High-risk events include new payees, payee detail edits, payment file changes, approvals outside normal patterns, and exception-based overrides.
Control stance: step-up verification, enforced dual control, and independent out-of-band confirmation for changes and first payments.
3) Stop trusting voice and video as identity proof
Deepfakes are already being used to defeat weak verification.
Control stance: move approvals to cryptographic confirmation (device-bound), require liveness plus anti-injection checks for onboarding, and assume “what you see/hear” is untrusted in high-dollar workflows.
4) Harden the upstream systems that fraud relies on
Fraudsters still need access paths: compromised endpoints, mailbox compromise, vulnerable web apps, misconfigured cloud, exposed APIs.
Control stance: continuous vulnerability management tied to remediation outcomes, tight identity governance, secure email controls, and monitoring that detects the “pre-fraud” stage (credential abuse, inbox rules, anomalous sessions).
The compliance friction problem: information sharing still breaks defenses
Fraud defense improves when institutions share indicators, patterns, and failures quickly. Michelle W. Bowman highlighted that broad treatment of “confidential supervisory information” can restrict banks from sharing fraud-prevention information even when it would strengthen resilience.
Practical stance: build internal sharing that is fast and structured (playbooks, typologies, control gaps), and participate in permitted industry sharing channels with clear legal guardrails.
InfoSight perspective: fix the control gaps that make fraud inevitable
Payments fraud is now a convergence problem: identity, endpoint security, email security, web application security, and payment workflow controls fail together.
InfoSight’s approach is built around measurable risk reduction:
Attack-surface reduction: continuous vulnerability and exposure management with prioritization and remediation tracking (Mitigator).
Identity and access hardening: phishing-resistant authentication, privileged access controls, and recovery flow tightening.
Detection and response: 24/7 monitoring to catch credential abuse, anomalous access, and pre-fraud behaviors early.
Evidence-ready governance: controls mapped to actual workflows, with proof of enforcement and outcomes, not policy-only assertions.
30/60/90 execution plan for financial services teams
Days 0–30: block the obvious loss paths
Lock down payment change workflows (dual control, step-up, out-of-band confirmations)
Disable weak recovery for high-risk users and actions
Tighten vendor payment change verification and approval
Days 31–60: reduce credential and session compromise
Expand phishing-resistant MFA/passkey roadmap for key populations
Harden email and identity telemetry, alert on inbox rules and anomalous OAuth/app grants
Close top exploited vuln classes in web apps and remote access paths
Days 61–90: operationalize deepfake-era verification
Redesign call center and high-dollar approvals to avoid “voice = identity”
Upgrade onboarding verification to resist injection and synthetic document attacks
Run tabletop exercises that simulate AI-enabled impersonation plus fast payments
Bottom line
AI did not invent fraud. It industrialized deception and compressed timelines. Winning in 2026 requires phishing-resistant identity, hardened approval workflows, and continuous reduction of the technical attack paths fraud depends on.
Subscribe to our newsletter to keep you updated on the latest cybersecurity insights & resources.
One follow-up from a security expert—no spam, ever.
Enter your details below to download the PDF.