Cybercrime: AI-driven corporate fraud

How to protect yourself against the cutting edge of cybercrime 

While artificial intelligence (AI) apps have improved lives by increasing some efficiencies, they’ve also proven to be a double-edged sword. Less than three years after widespread public adoption of generative artificial intelligence (GAI) tools like ChatGPT and Midjourney, AI-powered scams already account for 11% of fraud originations in companies with over 100 payment accounts whose revenue reaches or exceeds $1 billion.Disclosure 1 This is according to AFP’s 2025 Payments Fraud and Control Report.

This rapid spread of AI-powered fraud attacks has business leaders on high alert. Roughly 60% of financial professionals are concerned about the impact AI-powered scams are currently having on American businesses.Disclosure 2

Key concepts

In this article, we explore:

  • What constitutes AI-driven business fraud
  • Technological advances used to combat AI-driven business fraud
  • AI-driven business fraud prevention and mitigation strategies

What is AI-driven fraud?

AI-driven business fraud occurs when scammers feed legitimate communications from corporate targets into a generative AI app that enhances the scammers’ ability to commit crimes. These apps then provide either cutting-edge malware that batters your cyber defenses or customized, detailed impersonations of your corporate communications that increase scammers’ chances of successfully committing social engineering fraud.Disclosure 3

AI supercharges the stealth, speed, and accuracy of hacking attempts and familiar types of cyber fraud, such as phishing, vishing, and smishing. This boosted efficiency emboldens scammers to increase the range and frequency of their cyberattacks—making any employee within your company the potential target of an onslaught of sophisticated schemes and hacks.

Good news: Companies are taking a proactive approach to preventing AI-driven business fraud.

Case study: McAfee unveils AI deepfake detection technology.

Cybersecurity provider McAfee has made a quantum leap in combating generative AI-driven voice phishing. McAfee Deepfake Detector uses AI-powered behavioral, contextual, and categorical detection models to spot AI-generated voice clones. The detector can perform this advanced identification process—known as “inference”—in a matter of minutes and has a 96% accuracy detection rate.Disclosure 4

Situated at the bottom of the rectangular graphic stretching horizontally, the title of the image is “Percentage, by business size, of attempted and actual deepfake payments fraud in 2024.” Above the title is a bar graph laid out horizontally with five bars starting at the same point on the left and then extending to the right, where each bar ends at a varying point. Within each bar is a whole number indicating the percentage of attempted and actual deepfake payments fraud that occurred in 2024. To the left of each bar is a line of text that categorizes the fraud percentages displayed within each of the five bars by the size of business in which those actual and completed instances of deepfake payments fraud occurred. From top to bottom, the left margin text and the bar graph percentages to which they refer read: All sizes, 5%; <$1 billion in revenue, 3%; ~$1 billion in revenue, 5%; ~$1 billion in revenue and fewer than 26 payment accounts, 3%; ~$1 billion in revenue and more than 100 payment accounts, 11%. Near the bottom margin of the graphic, below the title, the source listed for the graphic is the 2025 AFP Payments Fraud and Control Report.

Best practices and prevention

When it comes to combating supercharged cybercrimes, your best defense is to mirror the know-how of scammers while adopting the very tech they’re using against you. Here are some practical steps to help you accomplish both.

Refresh your memory on red flags.

AI-driven business fraud can eliminate certain hallmarks of threat detection (like watching for grammatical errors in phishing emails). But unsolicited emails or texts requesting sensitive information are still red flags. Similarly, even with the added power of generative AI tools, brute force attacks can only get so far when strong password creation protocols and regular password hygiene are in place.

Make double-checking valid identities a top priority.

The simple step of double-checking an identity is enough to foil most AI-driven business fraud tactics like deepfakes and voice cloning. If a person or institution asks for sensitive information, the recipient should confirm their identity first. This tactic is further strengthened when paired with a multiperson approval process for financial transactions, such as wire or ACH transfers.

Upgrade your tech.

Whether supplying your security team with them or hiring the right group of professionals to help install and manage them, tools powered by generative AI and machine learning (ML) are crucial to securing yourself against this cutting-edge threat. They can strengthen security analysis, identify threats proactively, bolster threat management, and flag even the stealthiest malware attempts.

Talk to Truist.

Truist will never call or email you to ask for your account information. If a caller asking for this info claims to be from Truist, hang up and call 888-228-6654. In conjunction with our fraud prevention specialists, your relationship manager can put you in touch with professionals who will help spot and halt deceptions before they threaten your business.

FAQ on on AI-driven business fraud

Component ID : "faq-1301646222"
Model : "faq"
Position : "left"

This fraud strategy has the potential to threaten all industries. But the possibility for a large financial payoff from a single successful attack has made financial institutions and insurance companies hackers’ prime targets—and has led many big names in those industries to implement AI in cybersecurity countermeasures.

The quality of text, audio, image, and video impersonations created by generative AI varies but is constantly improving. In its early days, photorealistic reproductions of humans proved challenging, with AI often misplacing noses and adding extra fingers to hands. Today, the technology is advancing rapidly. And voice clones have been persuasive enough to trick targets into transferring millions of dollars to scammers.

Companies like Intel, Sentinel, and Microsoft already have products on the market to detect video and image deepfakes. Also in the works are potentially paradigm-shifting initiatives like McAfee’s Project Mockingbird. These and other cutting-edge systems use an array of techniques to successfully identify AI-powered audio impersonations.

Turn to professionals for protection.

To learn more about cybersecurity threats and the various types of fraud facing your organization, talk to your Truist relationship manager. Or start a relationship with us if you’re new to Truist.

Truist Purple PaperSM Digital Transformation

Learn how you can put advanced technology to work for your business.

Related resources

Protecting Your Business Against Social Engineering Fraud | Truist

Protecting Your Business Against Social Engineering Fraud | Truist

Fraud How to identify and prevent the most prevalent cyber scam

Preventing social engineering fraud

Article
Protecting Your Business Against Social Engineering Fraud | Truist

Social engineering involves exploiting a person’s trust to obtain private information or money to commit a crime. Learn how to prevent it here.

How to defend against corporate phishing attacks

How to defend against corporate phishing attacks

Fraud How to defend against corporate phishing attacks

Learn tips and tactics for preventing fraud.

Article
09/08/2024
How to defend against corporate phishing attacks

Arming your employees with the knowledge and tools needed to protect your business from phishing attacks is vital.

How to defend your business against password theft

How to defend your business against password theft

Fraud How to defend your business against password theft

Password theft is a foundational cybercrime hackers rely on to access your company’s computer networks. Learn how to spot and stop these attacks.

Article
09/12/2024
How to defend your business against password theft

Password theft is a foundational cybercrime hackers rely on to access your company’s computer networks. Learn how to spot and stop these attacks.

    {0}
    {6}
    {7}
    {8}
    {9}
    {12}
    {10}
    {11}

    {3}

    {1}
    {2}
    {7}
    {8}
    {9}
    {10}
    {11}
    {14}
    {12}
    {13}

    Stay informed and get connected

    Looking for fresh thinking and new insights to help uncover opportunities for your business needs?

    Connect with a Relationship Manager

    Work with a partner who sees your vision and has the resources to help you achieve it. We’re ready to focus on the specific needs of your company—and where you are in your business lifecycle.

    *This form is for prospects. Truist clients should contact their relationship manager with inquiries related to commercial products and services.

    Helpful links



    Sign up for monthly articles on Business Insights

    Sign up to receive our business insights, thought leadership, and client success stories that can help inspire your next bold business move.

    Please enter a first name
    Please enter a last name
    Please enter a valid email address
    Please enter a company name
    I'm also interested in: Please select a campaign option