The new economics of fraud: Cheaper, faster, more convincing

Help Net Security
Actively Exploited

Overview

A recent report from Visa reveals that scams are becoming increasingly prevalent, largely due to advancements in AI that enable criminals to impersonate trusted entities more convincingly. These scams often involve psychological manipulation, where attackers pressure victims into making unauthorized payments. The report notes that while token fraud and enumeration losses have decreased by 9.6% and 16% respectively, the overall threat from fraud is growing as criminals adapt their strategies. This shift emphasizes the need for consumers and businesses to remain vigilant and enhance their security measures. As the methods become faster and more sophisticated, the risk to everyday users and financial institutions is significant, making awareness and education around these threats crucial.

Key Takeaways

  • Active Exploitation: This vulnerability is being actively exploited by attackers. Immediate action is recommended.
  • Affected Systems: Consumers, financial institutions, payment systems
  • Action Required: Strengthening core defenses, increasing consumer awareness, implementing multi-factor authentication, and advanced fraud detection systems.
  • Timeline: Disclosed on Spring 2026

Original Article Summary

Scams have become one of the fastest-growing consumer risks, driven by AI-enabled impersonation, social engineering, and sophisticated attack methods, according to Visa’s Spring 2026 Biannual Threats Report. Criminals redirect efforts toward trust and third parties Fraud involves behavioral manipulation, fragmented ecosystems, and faster attack cycles that use AI to pressure people into authorizing payments themselves. The payments ecosystem continues to strengthen core defenses. Token fraud declined 9.6% and enumeration losses fell 16% from July through … More → The post The new economics of fraud: Cheaper, faster, more convincing appeared first on Help Net Security.

Impact

Consumers, financial institutions, payment systems

Exploitation Status

This vulnerability is confirmed to be actively exploited by attackers in real-world attacks. Organizations should prioritize patching or implementing workarounds immediately.

Timeline

Disclosed on Spring 2026

Remediation

Strengthening core defenses, increasing consumer awareness, implementing multi-factor authentication, and advanced fraud detection systems.

Additional Information

This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.

Related Coverage

First VPN Dismantled in Global Takedown Over Use by 25 Ransomware Groups

The Hacker News

Authorities in Europe and North America have successfully taken down a criminal VPN service known as First VPN, which was being used by 25 different ransomware groups to hide their activities, including data breaches and denial-of-service attacks. The operation was primarily led by law enforcement in France and the Netherlands, with support from other countries since December. This dismantling is significant because it disrupts the network that these cybercriminals relied on to carry out their attacks, making it harder for them to operate anonymously. By targeting the infrastructure that supports these ransomware operations, authorities hope to reduce the frequency and impact of future cyberattacks. This action underscores the ongoing international effort to combat cybercrime and protect organizations from ransomware threats.

May 22, 2026

Facebook scam targets users over 40 with fake Aldi meat box offers

SCM feed for Latest

Malwarebytes has uncovered a phishing scam on Facebook that specifically targets users aged 40 and older. This scheme lures victims with fake offers for Aldi meat boxes, enticing them to provide personal information or financial details. The attackers are exploiting the trust users may have in social media platforms, making it crucial for older adults to be vigilant about suspicious offers. This incident serves as a reminder that scammers often tailor their tactics to exploit specific demographics, highlighting the need for increased awareness among users. Protecting personal information online is essential, especially when faced with seemingly harmless promotions.

May 22, 2026

State officials urge Congress to reauthorize cybersecurity grant program

SCM feed for Latest

State officials are urging Congress to reauthorize the State and Local Cybersecurity Grant Program (SLCGP), which has been crucial for local governments struggling with cybersecurity issues. Many of these governments lack the necessary staff and resources to effectively protect themselves against cyber threats. The SLCGP has provided essential funding and support, helping to strengthen cybersecurity defenses at the local level. Without the grant program, these municipalities may find it increasingly difficult to safeguard sensitive data and infrastructure from cyberattacks. This call to action underscores the ongoing need for federal support in enhancing local cybersecurity capabilities.

May 22, 2026

CISA Security Leak

Schneier on Security

A contractor for the Cybersecurity & Infrastructure Security Agency (CISA) accidentally exposed sensitive credentials in a public GitHub repository. This leak included access details for several highly privileged AWS GovCloud accounts and internal CISA systems, along with documentation on how the agency builds and deploys software. Security experts have labeled this incident as one of the most serious data leaks involving government information in recent years. The exposure raises significant concerns about the security of sensitive government operations and the potential for misuse of the leaked credentials. It underscores the importance of maintaining strict access controls and oversight for contractors handling sensitive data.

May 22, 2026

5,561 GitHub Repositories Hit by Megalodon Supply Chain Attack in Six Hours

Hackread – Cybersecurity News, Data Breaches, AI and More

Researchers at SafeDep have identified a significant cybersecurity incident known as the Megalodon attack, which has compromised 5,561 GitHub repositories within a short span of six hours. The attack specifically targets continuous integration (CI) workflows, enabling attackers to steal cloud credentials. This incident raises serious concerns for developers and organizations using GitHub, as the theft of cloud credentials could lead to unauthorized access to sensitive resources and data. It's essential for users to be vigilant about the security of their repositories and ensure that their CI workflows are secure. The rapid spread of this attack emphasizes the need for robust security measures in software development environments.

May 22, 2026

Verizon DBIR: Healthcare Fends Off Increased Social Engineering Attacks

darkreading

The 2026 Data Breach Investigations Report (DBIR) from Verizon reveals that the healthcare sector is increasingly facing social engineering attacks, which are becoming more sophisticated. While ransomware and vendor breaches continue to be significant threats, the report indicates that the tactics used by attackers are changing, making it easier for them to trick healthcare organizations and their employees. This shift in strategy raises concerns about the security of sensitive patient data and the overall integrity of healthcare systems. As these social engineering tactics evolve, it is crucial for healthcare providers to enhance their security training and awareness programs to better protect against these types of attacks. The ongoing challenges highlight the need for vigilance in safeguarding against both traditional and emerging cybersecurity threats.

May 22, 2026