Loading...
Loading...

In this episode, we explore how the global fraud ecosystem has industrialized, equipping cybercriminals with highly scalable tools like Malware-as-a-Service e-skimmer kits and AI-powered purchase scams. We dive into the most pressing emerging threats, including the opaque risks of AI-driven agentic commerce and the rising popularity of one-time password (OTP) interception to enable digital wallet fraud. Finally, we discuss how financial institutions and merchants can fight back by abandoning reactive models in favor of proactive, cross-functional cyber-fraud fusion centers.
Sponsors:
Welcome to The Deep Dive. We are genuinely thrilled you're spending part of your day with us.
Yeah, absolutely. Thanks for having me.
You know, you probably have a dozen things competing for your attention right now.
Maybe you're prepping for a strategic meeting, looking to stay ahead of the curve on cyber security
trends, or you know, you're simply curious about the invisible architecture of the digital economy.
Whatever brought you here, we have a mandate to respect your time and keep you well-informed
without the friction of information overload. We're working from an incredibly comprehensive
source today. It's recorded futures annual payment fraud intelligence report 2025.
And it is a dense analysis.
Very.
But our mission for this deep dive is to map out how the payment fraud landscape has just
radically industrialized. We're going to examine the failure of traditional perimeter defenses,
the professionalization of cybercrime infrastructure, and you know, the operational shifts that
directly impact your digital wallet in 2026. Okay, let's unpack this. Because the conventional
archetype of a lone threat actor, you know, the guy brute forcing a mainframe and a basement that
is thoroughly dead. Right. It's completely obsolete. We are no longer dealing with isolated incidents.
We are dealing with a heavily capitalized corporate level machine that optimizes its attack paths
with the efficiency of a global logistics firm. If we connect this to the bigger picture,
the most critical shift is really in the operational model.
Historically, the industry tracked the sheer volume of stolen data as the primary metric of
threat severity. Sure. More data means more danger. Exactly. But the macro view from the 2025
data reveals a counterintuitive trend. The raw volume of stolen data exposure has essentially
flatlined. And in some sectors, it's actually dropped. Wow. Get the systemic danger of that data
has skyrocketed. Thread actors have widened the attack surface by moving upstream. They're
maximizing their yield while minimizing their input, operating with a scale that completely outpaces
legacy fraud detection. That brings up a fascinating contradiction from the report.
I was looking at the dark web marketplace data and the volume of compromised payment cards
posted for sale actually dropped significantly in 2025. Yeah, it went down by 19% down to roughly
142 million records. Right. And it feels counterintuitive. On paper, fewer stolen cards and
circulation sounds like a defensive victory. I mean, you'd think so. But the context suggests
otherwise. What drove that sudden drop in raw numbers? Well, you're absolutely right to question
the surface level optimism there. That drop wasn't driven by better defensive posture. It was
primarily driven by market disruptions within the criminal ecosystem itself. Oh, okay. We saw a
major dark web marketplace is just collapse. A prominent one called Biden Cash went offline and
right before they did the executed massive free data dumps of stolen cards. Oh, wow. Another vendor
B1st stash did the exact same thing. It was essentially a marketing stunt. A way to build underground
brand legacy and retain their clientele as they migrated to decentralized platforms or telegram
channels. Okay. So the cards are still compromised. Exactly. They just aren't sitting on
traditional vendor shelves anymore. That makes total sense. They're just flooding the market on
their way out. But even with the drop in volume, the analysis emphasizes that the composition of
the data has changed. We're seeing a pivot from quantity to quality. Precisely. What's fascinating
here is the data enrichment. We aren't just looking at isolated track data or standalone 16 digit
card numbers anymore. A staggering 82% of stolen card not present records are now bundled directly
with the victims personally identifiable information. Specifically their email address or phone
number. Yes. And that represents a 9% increase year over year, which brings up the real issue. Why
should you care if they have your phone number along with your card? It's because this rich data fuels
sophisticated social engineering and account takeover attacks. It is no longer just about brute
forcing a card. It is about manipulating you. That kind of enriched data pipeline fundamentally
changes the threat model. When a threat actor have your card details alongside your direct contact
information, they don't even need to test the card against a payment gateway. They can bypass the
gateway entirely and pivot straight to taking over your account. When they have your phone number,
the attack vector shifts from exploiting a technical vulnerability to exploiting your psychology via
highly targeted spearfishing. Exactly. And this optimization isn't just limited to the digital realm.
They are applying the same supply chain logistics to physical fraud. Like physical US paper checks.
Yes. Platform moderation on telegram actually drove the total number of stolen check images down
by 42% to about 1.3 million. But the number of unique fresh stolen checks increased by 3%
hitting 233,000. And there was a distinct geographic shift with that physical theft wasn't there.
They weren't just hitting the same urban mail hubs. Right. Criminals are migrating their physical
mail theft operations away from major urban centers and pushing into places like the US Midwest.
They're actively mapping out where law enforcement friction is lowest and relocating their operations.
It's just pure operational efficiency, which perfectly segments into the industrialization of
upstream fraud. I want to look at match cart e-skimmers. To make this relatable, imagine a digital
pick pocket hiding invisibly inside the code of your favorite online store. But the stale here
is staggering. It really is. The telemetry tracked over 10,500 active e-skimmer infections in 2025.
And those specific infections compromised upwards of 23 million online transactions.
Incredible. But the real story is the professionalization behind those deployments.
We are firmly entrenched in the malware as a service era.
I want to push back on that slightly though. Yeah.
Injecting a malicious script into a modern e-commerce site that evades contemporary firewalls
that isn't trivial. Who is actually coding and maintaining these thousands of active skimmers?
That's the genius of their model. The people deploying the skimmers aren't the ones coding them.
It is a franchise system. The analysis highlights a specific kit known as Sniffer by Flaris,
which accounted for 26% of all tracked e-skimmer infections.
So the developers build the infrastructure and lower to your affiliates rented?
Exactly. We even saw the rise of a service called accept car, which operates purely on a revenue
share model. They handle the complex deployment and obfuscation of the skimmer.
And in exchange, they literally take a 50 to 70% cut of the stolen data they harvest.
Wow. So they are effectively acting as venture capitalists for cybercrime,
lowering the barrier to entry for anyone who wants to monetize a compromised website.
Yes. And their obfuscation techniques are enterprise grade. To avoid detection,
these groups are now hiding their malicious payloads inside blockchain smart contracts.
The decentralized nature of the blockchain makes it incredibly difficult
to just pull the plug on the malicious infrastructure.
And once they harvest these millions of enriched records through those skimmers,
they still have to validate them.
The methodology for current testing seems to have evolved significantly, too.
It's a massive automated validation engine. In 2025, threat actors abused over 350 legitimate
tester merchants. These are businesses they use to run invisible micro transactions to
confirm a card's validity. And what blew my mind is that 94% of these
tester merchants were brand new targets. Right. They are intentionally rotating their
targets to evade historical fraud detection. Over 27 million card records were exposed
on telegram just during this testing phase. Here's where it gets really interesting,
because they aren't just relying on compromised third-party merchants anymore.
Thread actors established over 3,600 fraudulent merchant counts last year.
That's a two and a half times increase. Yeah. They use AI-powered marketing and social media
ads to target victims with fake discounts or deceptive subscription traps.
The psychology behind the purchase scam is what makes it so devastating to traditional banking
controls. Traditional controls are great at stopping unauthorized transactions.
But in a purchase scam, the criminals manipulate you into authorizing the payment yourself.
Right. So the risk engine sees the legitimate device, the correct IP address,
and the actual account holder manually authorizing the payment. The technology functions perfectly.
Exactly. You pass all the biometric checks because you genuinely believe you are purchasing
a legitimate product. And the exploitation doesn't stop at the initial checkout.
Oh, the secondary exploitation?
Yes, using fake transaction recovery services. After the victim realizes they've been scammed,
the original thread actors hit them again, impersonating a recovery service that promises
to claw back the stolen funds for a fee. Double dipping on the same compromised target.
It is ruthless. Let's pivot to one time passwords or OTPs. You know that text message code you get
to confirm a purchase. Hackers are intercepting them. But intercepting an OTP at scale usually
requires a sim swap, which is resource intensive. Are they really doing that for millions of
standard retail transactions? They don't need to compromise the device. If they can engineer the
user in the handing over the code, they steal OTPs to load your stolen card into a digital wallet
on their phone. To do that, the issuing bank demands an OTP. So they deploy highly contextual
fishing campaigns. For example, the report cited a 2025 campaign targeting UK residents with fake
winter fuel payment notifications. The victims entered their credentials and their OTPs
into the fishing portal. The attackers immediately use those intercepted codes to authenticate
the victim's cards on their own digital wallets. And once it is authenticated in the digital
wallet, the physical card is irrelevant, which leads to that concept of ghost tapping.
Right. With ghost tapping or NFC relay attacks, you have an attacker who intercepts the OTP and
provisions the wallet. But they might be sitting in a different country. So they remotely relay the
contactless signal over the internet to a money mule's smartphone. The mule can stand in a retail
store, tap their phone and transmit the data from the attacker's device thousands of miles away.
It's seamless. But as sophisticated as these relay attacks are, the most disruptive shift highlighted
in the 2025 data revolves around agente commerce and AI. This is the technological wild card.
Right. Agente commerce, AI agents like Amazon Buy for me, visa intelligent commerce, master card
agent pay it. These are AI's that make purchases on your behalf. You tell your AI to find a specific
electronic device under a certain price point and it navigates the web and executes the transaction.
It creates a massive visibility and attribution gap. This is a liability nightmare. The foundation
of transaction security is verifying human intent. When an AI agent buys something, how does the
bank verify the origin of that intent? Was it you, your helpful AI, or a hacker spoofing your AI?
It's like the early chaotic days of open banking. Very similar. Agente commerce obscures the
telemetry even further. We are entering an environment of deeply unclear agent intent.
And we saw a real world convergence of this late last year. In 2025 and Thropic disclosed,
the first cyber espionage campaign orchestrated primarily by an autonomous AI system.
Right. And at the same time, recorded future spotted fraudulent purchase attempts,
utilizing stolen payment data, specifically targeting that same AI platform's API.
Which proves criminals are using fraud to fund AI-driven espionage.
It is the ultimate laundering of both financial resources and attribution.
The human operators sit entirely outside the blast radius of the actual espionage.
So what does this all mean? While this sounds terrifying, there is a playbook to fight back.
For the financial institutions trying to defend against this, what's the solution?
The pivot requires a structural overhaul in how organizations handle threat data.
The analysis outlines the necessity of intelligence-driven defense to overcome the castle dilemma.
The castle dilemma being the concept that you can build the walls of your network as high as you want.
But if the attacker is successfully impersonating the king to the drawbridge operator,
the walls are irrelevant. Exactly. Traditional fraud departments have historically operated
in a reactive silo. When in charge is flagged as fraudulent, they block the cart.
But in an era of rapid digital wallet provisioning,
reacting at the point of transaction is just too late.
The loss has already occurred.
Right. To solve this, institutions have to fuse their cyber-thread intelligence teams
with their frontline fraud operations.
Spotting the infrastructure like the scam merchants and med card scripts before the financial
loss occurs. If you know the deployment signature of a specific skimmer,
you proactively decline transactions,
originating from those compromised environments.
That is the core of the defense playbook,
achieving a decision advantage before they launch the campaign.
Let's quickly recap our journey today.
The volume of stolen data might be dropping,
but the attack surface is wider, the ecosystem is heavily industrialized with malware as a
service, and the rise of AI in digital wallets is forcing the financial world to completely
rethink how it authenticates human intent.
This raises an important question regarding your own operational security.
While institutions face the complex task of integrating intelligence-driven defenses,
you operate at the absolute edge of this perimeter.
Right.
In a world where social engineering bypasses technical controls by targeting human psychology,
critical thinking is your best personal defense.
Automated defenses might fail to classify an anomaly,
but disciplined human intuition is incredibly difficult to spoof at scale.
It's about maintaining a baseline of skepticism in an environment designed to simulate trust.
But I want to leave you with one final provocative concept to mull over.
We discussed agentic commerce and autonomous AI systems being funded by fraud to conduct espionage.
Project that trajectory forward.
We are entering an era where AI agents make purchases for us,
and AI systems are used to defraud us.
Very soon, the financial battlefield might consist entirely of autonomous AI attackers,
trying to steal from autonomous AI defenders in milliseconds.
It's entirely possible.
If human interaction is completely removed from both the crime and the defense,
who ultimately holds the power and the liability when the algorithm makes a mistake?
That is the defining regulatory and technological frontier we are currently standing on.
It absolutely is.
Thank you for joining us on this deep dive.
We really appreciate the opportunity to break down these complex intelligence models with you.
Keep questioning the consensus, stay vigilant, and we will catch you on the next one.

CISO Insights: Voices in Cybersecurity

CISO Insights: Voices in Cybersecurity

CISO Insights: Voices in Cybersecurity
