No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Cybersecurity

AI Arms Race: Banking Industry, Cybercriminals Keep Trading Punches

Safely using AI means staying a step ahead

by Tamas Kadar
September 27, 2023
in Cybersecurity, Featured, Financial Services
robot toys fighting

Feel safe in the knowledge that you’re covered by KYC checks? Are you sure about that? An arms race of sorts is brewing between financial institutions and cybercriminals to see whose sophisticated measures will win out. Tamas Kadar of SEON looks at how to defeat advanced techniques like voice phishing and deepfakes.

With businesses increasingly using customer identity verification solutions to prevent criminals from impersonating real customers, many fraudsters are fighting back with new ways to trick them.

Consider biometric tools: These use what’s known as “unique identifiers” in order to determine a customer is legitimate, and they are able to pick someone out of a group of similar individuals. This has spurred cybercriminals to create more “deepfakes” in order to impersonate a real customer either via their voice or biometric verification system (to trick the given software’s voice or facial recognition, respectively) that uses a video to verify a customer.

This is an example of fraudsters using synthetic identity fraud, namely through biometric spoofing. Such threats are becoming more prevalent due widespread availability of generative AI, which they can use to animate a victim’s photo and even convince some video biometric software that the information is legitimate. 

Indeed, a lot of software can indeed be fooled: A Which survey found that 40% of new phones’ face recognition was easily spoofed with a printed photo. Many companies are countering this risk by combining face recognition with other tools, such as less easily spoofed fingerprinting software.

Phishing is on the rise — and in more sophisticated ways than before

Generally speaking, phishing is on the rise, and voice phishing in particular has become much more common thanks to voice cloning technology like Resemble AI and ElevenLabs. But even text-based phishing is growing more sophisticated thanks to technological advancements like ChatGPT and other types of generative AI.

AI makes phishing an even more lucrative option for cybercriminals, as they can use AI to create especially convincing text, and they can use AI to impersonate someone’s voice, lending even further credence to their scam. In this scenario, the fraudster targets their victims by impersonating someone they know, such as a manager, coworker, IT support worker or family member.

They then trick individuals into providing sensitive information (like passwords or other login information) that enable them to gain access to their funds. While phishing scams have often been less convincing in the past thanks to incoherent text, AI tools are helping criminals to write more sophisticated messages to their victims.

A CBS investigation found that all it takes is a TikTok video that contains someone’s voice in order to use it for voice cloning purposes. Criminals can then, say, trick a victim into thinking a loved one is in trouble, and they need to transfer large sums of money to help them.

illustration of binary code
Cybersecurity

The Connection Between Blockchain Analytics & Ransomware Payments

by Meredith Fitzpatrick and Peter Bott
August 28, 2023

While government officials advise against making ransomware payments, victims still often will acquiesce. But in doing so, they risk more than emboldening cyber criminals — they could inadvertently engage in sanctions violations.

Read moreDetails

Traditional KYC isn’t enough, so what’s the solution?

With the above in mind, what are some new ways that banks can respond to the changing fraud landscape? By fighting fire with fire.

One solution involves combining your KYC process with pre-KYC checks, such as digital footprint analysis, as this enables you to gather more information on a customer based on other publicly available info on them. All you need for this is their email address, phone number or IP address.

For example, by using a reverse phone or email lookup, you’re able to gather additional data points like

  • Whether their email address or phone number has been involved in a data breach
  • Whether it’s been blacklisted
  •  Whether there are any social media accounts linked to the phone or email address (criminals are far less likely to have an extensive social media trail)

Of course, some customers may choose to hide their IP address behind a VPN, but you can find out if they’re potentially suspicious using another tool: device fingerprinting. By identifying the combination of hardware and software configurations a customer is using and assigning them with a unique identifier, device fingerprinting can keep track of information like the user’s true location, whether they’re using the Tor browser (often favored and misused by criminals for its anonymity) or whether you’ve already blocked the user’s device identifier, regardless of whether they were using a different user name at the time.

Going the extra mile to gather additional data points on customers will make you better able to spot criminals who may otherwise bypass your KYC verification checks using phished customer details or sophisticated biometric spoofing techniques. 


Tags: Artificial Intelligence (AI)Know Your Customer (KYC)
Previous Post

Your Company Could Be Subject to Chinese Investment Ban — and You May Not Know

Next Post

Preparing for PFAS Risks: Steps to Proactive Compliance

Tamas Kadar

Tamas Kadar

Tamas Kadar is the co-founder and CEO of SEON, a fraud prevention firm founded in 2018.

Related Posts

robot nurturing a good idea

Innovation vs. Compliance: In the Age of AI, Why Not Both?

by Asha Palmer
June 17, 2025

As governments scramble to regulate AI, forward-thinking companies are writing their own compliance playbooks

human robot working as team pie chart

Smart Machines, Smarter Humans: Why Compliance Still Needs a Human Touch

by Roman Eloshvili
June 17, 2025

From the 2008 financial crisis to everyday judgment calls, the case for keeping humans in the compliance loop

surrealist businessmen on platforms doing tug of war

Regulation vs. Innovation: The Tug-of-War Defining Finance’s Future

by Alex Tsepaev
June 6, 2025

AI compliance creates a global patchwork where EU fines reach €35 million while the US encourages growth — leaving financial...

Ethiciti AI Transforming Online Compliance Training

How AI is Transforming Online Compliance Training

by Corporate Compliance Insights
June 3, 2025

Is your compliance training keeping up with AI innovation? Whitepaper How AI is Transforming Online Compliance Training What's in this...

Next Post
worker in hard hat examining product

Preparing for PFAS Risks: Steps to Proactive Compliance

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights