With the rapid advancement of technology and artificial intelligence (AI), cybercriminals have developed more sophisticated methods to gain access to personal data and financial resources. Under the guise of legitimate communications from trusted sources, cybercriminals aim to trick targets into revealing sensitive information so that they can ultimately gain unauthorized access to data or funds. Helping to protect your practice and your clients requires thoughtful actions, vigilance, awareness, and attention to detail. Knowledge is the key to prevention.
The threat of cybercrime has become increasingly difficult to ignore in today’s interconnected world. The FBI’s Internet Crime Complaint Center (IC3) received an average of 836,000 complaints per year between January 2020 and December 2024. Perhaps even more concerning, the reported financial losses from suspected scams grew by over 395% from USD 4.2 billion to USD 16.6 billion during this five-year period. And because many scams go unreported, experts believe these numbers are likely underestimated.
For complaints and losses over the years 2020 to 2024, the IC3 received a total of 4.2 million complaints, reporting a loss of USD 50.5 billion.
| Year | Total Complaints | Total Losses |
| 2020 | 791,790 | USD 4.2 billion |
| 2021 | 847,376 | USD 6.9 billion |
| 2022 | 800,944 | USD 10.3 billion |
| 2023 | 880,418 | USD 12.5 billion |
| 2024 | 859,532 | USD 16.6 billion |
| Total | 4.2 million | USD 50.5 billion |
Source: Federal Bureau of Investigation, Internet Crime Report 2024
As appropriate, complaints are reviewed by IC3 analysts, who apply a crime type and adjust the total loss. Crime types and losses can be variable and can evolve based upon investigative or analytical proceedings. Complainant/Entity is identified as the individual filing a complaint. Some complainants may have filed more than once, creating a possible duplicate complaint. Complaint counts represent the number of individual complaints received from each state and do not represent the number of individuals filing a complaint.
Cybercriminals use open-source resources—such as social media and professional networking platforms—to conduct reconnaissance, gather information to appear more realistic, and perpetrate scams via a range of communicative technologies, including:
Generative AI is a technology that can create new content and ideas, including conversations, stories, images, computer code, audio, and videos. The increasing popularity of generative AI presents significant challenges, such as privacy risk, disinformation, and malicious use by cybercriminals to create convincing emails, social media posts, and video content.
Cybercriminals can use AI to help them emulate trusted employees or family members—making phishing emails, texts, and social media posts even more challenging to detect. As the quality of AI-generated content rapidly improves, so does the risk of falling victim to AI deepfakes. A deepfake is a highly realistic video, photo, or audio recording created or manipulated using AI. The underlying technology can replace faces, manipulate facial expressions, and synthesize faces and speech.
Global authorities are increasingly concerned about the sophistication of deepfake technology and the escalation of criminal applications. In February 2024, a finance employee in Hong Kong received an email, allegedly from the organization’s CFO, with instructions to execute a wire transfer. Because the message called for a secret transfer, the employee initially thought the email was a phishing attempt. However, after verifying the request via a group video call with the CFO and others, the employee ultimately made 15 transfers to five different bank accounts totaling HKD 200 million (USD 25.6 million). The cybercriminals had used deepfake technology and publicly available video and audio to impersonate their targets and simulate the video call.
Since identifying fake images, voices, and videos is increasingly more difficult as AI and deepfake technology evolve, always err on the side of caution—particularly when the requested action is unusual or bypasses normal business processes. Here are some things to watch for to help identify manipulated videos:
Unfortunately, adults over 60 are the most common targets of cyberattacks, likely due to the size of their assets. Common scams can include:
While cybercrimes have grown in number and sophistication, the red flags and similarities across scams have largely remained the same. Cybercriminals usually try to create a sense of urgency through fear or the promise of something that sounds too good to be true and often pressure their targets into acting fast. Protecting yourself and your clients requires vigilance, awareness, and attention to detail. Take your time, ask questions, and trust that if something seems off, it probably is.
You are using an unsupported browser that might prevent you from accessing certain features on our site
We suggest clicking an icon below to download a supported browser.