A sharp rise in account-takeover fraud is driving new warnings from U.S. authorities, who say cybercriminals are increasingly impersonating banks, government agencies and even the FBI’s own reporting portal to siphon millions of dollars from victims. The shift reflects a broader evolution in online deception — one that blends technical spoofing with targeted psychological manipulation.
A Surge in Financial Account Takeovers
The FBI has issued a fresh alert over what it describes as a significant spike in account takeover (ATO) attacks, a category of fraud in which criminals gain unauthorized access to online banking, payroll, or health savings accounts. Since January 2025, the agency’s Internet Crime Complaint Center (IC3) has received more than 5,100 reports linked to this pattern of activity, with losses exceeding $262 million.
Investigators say the trend marks a worrying expansion in the sophistication and reach of financially motivated crime. Instead of relying on brute-force hacks or malware alone, cybercriminals are increasingly turning to methods that imitate the language, appearance and workflows of trusted institutions. The result is a series of attacks that feel, to victims, indistinguishable from legitimate outreach — until their accounts are emptied or locked.
Impersonating Trust: The New Social Engineering
The FBI notes that impersonation tactics have become especially prevalent. Fraud groups mimic bank representatives, customer service staff, or law enforcement officers through calls, emails, and text messages designed to gather login credentials and authentication codes.
In September, the Bureau warned that attackers were even impersonating the IC3 website, directing victims to fraudulent portals built to harvest personal data. According to federal analysts, these mimic sites are often polished, responsive and equipped with search-engine-optimized content meant to lure users through sponsored ads or strategically manipulated search rankings.
Victims describe being guided step-by-step through what they believed were security checks, only to later discover that their passwords, MFA tokens or one-time passcodes were used to reset access to their accounts. In many cases, criminals immediately changed the credentials, locking owners out and initiating swift transfers of funds.
How Stolen Access Becomes Stolen Money
Once control is secured, investigators say the money moves fast. Funds are typically routed through a chain of criminal-controlled accounts, many of which are tied to cryptocurrency wallets — a tactic that complicates recovery and tracing. Some victims report that criminals justified the transfers by claiming the victim’s accounts had been flagged for suspicious activity or misused for illicit purchases. Others say they were urged to cooperate with supposed “law enforcement agents,” who were in reality part of the same fraud operation.
The FBI’s latest advisory highlights scenarios in which stolen credentials were used to access payroll systems or benefits portals, enabling attackers to redirect salaries and health savings disbursements. The speed of these transactions means funds are often gone within minutes, and reversals are rare.
A number of attacks also involved SEO poisoning, a method in which fraudulent websites are promoted to the top of search results through paid ads or coordinated linking campaigns. The tactic, authorities say, allows victims to land on phishing pages even when they believe they are navigating directly to a bank or agency website.
Government Response and Ongoing Risks
Faced with the surge, U.S. officials are urging individuals and businesses to adopt strengthened verification practices. The FBI recommends using complex passwords, enabling multi-factor authentication, monitoring accounts regularly, and navigating to financial sites via bookmarks rather than search engine links — a small change that can significantly reduce exposure to malicious lookalike domains.
Victims are encouraged to immediately notify their banks to request recalls of fraudulent transfers and obtain Hold Harmless Letters or indemnification documents, steps that may reduce financial losses. Complaints submitted to IC3 — the legitimate portal — help investigators trace patterns, identify infrastructure used by fraud groups, and coordinate responses across jurisdictions.
While the full scope of the trend continues to unfold, investigators stress that the common thread in these cases is not technological failure, but the successful exploitation of human trust. Criminals, they note, have learned to replicate the tone and timing of institutional communication, making it increasingly difficult for victims to distinguish authentic outreach from a carefully orchestrated scam.