AI-powered fraud tools have made voice cloning, deepfake identity spoofing, and hyper-personalized phishing accessible to anyone. Every one of these attacks exploits authentication methods built on shared secrets: passwords, OTPs, security questions. Cryptographic authentication (passkeys, FIDO2) is structurally immune because there's no secret to steal, intercept, or fake. That's not marketing. It's math.
This isn't hypothetical anymore. In early 2024, a finance worker at a multinational firm in Hong Kong was tricked into transferring $25 million after a video call with what appeared to be the company's CFO and other colleagues. Every person on the call was a deepfake. The incident, reported widely by CNN and the South China Morning Post, demonstrated that AI-generated fraud has moved well beyond crude email scams.
Voice cloning now requires only a few seconds of sample audio. Deepfake video can be generated in near real-time. LLMs produce phishing messages indistinguishable from legitimate corporate communications. The tools are commercially available, cheap, and improving rapidly.
The FBI's Internet Crime Complaint Center reported over $12.5 billion in total internet crime losses in 2023, with business email compromise and investment fraud (both increasingly AI-enhanced) among the top categories.
Every major AI fraud technique targets the same architectural weakness: authentication built on information that can be known, copied, or intercepted.
Passwords can be phished, guessed, or stolen from breaches. SMS OTPs can be intercepted through SIM swap attacks or real-time phishing proxies. Security questions can be answered by scraping social media. Voice authentication can be defeated by cloned audio. Video KYC can be bypassed by deepfakes.
These methods all rely on shared secrets or biometric data transmitted over a network. AI excels at capturing, replicating, and exploiting exactly these types of information.
Passkeys and FIDO2 authentication work differently. When a customer authenticates with a passkey, their device generates a cryptographic signature using a private key that physically cannot leave the device. The server verifies this signature using the corresponding public key. Authentication is proven mathematically, not by presenting a secret.
This is why passkeys are immune to the AI fraud playbook. There is no password to phish. There is no OTP to intercept. There is no biometric data traveling over a network to deepfake. The private key exists only on the customer's physical device, inside a secure hardware element, and cannot be exported, copied, or transmitted. No amount of AI sophistication changes this, because the constraint isn't computational. It's physical.
If your bank still relies primarily on passwords and SMS OTPs, every advance in AI fraud capability makes your customers less safe. Not incrementally less safe, but categorically: each new AI tool creates an entirely new attack vector against shared-secret authentication.
Layering more defenses on top of a fundamentally vulnerable foundation (better fraud detection, smarter risk scoring, behavioral analytics) helps. But it's an arms race where the architecture works against you. Cryptographic authentication changes the architecture itself.
The strongest posture combines cryptographic authentication with AI-powered defense. Use passkeys to eliminate the credential theft attack surface. Use behavioral analytics, real-time risk scoring, and anomaly detection to catch the fraud vectors that remain (authorized push payment scams, social engineering that doesn't require credential theft, insider threats).
But the foundation has to be right. Build on shared secrets, and you're playing defense on a field that tilts further against you every quarter. Build on cryptographic authentication, and AI fraud loses its most scalable weapon.
Most orgs running OTP-based MFA have 3–4 exploitable gaps they don’t know about. Our Authentication Assessment takes 2 minutes and shows you exactly where you stand — plus a phased migration roadmap.
Take the Assessment →Our 2-minute assessment scores your authentication setup and shows you exactly where the improvements are.
See Your Score →