AI-Powered Sign-Up Fraud Targets Customer Acquisition
Summary
Hide ▲
Show ▼
AI-driven sign-up fraud is rapidly increasing, targeting customer acquisition processes. Attackers exploit sign-up pages to create fraudulent accounts, bypassing traditional defenses like MFA. This trend is particularly impactful in retail and e-commerce, where fraudulent sign-ups can outnumber legitimate ones by a significant margin. The financial and operational impacts are severe, with potential losses in the millions. Attackers leverage AI to automate and scale sign-up fraud, making it easier to exploit vulnerabilities in the initial registration process. This shift is driven by improvements in MFA and user awareness, which have made other attack vectors less effective. AI tools also facilitate the creation of convincing phishing sites, further complicating detection and defense.
Timeline
-
17.09.2025 17:00 1 articles · 12d ago
AI-Driven Sign-Up Fraud Surges in 2024
In 2024, 46% of all registration attempts were identified as sign-up attacks, marking a significant increase in AI-powered fraud targeting customer acquisition. This trend is particularly notable in the retail and e-commerce sectors, where fraudulent sign-ups can outnumber legitimate ones by a factor of 120. The financial impact of these attacks can be severe, with potential losses in the millions.
Show sources
- AI-Powered Sign-up Fraud Is Scaling Fast — www.darkreading.com — 17.09.2025 17:00
Information Snippets
-
In 2024, 46% of all registration attempts were flagged as sign-up attacks.
First reported: 17.09.2025 17:001 source, 1 articleShow sources
- AI-Powered Sign-up Fraud Is Scaling Fast — www.darkreading.com — 17.09.2025 17:00
-
One sustained attack in the retail/e-commerce sector saw fraudulent sign-ups outnumber legitimate ones by a factor of 120.
First reported: 17.09.2025 17:001 source, 1 articleShow sources
- AI-Powered Sign-up Fraud Is Scaling Fast — www.darkreading.com — 17.09.2025 17:00
-
AI tools like v0 enable attackers to create convincing phishing sites with minimal effort.
First reported: 17.09.2025 17:001 source, 1 articleShow sources
- AI-Powered Sign-up Fraud Is Scaling Fast — www.darkreading.com — 17.09.2025 17:00
-
Identity debt is a growing concern with the increasing use of AI agents, which often rely on shared, static secrets.
First reported: 17.09.2025 17:001 source, 1 articleShow sources
- AI-Powered Sign-up Fraud Is Scaling Fast — www.darkreading.com — 17.09.2025 17:00
-
Model Context Protocol (MCP) implementations often expose organizations to risks by storing static keys and database connection strings.
First reported: 17.09.2025 17:001 source, 1 articleShow sources
- AI-Powered Sign-up Fraud Is Scaling Fast — www.darkreading.com — 17.09.2025 17:00
-
Passkeys offer superior security and user convenience, making them an effective defense against AI-driven sign-up fraud.
First reported: 17.09.2025 17:001 source, 1 articleShow sources
- AI-Powered Sign-up Fraud Is Scaling Fast — www.darkreading.com — 17.09.2025 17:00
-
Secure AI agents by using standard OAuth flows and a secure token vault to prevent exposure of static secrets.
First reported: 17.09.2025 17:001 source, 1 articleShow sources
- AI-Powered Sign-up Fraud Is Scaling Fast — www.darkreading.com — 17.09.2025 17:00
Similar Happenings
Increased Browser-Based Attacks Targeting Business Applications
Browser-based attacks targeting business applications have surged, exploiting modern work practices and decentralized internet apps. These attacks, including phishing, malicious OAuth integrations, and browser extensions, compromise business apps and data by targeting users. The attacks leverage various delivery channels and evasion techniques, making them difficult to detect and block. Phishing attacks have evolved to use non-email channels such as social media, instant messaging apps, and malicious search engine ads. These attacks often bypass traditional email security controls and are harder to detect. Attackers exploit the decentralized nature of modern work environments, targeting users across multiple apps and communication channels. Non-email phishing attacks can result in significant breaches, as seen in the 2023 Okta breach. The rise in these attacks highlights the need for enhanced browser security measures and better visibility into user activities within the browser.
PyPI implements expired domain checks to prevent account takeovers and supply chain attacks
The Python Package Index (PyPI) has implemented a new security measure to check for expired domains, blocking over 1,800 email addresses tied to expired domains since June 2025. This update targets domain resurrection attacks, where malicious actors exploit expired domains to gain unauthorized access to PyPI accounts. PyPI uses Domainr's Status API to determine a domain's lifecycle stage and mark email addresses as unverified, preventing password resets and other account recovery actions. Users are advised to enable two-factor authentication (2FA) and add a secondary verified email address from a notable domain to enhance security. Additionally, PyPI has warned of a new wave of phishing attacks using fake websites to steal user credentials, advising users to change passwords and use phishing-resistant 2FA methods.