3 things to know before tomorrow’s ATO & scams webinar
Driven by AI, dark web marketplaces and increasingly coercive tactics, modern account takeover (ATO) fraud and scams are evolving faster than most defenses can keep up.
On Thursday, March 12, TD Bank’s Julie Packard and NeuroID’s Nash Ali will take you inside today’s rapidly shifting ATO and scam landscape. They’ll share how post-login fraud is shifting across North America, why attacks are surging and how organizations can disrupt coercive fraud schemes before customers fall victim to them.
Before the conversation begins, here are three key things to know:
#1: Fraudsters are flocking to ATOs and scams
Account takeovers and scams are easier — and cheaper — to launch than ever. Fraudsters can now buy full attack kits on the dark web for under $200, and a successful attack can yield $6,000+. AI is amplifying the problem even further: deepfake‑driven imposter scams are now the most common scam type, and automated tools let attackers scale their operations at speed.
All of this has pushed fraudsters to shift more of their activity beyond the login page. Post‑login attacks are growing quickly, causing more damage and creating far more operational strain for fraud teams. ATO attacks are up 24% year over year, and scam losses in the U.S. have now exceeded $12 billion — numbers that reflect both the profitability and the accessibility of these threats.
#2 Common login defenses aren’t invincible
MFA, long considered a gold standard of login defense, is still essential — but fraudsters have found vulnerabilities. There are multiple ways for attackers to bypass or undermine MFA.
Remote access schemes trick victims into handing over full control of their devices. MFA prompt overloads bury users in approval requests until they approve one just to make the notifications stop. Token‑harvesting scams use cloned sites and apps to steal valid session tokens before a customer ever realizes they’re on a counterfeit page. And MFA relay tools, available for less than $20 on the dark web, allow attackers to intercept and hijack MFA tokens without any customer involvement at all.
None of this means organizations need a full overhaul of their login strategy — but it does mean the stack has to evolve. Layering established defenses with newer signals is the most effective way to close the gaps fraudsters are actively exploiting. Nash and Julie will break down what those options look like — and how to deploy them — during the webinar.
#3 The webinar is your gateway to more fraud insights
This week’s session is your entry point to a new library of fraud insights. After the webinar, NeuroID’s resources will officially move to Experian.com, where all future research will be published. By registering, you’ll automatically receive updates on emerging scam trends, ATO patterns and more evolving fraud trends as they surface.
You’ll also be first in line for the next two editions of our Imposter in the Session report series, which will be released exclusively through Experian. The first volumes revealed how fraud rings set up and scale ATO attacks; the next two will show what happens when institutions fail to stop them. As a member of our Experian library, you’ll be the first to know when these new reports are available.
Join the conversation
On Thursday, Julie and Nash will go deeper into everything shaping today’s ATO and scam landscape — from the tools fraudsters are using to the behaviors that expose coercion in real time. If rising post‑login attacks, MFA bypass techniques and scam‑driven losses are on your radar this year, this is a conversation you don’t want to miss — save your seat now.
