Global Statistics in Account Takeover Fraud for 2026

Account takeover has moved into the mainstream of cybercrime. Recent analyses of consumer and business fraud data show that account takeovers now represent a significant share of all digital identity attacks, with tens of thousands of cases reported each year in major markets and steady year‑on‑year growth. In the UK alone, over 78,000 account takeover cases were recorded in 2025, making up 18% of all fraud‑risk filings and marking a 6% rise in just one year.

At its simplest, an account takeover (ATO) happens when criminals gain control of a real user account and use it as their own for banking, ecommerce, telecoms, social media or other online services. Because many accounts now store payment methods and reuse credentials, one successful takeover can quickly spread into wider identity theft and financial loss.

AI is amplifying this threat. Recent reporting shows deepfake‑driven fraud and AI‑assisted impersonation climbing sharply: deepfake incidents and losses from AI‑powered scams have surged since 2023, with businesses losing an estimated $20bn–$40bn globally each year. Regulators and investigators now treat AI‑enabled identity and account takeover attacks as one of the most urgent fronts in cybercrime, rather than a fringe concern.

This overview focuses on how serious ATO has become by 2026, how AI is reshaping attack methods and which practical defenses help individuals and organizations reduce risk.

What is Account Takeover, and Why Does It Matter?

Account takeover (ATO) occurs when a fraudster gains control of a genuine user account and uses it to move money, steal data or abuse stored credentials, often across multiple services. Beyond direct losses, ATO undermines trust, drives chargebacks and can trigger serious regulatory and AML compliance exposure for firms that fail to manage account takeover fraud.

The Modern Consequences of Account Takeover Fraud

Digital accounts are high-value targets. A recent industry study highlighted that while password reuse remains a critical vulnerability, the real threat in 2026 is session hijacking and MFA fatigue attacks, which allow fraudsters to bypass traditional login screens entirely.

Given the massive increase in digital-first households, the attack surface is wider than ever. But what are they targeting?

  • Financial Accounts (32% of breaches): Attackers drain balances, set up unauthorized instant payment beneficiaries or use the account as a mule for layered crypto-laundering.
  • Social Media and Retail (51% of breaches): While these may seem less critical, fraudsters use compromised social accounts for long-term “pig butchering” crypto scams or drain stored credit cards on ecommerce platforms.

Fraud is no longer opportunistic but organized. Internal data shows that fraudsters actively monitor the consumer market for activity spikes, such as holiday shopping or major software releases, deploying botnets to test stolen credentials at scale when merchants are overwhelmed. If an attacker breaches an account, their first move is to quietly alter notification settings and contact details, obfuscating their tracks before the genuine user realizes what has happened.

How to Prevent ATO Fraud as a Business

For businesses, preventing account takeover starts with people and continues with smarter, data‑driven controls. Teams need to understand how ATO works in 2026, how AI‑assisted phishing or deepfake messages can pressure them into rushed approvals and how reused passwords or ad‑hoc exceptions quietly open the door to attackers. Clear playbooks for handling unusual login alerts, urgent bank‑detail changes or atypical customer requests help staff respond consistently rather than improvising under pressure.

On the technical side, advanced device intelligence and behavioral data provide the extra context that static credentials cannot. Device intelligence lets you see when a login comes from a familiar, low‑risk setup versus a new or suspicious environment, such as emulators, rapidly rotating configurations or tools often used to hide true location. Instead of treating every session the same, you can step up authentication, add friction or block access when the device profile doesn’t match the expected user.

Behavioral biometrics adds another layer of protection by looking at how someone interacts with your product over time: typing rhythm, mouse movement, swipe patterns and typical navigation paths. Genuine users tend to be consistent; bots, scripted tools or human imposters often are not. When behavior suddenly diverges from an established pattern, especially around high‑risk actions like password resets, new payees or large transfers, systems can trigger extra checks even if the username, password and device all appear valid.

Used together, device intelligence, behavioral biometrics and more traditional checks (such as IP analysis, rate limiting and step‑up authentication) give businesses a layered, adaptive way to spot account takeover attempts early. This approach makes it harder for attackers to rely on a single weakness — whether stolen credentials, spoofed devices or social engineering — and allows genuine customers to move through familiar, low‑risk actions with minimal friction.

The Human Variable: Why Individual Security is a Business Liability

Even the strongest fraud stack still depends on individual users making good decisions. Far too often, severe account takeovers don’t start with a system breach but with a person being rushed, convinced or tricked into helping the attacker.

AI‑powered social engineering makes this much easier. Deepfake voices, polished phishing pages and remote “support” sessions can nudge people into sharing codes, approving payments or handing over device control — actions that look legitimate from a system’s point of view.

For businesses, these personal lapses show up as real costs: reimbursements, investigation time, support load and, most importantly, lost trust when victims blame the platform rather than their own security habits. A portion of those customers never return, turning user mistakes into churn.

That’s why modern ATO defenses increasingly assume users will sometimes slip. Passkeys and device‑bound biometrics reduce reliance on passwords that can be phished. Session and remote‑access monitoring help spot when a device is being steered by someone else. Adaptive risk scoring adds just enough friction when behaviour looks unusual, aiming to catch human‑driven fraud without turning every login into a hurdle.

The Evolving Threat Landscape: The Biggest ATO Risks to Businesses Today 

Account takeovers sit at the crossroads of broader digital risks that are all accelerating in 2026. Three areas in particular are making ATO harder to prevent and more expensive to ignore.

1. AI‑powered automation: Attackers can now launch large‑scale ATO attacks without deep technical skills. Off‑the‑shelf tools and rented botnets drive high‑speed credential stuffing, while generative AI helps craft convincing phishing flows and even deepfake voices or videos to get around basic liveness or call‑centre checks. The combination fo the two increases both the volume and the realism of attacks.

2. Third‑party compromise: Even if your own security is strong, your ecosystem can introduce risk. Compromised marketing platforms, CRMs, customer support tools or analytics scripts can leak login data, session tokens or reset links. When that happens, attackers can pivot straight into your environment, turning a vendor breach into a wave of downstream account takeovers.

3. Regulatory and liability pressure: As ATO losses grow, regulators are less willing to accept “customer negligence” as a blanket explanation. Expectations for strong authentication, monitoring and incident response are rising, and failing to show reasonable controls can lead to fines, mandated reimbursements and lasting reputational damage. For many firms, managing ATO risk is now as much a compliance and governance priority as it is a technical one.

Which US States Lose the Most Money to Online Crime?

According to the FBI’s most recent Internet Crime Complaint Center (IC3) report, Americans reported 16.6 billion dollars in cyber‑enabled losses in 2024, a 33% increase on the previous year. A small group of states account for a large share of that figure, driven by both population size and concentration of high‑value targets.

Based on total reported losses, the five hardest‑hit states were:​

  1. California – 2.54 billion dollars in reported internet crime losses
  2. Texas – 1.35 billion dollars
  3. Florida – 1.07 billion dollars
  4. New York – 0.90 billion dollars
  5. Washington – 0.37 billion dollars

These numbers reflect all cyber‑enabled fraud reported to IC3, including investment scams, business email compromise and account takeovers, and highlight how concentrated the financial impact of online crime has become in larger, economically active states.

Which Countries Lose the Most Money to Online Crime?

Cybercrime is now counted alongside major national economies. Recent analyses estimate that global digital crime will impose an annual cost of around 10–12 trillion dollars, putting it behind only the US and China in economic scale. Within that total, a handful of highly connected countries absorb a disproportionate share of reported losses.

The United States remains the single largest target, while the UK has declared fraud a national priority.

Government analysis shows that fraud accounts for roughly 45% of all crime in England and Wales, with billions of pounds lost annually across consumers and businesses. Germany and other major EU economies also feature heavily in threat reporting as attractive targets due to dense industrial, financial and government infrastructure.

No country is spared: smaller and emerging markets see rapid growth in cyber‑dependent scams, especially where digital payments and mobile banking expand faster than local defenses. For businesses operating cross‑border, this means account takeover and related fraud cannot be viewed as a “local” problem — exposure tracks where your users, suppliers and payment flows are, not just where you are headquartered.

Rebtel Blocks 30% More ATO Attempts

Sources