French banking leaders worried about scams and money laundering
AI-driven attacks are escalating as basic security gaps leave enterprises exposed
CISO news
French banking leaders worried about scams and money laundering
new survey, commissioned by BioCatch, of fraudmanagement, anti-money laundering and compliance team
A leaders at French banks finds social engineering scams and money mule accounts top the list of fraud-related concerns. one threat and nearly two-thirds placing it in their top three worries. By comparison, only 40 % of French C-suite leaders surveyed named scams as their top worry, potentially due to the fact French banks are not yet required to reimburse scam victims.
Those in the C-suite of French banks placed greater emphasis on money laundering than scams, with 27 % ranking it as the number
Thomas Peacock, Director of Global Fraud Intelligence at BioCatch, said:“ We also see French C-suite execs as more likely to report an increase in fraud attempts at their organisation( 47 %) verses all those surveyed in France( 31 %), suggesting leadership may see early warning signals not consistently visible across all banking teams.”
Nearly three-quarters of those surveyed( 72 %) estimated their banks annual fraud losses exceed US $ 5 million( or € 4.22 million), while 44 % said fraud losses at their organisation were increasing.
Matthew Platten, France Country Manager at BioCatch, said:“ French banks today must protect their customers from a deluge of increasingly sophisticated social engineering scams, from faux conseiller bancaire schemes to AI-enabled impersonation attacks, while also rooting out sprawling, inter-bank networks of money laundering accounts.”
AI-driven attacks are escalating as basic security gaps leave enterprises exposed
BM has released the 2026 X-Force Threat Intelligence Index, revealing that cybercriminals are exploiting basic security
I gaps at higher rates, accelerated by AI tools that help attackers identify weaknesses faster.
IBM X-Force observed a 44 % increase in attacks that began with the exploitation of public-facing applications, largely driven by missing authentication controls and AI-enabled vulnerability discovery.
X-Force also identified a nearly 4X increase in large supply chain or third-party compromises since 2020, mainly driven by attackers exploiting trust relationships and CI / CD automation across development workflows and Software-as-a-Service integrations. With AI-powered coding tools accelerating software creation and occasionally introducing unvetted code, the pressure on pipelines and open-source ecosystems is expected to grow in 2026.
Mark Hughes, Global Managing Partner Cybersecurity Services IBM, said:“ Attackers aren’ t reinventing playbooks, they’ re speeding them up with AI. The core issue is the same: businesses are overwhelmed by software vulnerabilities. The difference now is speed.”
Infostealer malware led to the exposure of over 300,000 ChatGPT credentials in 2025, signalling that AI platforms have reached the same credential risk as other core enterprise Software-as-a-Service solutions.
Compromised chatbot credentials create AI-specific risks beyond simple account access. Attackers can manipulate outputs, exfiltrate sensitive data or inject malicious prompts. This underscores the need to assess enterprise-wide AI adoption and enforce strong authentication and conditional access controls.
10 WWW. INTELLIGENTCISO. COM