Interpreting the FBI's '2025 Internet Crime Report': AI Fraud Becomes the Biggest Variable, Individuals Aged 60+ Emerge as Primary Targets for Crypto Scams

marsbitОпубликовано 2026-04-16Обновлено 2026-04-16

Введение

FBI's 2025 Internet Crime Report, based on over 1 million complaints, reveals record losses of $20.877 billion, a 26% increase from 2024. Cryptocurrency-related crimes surged to $11.366 billion, with victims over 60 years old being the primary target, suffering $2.76 billion in crypto investment scams alone. This age group was also most affected by recovery scams. Investment fraud was the costliest crime at $8.649 billion, followed by BEC scams ($3.047B) and tech support fraud ($2.135B). Phishing was the most common complaint. Ransomware attacks caused over $32 million in losses, with Akira and Qilin among the top variants. A significant emerging threat is AI-driven fraud, involved in over 22,000 complaints causing $893 million in losses. AI was used to create deepfakes for investment scams ($632M), BEC, and impersonation schemes. The report highlights the industrialization of scams through automation. Despite law enforcement successes, like freezing $679 million, the escalating losses and sophistication of attacks underscore the critical importance of public awareness and enhanced cybersecurity measures.

Author: SlowMist

On April 7, 2026, the U.S. Federal Bureau of Investigation (FBI) released the "2025 Internet Crime Report." This report, coinciding with the 25th anniversary of the FBI's Internet Crime Complaint Center (IC3), is based on over 1 million complaints collected in 2025. It provides an in-depth analysis of the historic loss scale exceeding $20.877 billion, victim profiles, core crime types like investment fraud, and focuses on the evolving trends of artificial intelligence (AI) in online scams, as well as breakthroughs in asset recovery by law enforcement.

This article will interpret the core content of the report, helping readers quickly grasp the dynamic changes in global cybersecurity threats in 2025 and enhance their awareness and prevention capabilities against complex online fraud and AI-driven threats.

Key Point One: 2025 IC3 Complaint Data

1. Overall Situation

In 2025, IC3 received a total of 1,008,597 complaints, involving total losses as high as $20.877 billion, a 26% increase compared to 2024, with an average loss of approximately $20,699 per incident. Among these, 85% of the losses were caused by online fraud.

2. Cryptocurrency-Related Situation

Cryptocurrency-related complaints totaled 181,565, causing cumulative losses of $11.366 billion, a 22% increase from 2024. Among these, 18,589 investors suffered losses exceeding $100,000. Among all complainants, the 60+ age group had the highest proportion.

Key Point Two: Victim Group Analysis

1. Overall Age Distribution

  • 60 and over: 201,266 complaints, losses approx. $7.75 billion.

  • 50-59: 124,820 complaints, losses approx. $3.68 billion.

  • 40-49: 167,066 complaints, losses approx. $2.96 billion.

  • 30-39: 153,293 complaints, losses approx. $1.74 billion.

  • 20-29: 112,069 complaints, losses approx. $560 million.

  • Under 20: 31,254 complaints, losses approx. $67.1 million.

2. Cryptocurrency Victim Group

In cryptocurrency investment fraud, the 60+ age group had the highest number of complaints (13,685), with loss amounts as high as $2.76 billion, far exceeding other age groups. This group also suffered the most in cryptocurrency ATM/Kiosk scams, with related complaints reaching 6,188 and losses of approximately $257 million. Due to a relative lack of understanding of emerging financial technologies and payment methods (such as cryptocurrency ATMs, QR code transfers, etc.) and relatively weak anti-fraud awareness, individuals aged 60 and over have become key targets for scammers.

Notably, many victims, after being scammed initially, fell victim to secondary scams by trusting so-called "fund recovery services" – in "Recovery Scams," this age group again ranked first with 2,529 complaints and losses exceeding $540 million.

3. Main Types of Scams Targeting the 60+ Age Group

  • Scam types with Highest Complaint Numbers: Phishing / Vishing / Smishing / Pharming, Tech Support / Customer Service Fraud, Investment Fraud, Personal Data Breach, Confidence Fraud / Romance.

  • Scam types with Highest Losses: Investment Fraud, Tech Support / Customer Service Fraud, Confidence Fraud / Romance, Business Email Compromise (BEC), Government Impersonation.

Key Point Three: Crime Type Analysis

1. By Number of Complaints

  • Phishing/Vishing/Smishing/Pharming: 191,561.

  • Extortion: 89,129.

  • Investment Fraud: 72,984.

  • Personal Data Breach: 67,456.

  • Non-Payment / Non-Delivery: 56,478.

2. By Loss Amount

  • Investment Fraud: approx. $8.649 billion.

  • Business Email Compromise (BEC): approx. $3.047 billion.

  • Tech Support / Customer Service Fraud: approx. $2.135 billion.

  • Personal Data Breach: approx. $1.315 billion.

  • Confidence Fraud / Romance: approx. $929 million.

3. Cryptocurrency-Related Crime

  • Most Complaints: Investment Fraud (61,559), Extortion (23,797).

  • Highest Losses: Investment Fraud (approx. $7.28 billion), Tech Support / Customer Service Fraud (approx. $1.23 billion).

Key Point Four: Online Fraud and Law Enforcement Achievements

1. Overall Situation of Online Fraud

In 2025, IC3 received 452,868 online fraud complaints, causing $17.697 billion in losses, accounting for 85% of the year's total losses.

The transaction types with the highest number of complaints included cryptocurrency, wire transfer / ACH transfer, debit card / credit card, peer-to-peer (P2P) transfer, gift card / prepaid card, check / cashier's check, and cash.

2. Typical Scam Techniques

  • Account Takeover: approx. 4,700 cases, losses $359.7 million.

  • Gold Courier Scam: approx. 725 complaints, losses $311.8 million.

  • Investment Club Scam: approx. 1,600 complaints, losses $160 million.

  • Government Impersonation: approx. 32,000 complaints, losses $798 million.

3. Cyber Threats

Cyber threat types reported to IC3 in 2025 included:

  • Data Breach: 39%, the most numerous type.

  • Ransomware: 36%, second highest.

  • SIM Swapping: 10%.

  • Malware: 9%.

  • Botnet: 7%.

Among these, 3,600 ransomware complaints caused over $32 million in losses. Main ransomware variants included Akira, Qilin, INC./Lynx/Sinobi, BianLian, Play, Ransomhub, Lockbit, Dragonforce, SAFEPA, Medusa.

In response to the frequent ransomware attacks, the FBI recommends that businesses and organizations take the following key protective measures:

  • Create off-site or offline backups, and regularly maintain backup and recovery mechanisms;

  • Remove default passwords and credentials when installing software;

  • Disable and remove unnecessary protocols by default;

  • Enable multi-factor authentication (MFA) for all services whenever possible;

  • Protect initial intrusion points;

  • Implement network segmentation to prevent ransomware spread;

  • Timely update all operating systems, software, and firmware.

4. Asset Recovery Achievements

  • In 2025, the FBI Recovery Asset Team (RAT) through the Financial Fraud Kill Chain (FFKC) intercepted 3,900 cases, froze funds totaling $679 million, with a fund interception success rate of 58%.

  • "Operation Level Up" issued warnings to over 8,000 potential victims, preventing over $500 million in potential losses for these victims.

  • Collaborated with Indian law enforcement to combat call center scams, resulting in over 475 arrests through 27 joint operations.

  • In financial fraud programs, successfully froze and recovered multiple large sums of money.

Key Point Five: Application of Artificial Intelligence (AI) in Cybercrime

1. Overall Situation

In 2025, IC3 received over 22,000 complaints involving AI-related information. The total losses from these complaints exceeded $893 million.

2. By Number of Complaints

  • Investment Fraud: 4,356.

  • Extortion: 1,764.

  • Personal Data Breach: 1,204.

  • Phishing/Impersonation Scam: 803.

  • Harassment/Stalking: 763.

3. By Loss Amount

  • Investment Fraud: approx. $632.04 million.

  • <极速 dir="ltr" role="presentation">Business Email Compromise (BEC): approx. $30.26 million.

  • Tech Support / Customer Service Fraud: approx. $19.46 million.

  • Confidence Fraud / Romance: approx. $19.04 million.

  • Personal Data Breach: approx. $18.77 million.

4. Specific Applications of AI in Typical Scam Scenarios

According to the report, AI has been widely used in the following typical scam scenarios:

  • Business Email Compromise (BEC): Using AI to generate emails模仿ing executive tone or issuing transfer instructions through voice cloning, with related losses exceeding $30 million in 2025;

  • Confidence Fraud / Romance: Using AI to generate fake identities and dialogue scripts, even using voice cloning to simulate family member求助 scenarios, with related losses exceeding $19 million;

  • Job Scams: Using voice forgery or deepfake technology in remote interviews to gain internal corporate access, with losses接近 $13 million;

  • Investment Fraud: Using AI to mass-generate personalized communication content and forge videos and语音 endorsements by celebrities or authorities, with related losses exceeding $632 million.

Overall, AI is lowering the barrier to entry for scams and significantly enhancing their scalability and disguise capabilities.

Summary

The FBI's "2025 Internet Crime Report" further reveals the deep-seated evolution of the current cybercrime ecosystem: on one hand, the scale of fraud continues to rise, with cryptocurrency remaining an important载体 for fund transfer and money laundering; on the other hand, criminal methods are accelerating their shift from traditional "opportunistic fraud" to "precise, industrialized operations," especially the high-intensity penetration into the elderly population and the spread of secondary scams like "recovery scams," reflecting attackers' deep exploitation of victim psychology and behavioral patterns. Meanwhile, the introduction of artificial intelligence technology is significantly lowering the barrier to fraud and amplifying attack efficiency, gradually evolving online fraud into a complex threat system with automation and scalability features.

Although law enforcement agencies have achieved phased results in fund interception and international cooperation, the overall loss scale and growth trend indicate that the risk situation remains severe. For ordinary users, establishing basic risk identification capabilities and anti-fraud awareness has become a "required course" in the digital age; for industry participants and regulatory agencies, how to enhance the comprehensive identification capabilities for fund flows, behavioral patterns, and异常 signals at the technical level, and strengthen cross-regional collaborative governance, will be key to应对 future new types of cybercrime.

Связанные с этим вопросы

QWhat was the total financial loss reported by the FBI IC3 in 2025, and what was the percentage increase compared to 2024?

AThe total financial loss reported was $20.877 billion, representing a 26% increase compared to 2024.

QWhich age group was the primary target for cryptocurrency investment scams in terms of both the number of complaints and the total losses?

AThe 60 and above age group was the primary target, with 13,685 complaints and losses totaling $2.76 billion.

QAccording to the report, what was the most common type of crime by the number of complaints and the type that caused the highest financial losses?

APhishing/Spoofing was the most common by number of complaints (191,561). Investment fraud caused the highest financial losses, at approximately $8.649 billion.

QHow did Artificial Intelligence (AI) contribute to investment scams in 2025, as detailed in the report?

AAI was used to generate personalized communication content at scale and to create deepfake videos or voice clones featuring celebrities or authorities to lend false credibility, contributing to losses of over $632.04 million in investment scams.

QWhat key protective measures does the FBI recommend for organizations to defend against ransomware attacks?

AThe FBI recommends creating offsite or offline backups, removing default passwords, disabling unnecessary protocols, enabling multi-factor authentication (MFA), protecting initial access points, implementing network segmentation, and keeping all systems and software updated.

Похожее

North Korean Hackers Loot $500 Million in a Single Month, Becoming the Top Threat to Crypto Security

North Korean hackers, particularly the notorious Lazarus Group and its subgroup TraderTraitor, have stolen over $500 million from cryptocurrency DeFi platforms in less than three weeks, bringing their total theft for the year to over $700 million. Recent major attacks on Drift Protocol and KelpDAO, resulting in losses of approximately $286 million and $290 million respectively, highlight a strategic shift: instead of targeting core smart contracts, attackers are now exploiting vulnerabilities in peripheral infrastructure. For instance, the KelpDAO attack involved compromising downstream RPC infrastructure used by LayerZero's decentralized validation network (DVN), allowing manipulation without breaching core cryptography. This sophisticated approach mirrors advanced corporate cyber-espionage. Additionally, North Korea has systematically infiltrated the global crypto workforce, with an estimated 100 operatives using fake identities to gain employment at blockchain companies, enabling long-term access to sensitive systems and facilitating large-scale thefts. According to Chainalysis, North Korean-linked hackers stole a record $2 billion in 2025, accounting for 60% of all global crypto theft that year. Their total historical crypto theft has reached $6.75 billion. Post-theft, they employ specialized money laundering methods, heavily relying on Chinese OTC brokers and cross-chain mixing services rather than standard decentralized exchanges. Security experts, while acknowledging the increased sophistication, emphasize that many attacks still exploit fundamental weaknesses like poor access controls and centralized operational risks. Strengthening private key management, limiting privileged access, and enhancing coordination among exchanges, analysts, and law enforcement immediately after an attack are critical to improving defense and fund recovery chances. The industry's challenge now extends beyond secure smart contracts to safeguarding operational security at the infrastructure level.

marsbit30 мин. назад

North Korean Hackers Loot $500 Million in a Single Month, Becoming the Top Threat to Crypto Security

marsbit30 мин. назад

Circle CEO's Seoul Visit: No Korean Won Stablecoin Issuance, But Met All Major Korean Banks

Circle CEO Jeremy Allaire's recent activities in Seoul indicate a strategic shift for the company, moving away from issuing a Korean won-backed stablecoin and instead focusing on embedding itself as a key infrastructure provider within Korea’s financial and crypto ecosystem. Despite Korea accounting for nearly 30% of global crypto trading volume—with a market characterized by high retail participation and altcoin dominance—Circle has chosen not to compete for the role of stablecoin issuer. Instead, Allaire met with major Korean banks (including Shinhan, KB, and Woori), financial groups, leading exchanges (Upbit, Bithumb, Coinone), and tech firms like Kakao. This approach reflects a broader industry transition: the core of stablecoin competition is shifting from issuance rights to systemic positioning. With Korean regulators still debating whether banks or tech companies should issue stablecoins, Circle is avoiding regulatory uncertainty by strengthening its role as a service and technology partner. The company is deepening integration with trading platforms, building connections, and promoting stablecoin infrastructure. This positions Circle to benefit regardless of which entity eventually issues a won stablecoin. Allaire also noted the potential for a Chinese yuan stablecoin in the next 3–5 years, underscoring a regional trend of stablecoins becoming more regulated and integrated with traditional finance. Ultimately, Circle’s strategy highlights that future influence in the stablecoin market will belong not necessarily to the issuers, but to the foundational infrastructure layers that enable cross-system transactions.

marsbit58 мин. назад

Circle CEO's Seoul Visit: No Korean Won Stablecoin Issuance, But Met All Major Korean Banks

marsbit58 мин. назад

SpaceX Ties Up with Cursor: A High-Stakes AI Gambit of 'Lock First, Acquire Later'

SpaceX has secured an option to acquire AI programming company Cursor for $60 billion, with an alternative clause requiring a $10 billion collaboration fee if the acquisition does not proceed. This structure is not merely a potential acquisition but a strategic move to control core access points in the AI era. The deal is designed as a flexible, dual-path arrangement, allowing SpaceX to either fully acquire Cursor or maintain a binding partnership through high-cost collaboration. This "option-style" approach minimizes immediate regulatory and integration risks while ensuring long-term alignment between the two companies. At its core, the transaction exchanges critical AI-era resources: SpaceX provides its Colossus supercomputing cluster—one of the world’s most powerful AI training infrastructures—while Cursor contributes its AI-native developer environment and strong product adoption. This synergy connects compute power, models, and application layers, forming a closed-loop AI capability stack. Cursor, founded in 2022, has achieved rapid growth with over $1 billion in annual revenue and widespread enterprise adoption. Its value lies in transforming software development through AI agents capable of coding, debugging, and system design—positioning it as a gateway to future software production. For SpaceX, this move is part of a broader strategy to evolve from a aerospace company into an AI infrastructure empire, integrating xAI, supercomputing, and chip manufacturing. Controlling Cursor fills a gap in its developer tooling layer, strengthening its AI narrative ahead of a potential IPO. The deal reflects a shift in AI competition from model superiority to ecosystem and entry-point control. With programming tools as a key battleground, securing developer loyalty becomes crucial for dominating the software production landscape. Risks include questions around Cursor’s valuation, technical integration challenges, and potential regulatory scrutiny. Nevertheless, the deal underscores a strategic bet: controlling both compute and software development access may redefine power dynamics in the AI-driven future.

marsbit1 ч. назад

SpaceX Ties Up with Cursor: A High-Stakes AI Gambit of 'Lock First, Acquire Later'

marsbit1 ч. назад

Торговля

Спот
Фьючерсы

Популярные статьи

Как купить S

Добро пожаловать на HTX.com! Мы сделали приобретение Sonic (S) простым и удобным. Следуйте нашему пошаговому руководству и отправляйтесь в свое крипто-путешествие.Шаг 1: Создайте аккаунт на HTXИспользуйте свой адрес электронной почты или номер телефона, чтобы зарегистрироваться и бесплатно создать аккаунт на HTX. Пройдите удобную регистрацию и откройте для себя весь функционал.Создать аккаунтШаг 2: Перейдите в Купить криптовалюту и выберите свой способ оплатыКредитная/Дебетовая Карта: Используйте свою карту Visa или Mastercard для мгновенной покупки Sonic (S).Баланс: Используйте средства с баланса вашего аккаунта HTX для простой торговли.Третьи Лица: Мы добавили популярные способы оплаты, такие как Google Pay и Apple Pay, для повышения удобства.P2P: Торгуйте напрямую с другими пользователями на HTX.Внебиржевая Торговля (OTC): Мы предлагаем индивидуальные услуги и конкурентоспособные обменные курсы для трейдеров.Шаг 3: Хранение Sonic (S)После приобретения вами Sonic (S) храните их в своем аккаунте на HTX. В качестве альтернативы вы можете отправить их куда-либо с помощью перевода в блокчейне или использовать для торговли с другими криптовалютами.Шаг 4: Торговля Sonic (S)С легкостью торгуйте Sonic (S) на спотовом рынке HTX. Просто зайдите в свой аккаунт, выберите торговую пару, совершайте сделки и следите за ними в режиме реального времени. Мы предлагаем удобный интерфейс как для начинающих, так и для опытных трейдеров.

1.2k просмотров всегоОпубликовано 2025.01.15Обновлено 2025.03.21

Как купить S

Sonic: Обновления под руководством Андре Кронье – новая звезда Layer-1 на фоне спада рынка

Он решает проблемы масштабируемости, совместимости между блокчейнами и стимулов для разработчиков с помощью технологических инноваций.

2.2k просмотров всегоОпубликовано 2025.04.09Обновлено 2025.04.09

Sonic: Обновления под руководством Андре Кронье – новая звезда Layer-1 на фоне спада рынка

HTX Learn: Пройдите обучение по "Sonic" и разделите 1000 USDT

HTX Learn — ваш проводник в мир перспективных проектов, и мы запускаем специальное мероприятие "Учитесь и Зарабатывайте", посвящённое этим проектам. Наше новое направление .

1.8k просмотров всегоОпубликовано 2025.04.10Обновлено 2025.04.10

HTX Learn: Пройдите обучение по "Sonic" и разделите 1000 USDT

Обсуждения

Добро пожаловать в Сообщество HTX. Здесь вы сможете быть в курсе последних новостей о развитии платформы и получить доступ к профессиональной аналитической информации о рынке. Мнения пользователей о цене на S (S) представлены ниже.

活动图片