Security Over Speed: India’s Banks Battle AI Fraud

Security Over Speed: India’s Banks Battle AI Fraud

A single mistaken tap can now move life savings across borders in seconds, and that breathtaking convenience has collided with criminals wielding deepfakes, generative scripts, and automated reconnaissance that probe for weak links faster than incident teams can respond. India’s instant rails and streamlined onboarding delivered scale and inclusion, yet the same velocity has supercharged fraud value even as volumes sometimes fall. Official data captured the pivot: the Reserve Bank of India recorded ₹34,771 crore in fraud value in 2024–25, and April–September 2025 alone saw ₹21,515 crore in reported frauds—roughly a 30% year-over-year rise in value despite fewer cases. Parliament figures added breadth to the picture, with about 2.4 million digital fraud cases totaling more than ₹4,200 crore in the first ten months of 2025. The takeaway is plain: adversaries have become selective, coordinated, and AI-enabled, trading mass spam for high-impact strikes and rapid laundering.

The New Fraud Math: Fewer Cases, Bigger Losses

India’s stack—anchored by UPI’s instant transfers and paper-light account opening—recalibrated the economics of crime. Generative models now tailor lures to dialect and context, while deepfake audio convincingly mimics bank agents, police, or a relative in distress. A “Mythos”-style class of vulnerability-hunting models shifts reconnaissance from manual sifting to machine-driven scans, compressing days of work into minutes and revealing seams in apps, APIs, and KYC flows. This tooling enables surgical operations: compromised devices seeded with remote access tools, synthetic borrowers that pass superficial checks, and mule networks primed to dissipate funds across wallets and micro-accounts. The result is not simply bigger frauds; it is faster frauds, with timelines so compressed that traditional post-transaction controls arrive too late to matter.

Building on that, attackers moved from opportunism to orchestration. Stolen identity fragments are fused into convincing composites that sidestep naive verification, while social graphs mined from breached datasets increase hit rates on high-value targets. Campaigns chain techniques—pretext calls, spoofed portals, and SIM swaps—so that each success widens the next opening. Banks face adversaries that now mimic disciplined enterprises: playbooks for “digital arrest” coercion calls, ticketing systems to manage mules, and scripts to split transfers across intervals that dodge alert thresholds. Even where fraud counts decline, average ticket size climbs because operators favor quality over quantity. This inversion of risk challenges operations designed for scattershot scams, forcing a pivot toward pre-emptive, context-aware controls that assume the attacker has already passed first contact.

Courts and Regulators Turn Up the Heat

Judicial patience has thinned. The Supreme Court, citing losses above ₹54,000 crore, criticized delays in detecting fraud and chastised banks for fragile safeguards, reminding them that depositors’ money is held in trust. That stance emboldened supervisors. The RBI is weighing a one-hour cooling-off period for digital transfers above ₹10,000, a blunt but clear signal that high-value flows warrant time for second looks, callbacks, or automated stop-lists. Skeptics warn of friction and failed purchases, yet the policy aims at the crux of modern theft: once funds are layered across accounts and prepaid instruments, recoveries collapse. A narrow, risk-calibrated hold is a pressure valve, buying minutes when minutes matter most. It also invites better triage, letting banks enrich alerts with device fingerprints and session telemetry before irrevocable settlement.

Policy attention has widened beyond holds. Supervisors have pressed for unified fraud-and-AML operations, quicker interbank freeze protocols, and standard formats for suspect transaction alerts that can travel across lenders in real time. Draft guidance has emphasized model governance—documentation, fairness testing, and audit trails—anticipating court scrutiny when customers contest blocked payments. That legal context matters: black-box models may perform, but they struggle in litigation without reason codes that a consumer, ombudsman, or judge can understand. Meanwhile, inclusion goals endure. Regulators stress that controls must not choke low-risk flows, especially small-value UPI payments that drive everyday commerce. Expect tiering by risk score and profile: heavy friction when anomalies spike, and near-instant settlement for routine behavior, a compromise that defends trust without stalling economic activity.

What Will Actually Work: Layered, Real-Time, Explainable

Banks are converging on layered defenses that degrade attacker advantage at each step. Device intelligence spots rooted phones, emulator traces, and suspicious OS artifacts. Behavioral biometrics learn a customer’s typing cadence, swipe pressure, and gyroscope patterns to flag session takeovers without asking for one-time passwords that can be phished. Stronger identity proofing adds passive liveness checks and deepfake detection at onboarding and during sensitive changes. Above that, anomaly scoring evaluates context—merchant category, time of day, beneficiary history, and geolocation drift—so that unusual behavior triggers step-up verification or a just-in-time hold. Crucially, these models must be interpretable. Feature importance, counterfactual explanations, and post-hoc reason codes enable compliance reviews and speed customer redress, striking a balance between accuracy and accountability.

Defense must also move at wire speed. Real-time interdiction tools initiate hold-and-call workflows within seconds when risk crosses thresholds, coordinating across banks through shared watchlists and standardized freeze instructions. Recoveries improve when flagged funds can be quarantined across counterparties before they hit mule exit ramps. A “Unified Risk View” brings fraud and AML into the same graph, revealing networks rather than isolated alerts: mule clusters, money-flow motifs, and high-risk devices that appear across multiple accounts. Human teams remain central. War rooms run playbooks for “digital arrest” cases, auto-dialing customers with a scripted safety check before release. Post-incident reviews feed data back into models, while tabletop exercises test response speed. The combination—layered tech, shared signals, and trained responders—reduced false positives, shortened dwell time, and pushed detection further left in the kill chain.

Recalibrating Speed and Inclusion

Speed and inclusion were strengths, yet they also enabled money mules and rapid dissipation of stolen funds. The corrective path favored precision friction: cooling-off periods for high-value or high-risk transfers, adaptive step-ups when session context changes, and soft nudges—plain-language warnings that explain tactics such as “digital arrest” or beneficiary name mismatch before confirmation. To blunt threshold gaming, banks tuned models to detect structuring patterns, linking multiple sub-₹10,000 payments into a single risk event. Consumer protection moved closer to the point of risk with clearer in-app visuals, time-bound cancellation windows, and immediate escalation buttons that route to fraud desks rather than generic call trees. Inclusion was preserved by exempting trusted beneficiaries after sustained clean history, keeping routine payments nearly instant.

The next steps were actionable. Institutions prioritized joint drills with law enforcement to speed data requests during the first hour of a heist. Industry utilities expanded shared device and mule registries, augmenting them with explainable risk scores that member banks could embed at payment initiation. Model governance practices were strengthened: version control, challenger models, bias testing across regions and languages, and human sign-off for material rule changes. On the policy front, tiered controls were piloted with public reporting on latency, false positives, and fraud savings, allowing evidence-led calibration rather than blanket rules. Above all, the system accepted that some friction at the edge had protected many at the core. Security, not sheer velocity, set the tone for high-stakes flows, and that shift preserved trust while keeping everyday digital finance fast where it could be and cautious where it had to be.

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later