14 AI-driven tax scams CFOs need to watch this season
Discover 14 real-world AI-driven tax scams targeting U.S. finance teams this season—what they look like, how they work, and how to stop them in action.
Hackers breached multiple Australian superannuation funds in a coordinated credential-stuffing attack. They targeted retiree accounts and exposed vulnerabilities in internal controls.
At least five major funds were affected, including AustralianSuper, Rest, Hostplus, and the Australian Retirement Trust. AustralianSuper confirmed that 600 accounts were compromised. Four members lost $500,000. Rest reported 8,000 affected accounts, though no money was stolen.
The attackers focused on pension drawdown accounts. These allow lump-sum withdrawals, making them attractive targets when oversight is minimal.
The attackers used credentials leaked in previous breaches. By automating login attempts, they accessed accounts with reused passwords and minimal two-factor authentication.
Many funds still rely on SMS verification. Cybersecurity experts warn that this method is outdated and vulnerable to interception or SIM-swapping.
This wasn’t a complex breach. It highlights the need to strengthen basic identity and transaction-level controls.
Cyber incidents may originate in IT systems, but their impact often extends into finance operations. This breach revealed how gaps in financial processes—like change verification and transaction oversight—can become critical vulnerabilities.
In many cases, unusual login behavior wasn’t surfaced in time. Payment workflows lacked the extra layers needed to escalate or pause suspicious activity before funds were released.
For finance teams, this raises important questions:
Who owns the integrity of our payment processes?
How do we verify changes to critical data?
Are our controls designed to detect issues in real time, or only after the fact?
Relying on call-backs or staff-led verifications introduces lag and the risk of human error. These methods often can’t scale or adapt to coordinated attacks.
Modern finance operations benefit from stronger control environments: real-time validation of changes, automated risk alerts, and continuous monitoring across the payment lifecycle.
These aren’t just cybersecurity tools. They’re foundational to sound financial governance.
Australian authorities are coordinating a national response. Funds are locking accounts, reviewing procedures, and alerting members. But prevention starts inside the business.
Here’s what finance and risk leaders should consider:
Audit authentication methods. Move beyond SMS-based MFA to more resilient solutions.
Review how your team validates changes to banking or supplier information.
Test escalation workflows for high-risk transactions.
Ensure real-time oversight, not just periodic reviews.
Communicate clearly with internal teams and external partners about updated processes.
The next attack may look different—but it will likely exploit the same types of gaps if left unaddressed.
This breach is a reminder that fraud threats are evolving—but so can your controls. With the right systems and safeguards, finance teams can stay ahead of risk, protect payments, and build trust in every transaction.
Discover 14 real-world AI-driven tax scams targeting U.S. finance teams this season—what they look like, how they work, and how to stop them in action.
TOGA’s data breach highlights growing cyber risks for finance teams. Learn what Akira’s ransomware attack means for your third-party exposure.
If there’s one lesson out of the Medibank that should be clear to all CFOs by now, it’s this: the cost of …
End-to-end B2B payment protection software to mitigate the risk of payment error, fraud and cyber-crime.