Table of Contents
FBI 2025 Cybercrime Losses reached a record $20.9 billion, marking the first time reported damages exceeded $20 billion, according to the Federal Bureau of Investigation Internet Crime Complaint Center (IC3).
The agency logged over one million complaints, a 17% increase year-over-year, signaling both rising cyber threats and improved reporting rates. Artificial intelligence played a central role in scaling fraud operations.
Investment scams, phishing, and AI-enabled impersonation attacks drove the surge, with older adults suffering the highest financial impact across all demographics.
FBI 2025 Cybercrime Losses: What You Need to Know
- Cybercrime losses hit $20.9 billion in 2025, driven by AI-powered fraud, cryptocurrency scams, and large-scale phishing campaigns.
Recommended Cybersecurity Offers
– Stop breaches fast with CrowdStrike Falcon endpoint protection.
– Block malware and ransomware with Bitdefender GravityZone.
– Secure credentials with 1Password Business and phishing‑resistant MFA.
Investment Fraud Dominates Cybercrime Losses
Investment fraud accounted for $8.6 billion in losses, making it the most financially damaging category within the FBI 2025 Cybercrime Losses data. Criminal networks deployed highly targeted campaigns using stolen personal data and behavioral profiling.
Fraudsters built convincing investment narratives, often promoting fake cryptocurrency platforms with fabricated dashboards and falsified returns. Victims were guided through seemingly legitimate onboarding processes, including customer support interactions and staged testimonials.
Cryptocurrency-enabled fraud proved particularly effective due to irreversible transactions and limited regulatory oversight. These schemes demonstrate a shift from opportunistic scams to structured, enterprise-level fraud operations.
The $8.6 billion figure represents a concentrated transfer of wealth from individual investors to organized criminal enterprises, demonstrating how cyber-enabled fraud has evolved beyond opportunistic attacks into systematic wealth extraction operations targeting Americans’ financial security.
Phishing Attacks Maintain Dominance
Phishing led all complaint categories with 191,561 reports submitted to the IC3 theregister, maintaining its position as the most prevalent attack vector despite widespread awareness campaigns. Criminals refined their social engineering techniques, crafting messages that bypassed traditional detection systems while exploiting human psychology.
Phishing remained the most reported cybercrime, with 191,561 complaints submitted to IC3. Attackers refined social engineering tactics, leveraging AI-generated content to evade detection systems and increase engagement rates.
Modern phishing campaigns go beyond email. Threat actors impersonate financial institutions, government agencies, and SaaS providers using multi-channel approaches, including SMS (smishing) and voice calls (vishing).
These attacks exploit urgency and authority, forcing victims into rapid decision-making. Despite advancements in email security protocols like DMARC and SPF, human error continues to drive compromise rates.
Ransomware and Exploited Vulnerabilities Expand Attack Surface
Ransomware operations evolved significantly in 2025, with threat actors adopting double and triple extortion models. Attackers exfiltrate data before encryption, increasing pressure on victims to pay.
Many campaigns exploit known vulnerabilities with high CVSS scores, particularly in edge devices and remote access solutions. For example, flaws similar to CVE-2023-34362 (MOVEit Transfer) demonstrate how unpatched systems enable large-scale data breaches.
Ransomware-as-a-Service (RaaS) ecosystems continue to lower entry barriers, enabling affiliates to deploy sophisticated payloads with minimal technical expertise
Artificial Intelligence Transforms Fraud Landscape
Artificial intelligence technology enables criminals to create convincing synthetic content, including social media profiles, personalized conversations, and mass-produced scam campaigns.
The widespread availability of AI tools democratized capabilities previously requiring significant technical expertise, allowing small-time scammers to execute sophisticated operations.
Artificial intelligence has fundamentally altered the cybercrime landscape. Tools such as generative AI models enable attackers to produce highly convincing phishing emails, deepfake videos, and cloned voice messages at scale.
Voice synthesis technology has amplified scams such as:
- Grandparent scams: AI-generated distress calls impersonating relatives
- Executive fraud: Real-time voice cloning to authorize financial transfers
- Romance scams: Personalized conversations sustained over long periods
The IC3 recorded over $893 million in AI-related losses, though underreporting remains likely. Analysts note that many victims are unaware AI was used in their exploitation.
Business Email Compromise Persists
Business Email Compromise ranked among the top financial loss categories despite receiving fewer complaints than phishing attacks. BEC schemes target organizations through compromised email accounts, fraudulent wire transfer requests, and impersonation of executives or vendors.
AI-powered BEC attacks showed disproportionate financial returns compared to complaint volume, suggesting criminals achieved higher success rates when deploying machine learning tools.
The technology enabled real-time conversation simulation, allowing attackers to engage targets dynamically rather than relying on static templates.
Corporate finance departments faced escalating pressure as criminals refined their understanding of business processes, payment systems, and organizational hierarchies. Successful BEC attacks often exploited gaps in verification procedures during high-pressure situations or personnel transitions.
Seniors Bear Disproportionate Burden
Americans over age 60 suffered $7.7 billion in cybercrime losses, representing a 37 percent year-over-year increase. This demographic’s accumulated savings, combined with lower familiarity with emerging scam tactics, created ideal conditions for exploitation.
This demographic remains a primary target due to accumulated wealth and lower familiarity with evolving digital threats.
Scammers exploit trust, authority, and emotional triggers through:
- Romance scams
- Investment fraud schemes
- Technical support impersonation
The data underscores the need for targeted awareness and protective measures tailored to vulnerable populations.
Cyber-Enabled Fraud Dominates Threat Landscape
Cyber-enabled fraud represented 85% of total financial losses despite accounting for fewer complaints. This category includes digitally facilitated versions of traditional scams, such as confidence fraud and impersonation schemes.

Organized criminal groups now operate fraud-as-a-service ecosystems, providing infrastructure and laundering channels. These operations prioritize high-value targets over mass exploitation, maximizing return on investment.
Traditional hacking incidents, including system intrusions and data breaches, now represent a smaller portion of overall financial impact.
Government Impersonation Scams Surge
Government impersonation scams increased sharply, with complaints rising from 14,190 in 2023 to 32,424 in 2025. Attackers pose as law enforcement, tax authorities, or regulatory agencies to extract payments or sensitive data.
The FBI warned that AI-generated voice messages are being used to impersonate senior officials, targeting both government personnel and civilians. These attacks exploit institutional trust and perceived authority.
Such campaigns demonstrate how threat actors adapt social engineering techniques to exploit public confidence in official institutions.
Implications for Cybersecurity and Fraud Prevention
The rise in FBI 2025 Cybercrime Losses highlights both progress and persistent gaps in cybersecurity. Increased reporting improves visibility into threat patterns, enabling law enforcement to identify trends and allocate resources more effectively.
However, financial losses continue to escalate despite awareness efforts. AI-driven personalization allows attackers to bypass traditional detection and exploit human vulnerabilities at scale. Recovery remains difficult due to cryptocurrency’s irreversible nature and cross-border jurisdiction challenges.
The rapid adoption of AI by cybercriminals creates an asymmetric threat environment. Defensive technologies struggle to keep pace, raising concerns about long-term resilience and the sustainability of current cybersecurity strategies.
Boost Your Security Stack
– Continuous exposure management with Tenable One and Nessus Expert.
– Simplify network monitoring via Auvik.
– Secure file collaboration with Tresorit.
– Centralize passwords with Passpack.
– Remove exposed PII using Optery.
Conclusion
The FBI cybercrime losses 2025 milestone reflects a turning point in the threat landscape. Financially motivated attacks are becoming more automated, targeted, and difficult to detect.
AI and cryptocurrency technologies, while beneficial, have introduced new attack vectors that cybercriminals exploit at scale. This dual-use nature complicates mitigation strategies for defenders.
Sustained investment in cybersecurity frameworks, user awareness, and regulatory oversight remains essential. Without coordinated action, financial losses are likely to continue rising in the coming years.
Questions Worth Answering
What caused the spike in cybercrime losses in 2025?
- The increase was driven by AI-powered scams, cryptocurrency fraud, and advanced social engineering techniques.
How much did cybercrime cost in 2025?
- Reported losses reached approximately £21 billion ($26 billion), according to FBI IC3 data.
What is Business Email Compromise (BEC)?
- It is a fraud scheme where attackers impersonate executives or vendors to redirect payments.
Why are cryptocurrency scams so effective?
- They exploit anonymity, lack of regulation, and irreversible transactions on blockchain networks.
How is AI used in cybercrime?
- Attackers use AI for phishing, deepfakes, voice cloning, and automated fraud campaigns.
Are ransomware attacks still increasing?
- Yes, ransomware groups are expanding operations using double extortion and RaaS models.
About the FBI Internet Crime Complaint Center
The Federal Bureau of Investigation is the United States’ primary federal law enforcement agency responsible for domestic intelligence and security. It investigates cybercrime, terrorism, and financial fraud.
Through its Internet Crime Complaint Center (IC3), the FBI collects and analyzes cybercrime reports from the public and private sectors. The platform serves as a central hub for threat intelligence and incident tracking.
The FBI collaborates globally with law enforcement agencies and private organizations to disrupt cybercriminal networks and improve cybersecurity resilience.
Fortify your defenses now. Try Bitdefender, secure sharing with Tresorit, accelerate detection with CrowdStrike, and audit exposures via Tenable.