The financial services industry has become a primary target for highly sophisticated and persistent cyberattacks, increasingly powered by Artificial Intelligence (AI). A new "State of the Internet" report from Akamai reveals that threat actors are moving beyond simple nuisance attacks to what is described as a "sustained siege" against financial institutions. Key findings highlight the rise of AI-empowered botnets capable of autonomous and rapid attacks, the exploitation of API visibility gaps created by digital transformation, and an overall escalation in the persistence of Distributed Denial-of-Service (DDoS) campaigns. The report serves as a stark warning that as the industry adopts new technologies, its attack surface is widening, and adversaries are leveraging AI to exploit these new weaknesses with unprecedented efficiency.
The report outlines a strategic shift in how cybercriminals are targeting the financial sector. The core threats identified are:
The trends identified in the report point to a new level of sophistication in attacks against the financial sector.
T1498 - Network Denial of Service: The core technique for DDoS attacks, now being enhanced with AI.T1190 - Exploit Public-Facing Application: Represents the targeting of vulnerable APIs.T1566 - Phishing: A key component of APP fraud, enhanced by AI-driven content generation.T1580 - Cloud Infrastructure Discovery: Attackers use automated tools to discover and map an organization's cloud and API footprint.The escalation of these threats poses a systemic risk to the financial industry.
As this is a trend report, no specific Indicators of Compromise were provided.
The report emphasizes that fighting AI-powered attacks requires AI-powered defenses.
Deploy advanced NIPS and DDoS mitigation solutions that use behavioral analysis to detect and block sophisticated attacks.
Implement robust security configurations for APIs, including strong authentication, authorization, and rate limiting.
Train employees and customers to recognize and report sophisticated phishing and social engineering attempts used in APP fraud.
Utilize AI-driven behavior analysis tools to detect fraudulent transactions and anomalous user activity in real-time.
To combat the AI-powered DDoS attacks described by Akamai, financial institutions must adopt advanced Network Traffic Analysis that goes beyond simple volume metrics. This involves deploying AI-driven DDoS mitigation services that can perform real-time behavioral analysis of incoming traffic. These systems baseline normal traffic patterns and can distinguish the subtle signatures of sophisticated botnets from legitimate user traffic. For example, they can analyze TLS handshakes (JA3), HTTP headers, and request rates to identify and block malicious bots, even when they are part of a large, distributed network. This AI-vs-AI approach is essential to parry attacks that dynamically shift vectors to find weaknesses in traditional, static defenses.
To defend against the API-focused attacks mentioned in the report, Web Session Activity Analysis is critical. Financial institutions must deploy dedicated API security solutions that monitor the full lifecycle of API calls. These tools establish a baseline for normal API usage for each user and function, then use machine learning to detect anomalies. This includes flagging attempts to exploit BOLA (e.g., a user trying to access another user's account by changing an ID in the URL), unusual sequences of API calls, or abnormally large data payloads in API responses. By analyzing the behavior of API consumers, these systems can detect attacks that would be invisible to traditional firewalls, providing essential protection for the open banking and mobile application ecosystem.
To combat sophisticated threats like Authorized Push Payment (APP) fraud, Job Function Access Pattern Analysis (or its customer-facing equivalent) is key. Banks should use AI to build a behavioral profile for each customer, including typical transaction amounts, recipients, geographic locations, and times of day. When a payment request is initiated that deviates significantly from this established pattern—for example, a large transfer to a new beneficiary at 3 AM—the system can flag it for additional verification. This could involve stepping up authentication with a call or a biometric check. This AI-driven analysis acts as a safety net, detecting socially engineered payments that the user themselves believes to be legitimate, directly countering the effectiveness of AI-enhanced phishing and fraud campaigns.
Akamai's 'State of the Internet' report is published, highlighting the growing threat of AI-powered attacks against the financial sector.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.