New Akamai Report Finds Financial Services Targeted by AI-Empowered Botnets and Sustained DDoS Campaigns

Akamai Report: Financial Sector Under Siege from AI-Powered Botnets and Escalating DDoS Attacks

INFORMATIONAL
May 24, 2026
5m read
Threat IntelligenceCyberattackPolicy and Compliance

Related Entities

Organizations

Other

Steve WinterfeldMartin Rehak

Full Report

Executive Summary

The financial services industry has become a primary target for highly sophisticated and persistent cyberattacks, increasingly powered by Artificial Intelligence (AI). A new "State of the Internet" report from Akamai reveals that threat actors are moving beyond simple nuisance attacks to what is described as a "sustained siege" against financial institutions. Key findings highlight the rise of AI-empowered botnets capable of autonomous and rapid attacks, the exploitation of API visibility gaps created by digital transformation, and an overall escalation in the persistence of Distributed Denial-of-Service (DDoS) campaigns. The report serves as a stark warning that as the industry adopts new technologies, its attack surface is widening, and adversaries are leveraging AI to exploit these new weaknesses with unprecedented efficiency.

Threat Overview

The report outlines a strategic shift in how cybercriminals are targeting the financial sector. The core threats identified are:

  • AI-Empowered Botnets: Traditional botnets required direct command-and-control. New AI-driven botnets can operate more autonomously, adapting their attack methods in real-time to bypass defenses. They can execute complex, multi-stage attacks at a scale and speed that is difficult for human-led security teams to counter.
  • Escalating DDoS Attacks: Attacks are no longer just about overwhelming a server with traffic. They are becoming more persistent and targeted, aiming to disrupt specific services, exploit application-layer vulnerabilities, and create smokescreens for other malicious activities like data theft or fraudulent transactions.
  • API Vulnerabilities: The rapid adoption of APIs for mobile banking, open banking, and internal services has created a new, often poorly monitored, attack surface. Attackers are actively targeting these APIs to bypass traditional security perimeters and access sensitive data or functionality directly.
  • Authorized Push Payment (APP) Fraud: This type of fraud, where a customer is tricked into sending money to an attacker-controlled account, is becoming more sophisticated through the use of AI for social engineering and credential harvesting.

Technical Analysis

The trends identified in the report point to a new level of sophistication in attacks against the financial sector.

  • AI in Attacks: AI is being used to:
    • Optimize DDoS Traffic: AI can analyze a target's defenses and dynamically change attack vectors (e.g., switching protocols, source IPs, traffic patterns) to maximize impact and evade mitigation.
    • Automate Vulnerability Discovery: AI-powered tools can scan for and identify vulnerabilities in web applications and APIs much faster than manual methods.
    • Enhance Social Engineering: AI can generate highly convincing phishing emails, text messages, and even deepfake voice calls to manipulate victims in APP fraud schemes.
  • API Attack Vectors: Common API attacks include Broken Object Level Authorization (BOLA), where an attacker manipulates an API call to access data they are not authorized for, and credential stuffing attacks against API authentication endpoints.

MITRE ATT&CK Techniques

Impact Assessment

The escalation of these threats poses a systemic risk to the financial industry.

  • Financial Losses: Successful attacks can lead to direct financial losses through fraud, theft, and the cost of remediation. The disruption caused by a sustained DDoS attack can also lead to significant revenue loss.
  • Regulatory Scrutiny: Financial institutions are heavily regulated. A major incident can lead to severe fines, increased regulatory oversight, and legal action.
  • Loss of Customer Trust: Trust is the cornerstone of the financial industry. A significant breach or service disruption can cause irreparable damage to a bank's reputation, leading to customer attrition.
  • Systemic Risk: A successful, large-scale attack on a major financial institution or a critical financial market infrastructure could have cascading effects throughout the global economy.

IOCs — Directly from Articles

As this is a trend report, no specific Indicators of Compromise were provided.

Detection & Response

The report emphasizes that fighting AI-powered attacks requires AI-powered defenses.

  • Detection: Financial institutions need to move beyond signature-based detection. This requires:
    • Behavioral Analysis: Use UEBA and network traffic analysis to baseline normal activity and detect anomalies indicative of an AI-driven attack.
    • AI-Powered WAFs and API Security: Deploy security tools that use machine learning to detect and block sophisticated attacks against web applications and APIs in real-time.
    • DDoS Mitigation: Utilize cloud-based DDoS mitigation services that can absorb large-scale attacks and use AI to distinguish between human and bot traffic.
  • Response: Develop automated response playbooks (SOAR) that can react to threats at machine speed, such as automatically blocking malicious IPs or isolating compromised systems.

Mitigation

  • Adopt Defensive AI: As stated by Martin Rehak, CEO of Resistant AI, using AI for fraud prevention and security is now "essential, not optional." This includes deploying AI-driven tools for transaction monitoring, identity verification, and threat detection.
  • Comprehensive API Security: Implement a dedicated API security strategy that includes discovery (maintaining an inventory of all APIs), testing (regularly scanning for vulnerabilities), and runtime protection (using an API gateway or WAF).
  • Zero Trust Architecture: Move towards a Zero Trust model where no user or service is trusted by default. This involves enforcing strict access controls, micro-segmentation, and continuous verification for all requests.
  • Threat Intelligence: Proactively consume and integrate threat intelligence to stay ahead of evolving attacker TTPs, especially those involving AI.

Timeline of Events

1
May 23, 2026
Akamai's 'State of the Internet' report is published, highlighting the growing threat of AI-powered attacks against the financial sector.
2
May 24, 2026
This article was published

MITRE ATT&CK Mitigations

Deploy advanced NIPS and DDoS mitigation solutions that use behavioral analysis to detect and block sophisticated attacks.

Implement robust security configurations for APIs, including strong authentication, authorization, and rate limiting.

Train employees and customers to recognize and report sophisticated phishing and social engineering attempts used in APP fraud.

Utilize AI-driven behavior analysis tools to detect fraudulent transactions and anomalous user activity in real-time.

D3FEND Defensive Countermeasures

To combat the AI-powered DDoS attacks described by Akamai, financial institutions must adopt advanced Network Traffic Analysis that goes beyond simple volume metrics. This involves deploying AI-driven DDoS mitigation services that can perform real-time behavioral analysis of incoming traffic. These systems baseline normal traffic patterns and can distinguish the subtle signatures of sophisticated botnets from legitimate user traffic. For example, they can analyze TLS handshakes (JA3), HTTP headers, and request rates to identify and block malicious bots, even when they are part of a large, distributed network. This AI-vs-AI approach is essential to parry attacks that dynamically shift vectors to find weaknesses in traditional, static defenses.

To defend against the API-focused attacks mentioned in the report, Web Session Activity Analysis is critical. Financial institutions must deploy dedicated API security solutions that monitor the full lifecycle of API calls. These tools establish a baseline for normal API usage for each user and function, then use machine learning to detect anomalies. This includes flagging attempts to exploit BOLA (e.g., a user trying to access another user's account by changing an ID in the URL), unusual sequences of API calls, or abnormally large data payloads in API responses. By analyzing the behavior of API consumers, these systems can detect attacks that would be invisible to traditional firewalls, providing essential protection for the open banking and mobile application ecosystem.

To combat sophisticated threats like Authorized Push Payment (APP) fraud, Job Function Access Pattern Analysis (or its customer-facing equivalent) is key. Banks should use AI to build a behavioral profile for each customer, including typical transaction amounts, recipients, geographic locations, and times of day. When a payment request is initiated that deviates significantly from this established pattern—for example, a large transfer to a new beneficiary at 3 AM—the system can flag it for additional verification. This could involve stepping up authentication with a call or a biometric check. This AI-driven analysis acts as a safety net, detecting socially engineered payments that the user themselves believes to be legitimate, directly countering the effectiveness of AI-enhanced phishing and fraud campaigns.

Timeline of Events

1
May 23, 2026

Akamai's 'State of the Internet' report is published, highlighting the growing threat of AI-powered attacks against the financial sector.

Sources & References

This Week's Top Five Stories in Cyber
Cyber Magazine (cybermagazine.com) May 23, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

AkamaiThreat IntelligenceAIBotnetDDoSFinancial ServicesAPI Security

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.