When the World Economic Forum classifies cyber fraud and identity theft as top global risks, it signals more than rising cases. It signals a structural shift.
Fraud is no longer a side issue. It is now part of the digital economy’s operating environment.
In the Endgame Podcast with Gita Wirjawan, Niki Luhur, Founder and Group CEO of VIDA, reframed the problem clearly: “Fraud is no longer isolated. It is organized, scalable, and technology-enabled.”
Backed by insights from the VIDA 2026 SEA Digital Identity Fraud Outlook, fraud today behaves like a system, not an incident.
Fraud No Longer Looks Like Crime, It Looks Like Industry
Fraud today operates with structure:
- Repeatable workflows
- Shared tools and infrastructure
- Coordinated campaigns across targets
Attacks are no longer standalone. They are designed sequences, combining stolen credentials, compromised devices, manipulated biometrics, and social engineering pressure.
Fraud now resembles “a production system optimized for speed and repeatability.” Even more concerning, Southeast Asia has seen the rise of organized scam operations that function like industrial facilities.
Awareness Campaigns Are Losing the Battle
For years, fraud prevention relied on user awareness:
- Don’t share OTP
- Don’t click on unknown links
- Stay cautious
But the data tells a different story, from Where's The Fraud: The State of Authentication and Account Takeovers in Indonesia: 84% of businesses report SMS OTP-related incidents and account takeover fraud surged 150% globally.
If the same method keeps failing, the issue is no longer awareness. It is an outdated infrastructure. If a system is repeatedly exploited at scale, it is no longer a user problem, it is a system problem.
Fraud Follows Liquidity, Not Opportunity
Fraud is not random. It is timed. VIDA’s findings show fraud spikes during:
- Payday cycles
- Bonus disbursement periods
- Ramadan and THR
Fraud concentrates around moments of liquidity and trust, when users expect transactions and notifications. Why this works because users expect financial activity, urgency feels legitimate, and suspicision drops. At this moment, fraud doesn’t chase users. It anticipates behavior.
Fake BTS Exploits Trust in Digital Communication
Modern fraud no longer depends on obvious phishing. Attackers now exploit telecom infrastructure itself, including:
- Fake BTS, rogue signal towers
- Spoofed sender IDs
- Injection into legitimate message threads
The result is messages appear to come from trusted institutions, within real communication channels. Trust is no longer broken externally. It is manipulated internally.
The Biggest Blind Spot: Static Security
Many organizations believe security is a one-time implementation. Regulators are strengthening laws, but security standards cannot remain static while fraud techniques scale.
Niki highlighted a common blind spot among institutions: “The biggest blind spot is when companies believe they are already secure because they’ve implemented a piece of software once. And to think that you can have one and done silver bullet solution deployed one time and you’re good forever is a big blind spot.”
Static defenses age rapidly in a system where attackers continuously learn. Meanwhile, many businesses still rely on passwords, SMS OTP, and fragmented verification systems.
Defense Must Evolve as Fast as Fraud
Fraud is layered. Defense must be too. Effective protection requires integration across:
- Device trust
- Biometric verification
- Liveness detection
- Behavioral intelligence
- Fraud analytics
Fraud prevention can be seen not as separate tools, but as a single adaptive system. The shift is clear: Security is no longer about preventing attacks. It is about raising attacker cost and reducing scalability.