Phone : +91 95 8290 7788 | Email : sales@itmonteur.net

Register & Request Quote | Submit Support Ticket

Home » Cyber Security News » 48% enterprises flag mule networks as top fraud threat, ETCISO

48% enterprises flag mule networks as top fraud threat, ETCISO

48% enterprises flag mule networks as top fraud threat, ETCISO

Bureau’s India Fraud Report 2026 points to a major shift in how fraud is being executed across India’s digital economy. With fraud losses in the banking sector rising to ₹36,014 crore, the report says fraud operations are becoming faster, more organized and increasingly industrialized, using real-time payments, instant onboarding and interconnected digital platforms to scale attacks.

One of the report’s key findings is the growing role of mule networks. Around 48% of Indian enterprises identified mule networks as the most difficult fraud threat to detect and control, ahead of phishing, synthetic identities, account takeover and social engineering. These networks are designed to appear legitimate while distributing funds across clusters of connected accounts, making them difficult to identify without cross-platform visibility.

The report also highlights rising pressure on risk teams. About 58% of organizations identified false positives as their main risk, suggesting that teams are spending significant time investigating legitimate users while more sophisticated threats go undetected.

Identity emerged as a major entry point for fraud in 2025, with fragmented and reusable identity data being misused at scale. This has made it harder for organizations to distinguish genuine users from fraudsters. The challenge is being intensified by AI tools that can generate realistic fake images, documents and identities capable of bypassing traditional verification systems.

The report also notes that fraud has become more accessible and scalable through fraud-as-a-service models. Toolkits available on the dark web now offer access to stolen personal data, malicious APIs and ready-made scam scripts, lowering the barrier for fraud operations.

On compliance, the report says only 20% of organizations treat compliance as a strategic tool that strengthens detection and supports proactive risk investment. Half of the organizations surveyed still see it mainly as an obligation or a safeguard against reputational or regulatory fallout.

The report argues that isolated fraud controls are no longer sufficient, as fraud now moves across networks and enterprises. It says risk teams need detection systems that combine device, behavioural and contextual intelligence across platforms. It also points to graph analysis as a way to map relationships between identities, devices and transactions to uncover coordinated fraud activity that may appear legitimate in isolation.

  • Published On Mar 28, 2026 at 08:55 AM IST

Join the community of 2M+ industry professionals.

Subscribe to Newsletter to get latest insights & analysis in your inbox.

All about ETCISO industry right on your smartphone!




Information Security - InfoSec - Cyber Security - Firewall Providers Company in India

 

 

 

 

 

 

 

 

 

 

 

 

What is Firewall? A Firewall is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies. At its most basic, a firewall is essentially the barrier that sits between a private internal network and the public Internet.

 

Secure your network at the gateway against threats such as intrusions, Viruses, Spyware, Worms, Trojans, Adware, Keyloggers, Malicious Mobile Code (MMC), and other dangerous applications for total protection in a convenient, affordable subscription-based service. Modern threats like web-based malware attacks, targeted attacks, application-layer attacks, and more have had a significantly negative effect on the threat landscape. In fact, more than 80% of all new malware and intrusion attempts are exploiting weaknesses in applications, as opposed to weaknesses in networking components and services. Stateful firewalls with simple packet filtering capabilities were efficient blocking unwanted applications as most applications met the port-protocol expectations. Administrators could promptly prevent an unsafe application from being accessed by users by blocking the associated ports and protocols.

 

Firewall Firm is an IT Monteur Firewall Company provides Managed Firewall Support, Firewall providers , Firewall Security Service Provider, Network Security Services, Firewall Solutions India , New Delhi - India's capital territory , Mumbai - Bombay , Kolkata - Calcutta , Chennai - Madras , Bangaluru - Bangalore , Bhubaneswar, Ahmedabad, Hyderabad, Pune, Surat, Jaipur, Firewall Service Providers in India

Sales Number : +91 95 8290 7788 | Support Number : +91 94 8585 7788
Sales Email : sales@itmonteur.net | Support Email : support@itmonteur.net

Register & Request Quote | Submit Support Ticket