Estimate your AI wire fraud exposure
Model the financial impact of fake CFO calls, voice clone approvals, video-based pressure, and payment verification gaps before money leaves the business.
AI wire fraud is no longer limited to suspicious emails. Attackers can now use cloned voices, synthetic video, and live social engineering to pressure finance teams into approving transfers. Use this calculator to estimate your annual exposure from wire activity, authorization workflows, control gaps, and verification overhead.
Company profile
Wire activity
Typical outbound wires sent on a normal business day.
Authorization channels
How are outbound wires commonly authorized or escalated? Select all that apply.
Controls
Recent signals
Verification cost
Send this link to a colleague — it loads the calculator with the same values you entered.
Modeled range: $148K – $520K
- Modeled attempts / yr
- 27.0
- Expected successful incidents
- 3.67
- Expected loss / incident
- $100K
- Annual verification cost
- $35K
- Severe gaps in authorization controls
- Vulnerability to deepfake live audio/video
Illustrative estimates based on public reporting, government data, and modeling assumptions. Not financial, legal, or security advice.
Detailed risk report
Request a Diopter risk test above and a team member will follow up with a more detailed risk report tailored to your organization, as well as work to schedule an authorized voice and video impersonation simulation.
How we model AI wire fraud exposure.
We start from your annual outbound wire volume (wires per business day × 250) and apply an industry attempt rate informed by FBI IC3, FinCEN, and Verizon DBIR reporting. That attempt rate is then adjusted for the channels you authorize wires through, payment urgency, and any social engineering signals you've already seen.
Success probability starts at a conservative base and is multiplied by a control-gap factor based on the six controls you scored. Severity is bounded by your largest routine wire size to prevent unrealistic single-incident estimates. We then apply a recovery haircut consistent with public BEC reporting, and add the operational cost of your current verification process.
Results are returned as a conservative, expected, and high range — not a single number — because real exposure depends on attacker targeting, employee behavior, control consistency, and reporting and recovery timing.
This calculator produces illustrative estimates based on public reporting, government data, security industry research, and modeling assumptions. It is for educational planning only and does not constitute financial, legal, insurance, or security advice. Actual exposure depends on company-specific controls, attacker behavior, reporting gaps, loss recovery, and incident response maturity.
AI wire fraud, answered.
See the Executive Impersonation Risk Calculator and the Deepfake Hiring Fraud Calculator, or browse all Diopter risk calculators.
Walk an attack arc with Diopter.
In 30 minutes, we will replay a real deepfake incident, show the signals Diopter would score, and map the verdict your team could act on.