Unmasking Cybercrime Strengthening Digital Identity Verification against Deepfakes 2026

Page 5 of 23 · WEF_Unmasking_Cybercrime_Strengthening_Digital_Identity_Verification_against_Deepfakes_2026.pdf

The risks arising from face swapping span multiple levels – individual, organizational and systemic – introducing the risk of both financial8 and reputational harm. • Individual level: Personal identities can be exploited through face-swapped media for fraudulent activities such as unauthorized account openings, illicit loan applications and non-consensual financial transactions.9 Furthermore, manipulated media can be weaponized to damage reputations by depicting individuals engaging in activities they did not undertake. • Organizational level: Corporations face heightened risks from face-swapping attacks, particularly in processes dependent on digital identity verification, such as recruitment and remote onboarding. Attackers may bypass know-your-customer (KYC) procedures, impersonate employees or executives to exfiltrate sensitive data, or deceive individuals into authorizing fraudulent wire transfers. The credibility of business operations and the reliability of digital infrastructure are directly threatened by such attacks. • Systemic and societal level: At broader scales, as trust forms the cornerstone of digital commerce and regulatory compliance, the proliferation of face-swapping attacks could undermine trust in digital ecosystems, erode public confidence in online transactions and enable large-scale data breaches, destabilizing foundational systems on which economies and societies rely.The risks posed by face swapping KYC verification is a critical process that organizations use to authenticate the identity of new customers and assess potential risks associated with them. KYC implementations commonly combine at least: • Document verification: collection and automated validation of government-issued identity documents (passport, ID card, driver’s licence) • Biometric verification: comparison of a live biometric sample (commonly a facial image or short video) against the identity documentNowadays, many organizations offer digital KYC processes, allowing customers to authenticate their identity online without physical presence. While digital KYC brings convenience, it also presents hidden risks10 as it creates more opportunities for attackers to enter an organization’s systems, particularly when identity verification relies solely on automated or unsupervised checks.11KYC and its inherent risks The main purpose of this research is to examine face- swapping attacks targeting KYC processes that rely on face verification systems. The study comprehensively evaluated the tactics, techniques and procedures (TTPs) employed by threat actors, as well as commonly used face-swapping tools. Looking beyond the present threat environment, this research provides a forward-looking threat analysis to predict potential developments in face-swapping attacks over the next one to three years. It offers recommendations to relevant stakeholders in strengthening defences against the misuse of face-swapping technologies. Additionally, the paper includes a set of actionable recommendations that organizations should consider and implement to safeguard against face- swapping attacks targeting KYC verification processes.Purpose and scope of this research Unmasking Cybercrime 5
Ask AI what this page says about a topic: