Unmasking Cybercrime Strengthening Digital Identity Verification against Deepfakes 2026

Page 6 of 23 · WEF_Unmasking_Cybercrime_Strengthening_Digital_Identity_Verification_against_Deepfakes_2026.pdf

Flowchart of deepfake-based KYC attacks Document misuse or forgingStolen or AI-generated identity documents are prepared. Step 1Face swappingFace-swapping tools are used to generate high-quality face- swapped media (image or video) to match submitted documents. Step 2Camera feed substitutionCamera injection tools are used to feed synthetic video into live biometric checks. Step 3Device and network obfuscationFIGURE 2 Deepfake-based KYC attackHow the attack works: methodology and TTPs Deepfakes facilitate theft, money-laundering and the creation of fake financial services accounts. The principal objectives of deepfake-facilitated KYC attacks are to onboard accounts that are not legitimately controlled by the applicant for malicious purposes such as loan fraud, money laundering, payout collection or other forms of financial abuse. Their workflow typically encompasses: 1) stolen or AI-generated identity documents; 2) high- quality face swap media to match submitted documents; 3) camera injection tools that feed synthetic video into live biometric checks.12 The combined effect is scalable account creation that bypasses both document and biometric KYC controls and weakens device-based signals used for fraud detection.13Objective and flowchart of deepfake-based KYC attacks02 Source Cybercrime Atlas. Unmasking Cybercrime 6
Ask AI what this page says about a topic: