Unmasking Cybercrime Strengthening Digital Identity Verification against Deepfakes 2026

Page 8 of 23 · WEF_Unmasking_Cybercrime_Strengthening_Digital_Identity_Verification_against_Deepfakes_2026.pdf

TABLE 1 Evaluation criteriaEvaluation of deepfake tools Legitimate content creation tools are being adapted for criminal purposes.03 Numerous face-swapping methods and camera injection tools are discussed or advertised on the internet, with some claiming the capability to bypass digital KYC systems. To assess whether these claims are well-founded, and to characterize the current deepfake landscape, a set of widely discussed face-swapping and camera injection tools was collected from darknet forums, Telegram channels and other social media platforms for the period 1 July 2024 to 30 April 2025.The evaluation process followed the criteria listed in Table 1 and was applied separately to the face-swapping applications and camera injection toolsets. The evaluation covered 17 face- swapping tools and eight camera injection tools. To reduce the potential for misuse, vendor identities, discovery methods and step-by-step exploitation techniques have been redacted from this paper. High-level technical observations, aggregated metrics and non-exploitable examples are presented.Overview of evaluation process Category Evaluation criteria 1 Face-swapping tools (fake media generators) Tool basics Tool name, version, source (GitHub, Telegram, .onion), price/licensing Media type Static image swap/real-time video/3D avatar/animation Real-time capability Can it operate in live mode (e.g. front cam selfie KYC)? Facial expression sync Smile, blink, head turn, eye tracking supported? Lighting adaptation Does the fake face adapt to real lighting changes? Voice integration Built-in voice clone? Compatible with external voice clone tools? Target use cases KYC, adult content, livestreaming, impersonation Quality metrics Artefact presence (e.g. flicker, blending), resolution, smoothness Model typeGenerative adversarial network (GAN)-based, encoder-decoder, neural radiance fields (NeRF), StyleGAN, Avatarify, etc. Device compatibility Android, iOS, PC; rooted/jailbroken required? Resource demands Graphics processing unit (GPU)/central processing unit (CPU)/memory use during real-time rendering Spoof detection bypassCan it fool blink/liveness/selfie video detection? Output format Export as video/image or directly stream to camera (VCam)? Toolchain dependenciesFFmpeg, TensorFlow, OpenCV, face landmarks library, etc. Network behaviour Connects to remote server? Downloads model weights? Customization Can the fraudster upload and replace specific face ID (victim photo/video)? Unmasking Cybercrime 8
Ask AI what this page says about a topic: