Unmasking Cybercrime Strengthening Digital Identity Verification against Deepfakes 2026

Page 9 of 23 · WEF_Unmasking_Cybercrime_Strengthening_Digital_Identity_Verification_against_Deepfakes_2026.pdf

TABLE 1 Evaluation criteria (continued) Category Evaluation criteria 2 Camera injection tools (camera feed replacement/spoofing) Tool basics Tool name, version, source, price/licensing Injection method Virtual camera, hooking camera application programming interface (API), overlay, emulation Mobile platform supportAndroid/iOS/Emulator (BlueStacks, LDPlayer, etc.) Root/jailbreak requiredYes/no; if yes, specify framework (Magisk, Xposed, etc.) Camera replacement typeFull feed replacement/overlay/mirrored injection Live feed streaming Can it stream face-swapped content in real time? Compatibility with KYC appsFaceTec, Onfido, Jumio, etc. – which apps can it spoof? Detection resistance Can it bypass software development kits (SDKs), detecting VCam or hook tools? Timing accuracy Is the feed synced with user interface (UI) prompts (e.g. smile now, blink now)? UI hijack capabilities Can it fake app UI or overdraw the KYC app interface? Latency and quality Frame rate, feed lag, resolution distortion Device artefacts Custom package name, process ID, camera access logs Sandbox evasion Can it avoid being detected in test/sandboxed KYC environments? Network behaviour Does it connect to command-and-control (C2) or upload feeds/logs externally? Persistence Can it autostart, run in stealth mode or survive reboot? Summary In total, 17 face-swapping tools were evaluated to determine their functional characteristics and potential to enable digital KYC bypass. Tools were observed to cluster into three operational modes: real-time webcam swappers, offline desktop frameworks and hosted web services. Genuine real-time face swapping capability was uncommon (demonstrated by five tools), and only a subset of those (three tools) provided virtual-camera or equivalent injection paths suitable for integration into live verification flows. Overall, the greatest KYC risk was found where low-latency, high-fidelity, real-time swaps were deliverable directly into a verification pipeline. Most tools were intended for creative or entertainment use and did not explicitly include anti-KYC functionality. These findings are based solely on claims made in the tools’ publicly available documentation and websites, not on direct empirical testing. Evaluation of face-swapping tools Unmasking Cybercrime 9
Ask AI what this page says about a topic: