Deepfake attacks using "face swap" technology for bypassing remote identity verification increased by 704% in 2023.
Free and low-cost face swap tools, virtual cameras, and mobile emulators are aiding threat actors in these attacks.
Generative AI tools are affordable, easily accessible, and enhance threat actors' productivity in creating convincing deep fakes.
Face swaps are identified as the preferred deepfake method among persistent threat actors.
Injection attacks targeting mobile identity verification platforms increased by 255%, while emulator use rose by 353% in 2023.
Threat groups exchanging information on attacks on biometric and video identification systems nearly doubled between 2022 and 2023.
Face swap apps like SwapFace, DeepFaceLive, and Swapstream are commonly used in attacks against remote ID verification systems.
Advanced attackers can create realistic live motion videos using AI apps, combined with digital injection attacks.
Digital injection attacks, more advanced than presentation attacks, doubled in frequency in 2023.
Emulators conceal the use of virtual cameras and are employed to target mobile verification systems effectively.
Deepfake attackers target manual or hybrid identity verification systems, considering humans easier to fool than computerised facial recognition systems.
Humans have limited ability to detect deep fakes, with studies showing varying accuracy rates.
Deepfake schemes have successfully targeted both humans and digital biometric systems in various fraud cases.
Here are some useful countermeasures and security controls to avoid falling victim to deep fake face swap attacks on identity verification systems:
Biometric Liveness Detection:
Implement biometric liveness detection technologies that can distinguish between live subjects and fake representations.
Multi-Factor Authentication (MFA):
Use multi-factor authentication to add an additional layer of security beyond facial recognition, such as something the user knows (password) or has (security token).
Behavioural Biometrics:
Incorporate behavioural biometrics, such as keystroke dynamics or mouse movement patterns, to enhance identity verification.
Regularly Update Verification Methods:
Stay current with advancements in deep face technology and update verification methods accordingly to adapt to evolving threats.
Digital Injection Attack Detection:
Employ advanced detection mechanisms specifically designed to identify digital injection attacks, which are more technically sophisticated.
Emulator Detection:
Implement measures to detect the use of emulators, which threat actors may use to conceal virtual cameras and carry out attacks on mobile verification systems.
Continuous Monitoring:
Establish continuous monitoring of identity verification processes to detect anomalies or suspicious activities in real-time.
Red Team Testing:
Regularly conduct red team testing to simulate real-world attacks and identify potential vulnerabilities in the verification system.
User Education and Awareness:
Educate users and employees about the risks of deep fake attacks and the importance of vigilance during identity verification processes.
Cloud-Based Solutions:
Consider using cloud-based, multi-frame liveness biometric solutions, as recommended in the article, which may provide more robust security than on-premises and single-frame solutions.
AI-Powered Detection Systems:
Leverage AI-powered detection systems that can analyse patterns, anomalies, and inconsistencies in media to identify potential deepfake attempts.
Secure Communication Channels:
Ensure secure communication channels during identity verification processes to prevent interception and manipulation of data.
Human Oversight:
Incorporate human oversight in the verification process, especially in critical or high-risk situations, to counteract the limitations of automated systems.
Regular Security Audits:
Conduct regular security audits to assess the overall effectiveness of the identity verification system and identify areas for improvement.
Legal and Regulatory Compliance:
Stay compliant with relevant legal and regulatory requirements related to identity verification and data protection.
By implementing a combination of these measures, organisations can strengthen their defences against deepface face swap attacks and enhance the overall security of their identity verification systems.
Source and further reading:
French, L. (2024, February 7). Deepfake face swap attacks on ID verification systems up 704% in 2023.
SC Media.
https://www.scmagazine.com/news/deepfake-face-swap-attacks-on-id-verification-systems-up-704-in-2023
McConvey, J. R. (2024, February 5). Measure liveness across datasets helps defend complex real-world attacks: researchers.
Biometric Update | Biometrics News, Companies and Explainers.
https://www.biometricupdate.com/202402/measure-liveness-across-datasets-helps-defend-complex-real-world-attacks-researchers
Yahoo is part of the Yahoo family of brands. (n.d.).
https://finance.yahoo.com/news/docusign-launches-ai-powered-id-120000316.html?guccounter=1&guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&guce_referrer_sig=AQAAAFNvhMLaKpRtcXlk5Hdi54G3gBENsBhNQNtFipKfymkyGUnurkxdJRPNWm4QvF-ISZyUvyI8qJ3-FeMFq9U9ln_zooBPpmJshHQD-rvdrNp2qimwwig3p5zSTrs_XWXcK8MUZrWrZCnuVLa-DsIfkG_IwpW0O3hMPe_P3kyAQYHV