A digital, wireframe illustration of a human face is partially enclosed within a square. To the left of the face, a soundwave representation over a dark background dotted with small points evokes themes of cybersecurity. The image conveys a high-tech, futuristic atmosphere.

Remote identity verification is at risk due to the surge in fake” Face Swap” attacks.

Deepfake” face swap” attacks increased by 704 % between the first and second half of 2023, according to recent research.

According to a report from the biometric company iProov, “face-swapping” fraudsters are increasingly using unlicensed software to produce altered images and videos.

There are many low-cost, easily accessible generative AI tools that can produce highly convincing deepfakes to trick humans, as well as some remote identity verification solutions that pass a “liveness” test, according to iProov’s analysts who are tracking more than 100 face swap apps and repositories.

In order to demonstrate that they are both real people and to contrast their appearance to identity documents, a “liveness” test will typically require the subject to look into e-cameras and possibly turn their heads from side to side.

According to the report, malicious actors frequently use SwapForce, DeepFaceLive, and Swapstream face-swapping software.

According to Google Trends, tool searches have steadily increased over the past year.

Face-swapping software can produce highly convincing synthetic video that is fed to a computerized webcam-like camera. This deceives a remote identity verification system into thinking the subject is “live” and accepting their identity.

Users can test out the technology for free with the majority of face swap tools ‘ free tier. This has increased the appeal of malicious actors to the technology.

An “arms race” will emerge as identity fraudsters increasingly use fake technology. The bad guys will try to avoid detection while security firms fight to detect synthetic media.


Editor’s Note: Tripwire does not necessarily share the opinions expressed in this guest author article; they are solely those of the contributor.

Skip to content