According to experts from AU10TIX (19459045) has identified a new threat known as “Repeaters”which is changing the way fraudsters penetrate digital systems.
Unlike other attacks, Repeaters are not designed to cause immediate damage. Instead, they quietly test the defenses for banks, crypto platforms and other services using slightly different synthetic identities.
Once the weak points have been identified, these assets are redeployed to multiple platforms as part of large-scale, coordinated campaigns. This strategy relies on deepfake enhanced identities, which are slightly modified versions a core digital asset. These changes can include tweaks to the facial features, background images or document numbers.
Each variation looks legitimate when examined individually. This allows for the bypassing of traditional Know Your Customer (KYC), as well as biometric checks.
AU10TIX CEO, Yair Tel, describes them as the “fingerprint of a new fraud class: automated, AI enhanced attacks that reuse digital assets and synthetic identities at scale.”
Repeaters are particularly dangerous because they exploit gaps in existing fraud detection systems.
The majority of traditional defenses rely solely on static validation. They evaluate each identity as a single event. Biometric scans, liveness detectors, and ID checks are often not able to capture the full picture.
Conventional tools are unable to detect the repetition of these synthetic identities because they appear unique and are only submitted a handful of times per platform.
AU10TIX introduces “consortium validity” to counter this threat. This method, unlike siloed platforms, allows multiple organizations to share their identity signals across an instantaneous network, just as the best endpoint security platforms do.
The system will flag an identity or a slightly modified version if it appears in more than one organization. It’s a collaborative strategy to connect the dots between isolated incidents.
Tal said, “We are proud to be on the cutting edge of detecting and stopping these attacks using advanced pattern recognition and in-real-time consortium validation.”
AU10TIX suggests that organizations audit for vulnerabilities with deepfakes and synthesized identities which can bypass traditional KYC defences. It also recommends that organizations closely monitor behaviors across devices, sessions, and onboarding events as it can reveal coordinated activity before it scales.
A connected and behaviorally aware infrastructure is the best way to detect such fraudulent activity early, because no single solution has the ability to claim that it can protect against this new generation fraud.
- These best AI website builders are available
- UK companies say that the fear of missing out on AI is driving AI adoption.
- TikTok users beware: experts warn about dangerous malware spread by AI false videos
Efosa is a technology writer who has been writing for more than 7 years. Initially driven by curiosity, he now writes with a passion for the subject. He has a PhD and a Master’s degree in sciences. This gave him a solid foundation for analytical thinking. Efosa has a keen interest for technology policy. He is particularly interested in the intersection between privacy, security and politics. His research focuses on how technological advancements affect regulatory frameworks and social norms, especially in regards to data protection and cybersecurity. In addition to privacy and technology policies, he will also be focusing on B2B products. Efosa can be contacted at this email: [email protected]