Category | Details |
---|---|
Threat Actors | Dark web identity fraud operation, individuals selling personal and biometric data |
Campaign Overview | Large-scale dark web operation bypassing KYC verification, involving the sale of genuine identity documents and facial images for financial gain. |
Target Regions | LATAM, Eastern Europe |
Methodology | Voluntary identity compromise, deepfake software, AI models, static images, real-time face-swapping, and synthetic face creation. |
Product Targeted | Biometric identity verification systems, KYC verification checks, facial recognition technology. |
Malware Reference | None |
Tools Used | Deepfake software, custom AI models, real-time face-swapping, face synthesis software. |
Vulnerabilities Exploited | Biometric access systems vulnerabilities (e.g., SQL injection, buffer overflow in ZKTeco, unsecured storage in ChiceDNA). |
TTPs | Identity document and biometric data collection, synthetic face creation, use of facial recognition to bypass verification, compromising real identities for fraud. |
Attribution | Unspecified dark web operation, individuals in LATAM and Eastern Europe |
Recommendations | Multi-layered real-time verification, challenge-response mechanisms, advanced detection technologies, continuous monitoring, improved biometric data protection. |
Source | Hackread |
Read full article: https://hackread.com/dark-web-operation-entirely-focused-on-kyc-bypass/
The above summary has been generated by an AI language model
Leave a Reply