{"id":51702,"date":"2026-03-05T08:04:24","date_gmt":"2026-03-05T08:04:24","guid":{"rendered":"https:\/\/eduzim.co.zw\/news\/?p=51702"},"modified":"2026-03-05T08:04:24","modified_gmt":"2026-03-05T08:04:24","slug":"deepfakes-fuel-90-of-biometric-fraud-in-africa","status":"publish","type":"post","link":"https:\/\/eduzim.co.zw\/news\/2026\/03\/05\/deepfakes-fuel-90-of-biometric-fraud-in-africa\/","title":{"rendered":"87% of Biometric Fraud Now AI-Driven: Smile ID"},"content":{"rendered":"<p> <script data-jetpack-boost=\"ignore\" async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-1669381584671856\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- Africa tv video display -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-1669381584671856\"\r\n     data-ad-slot=\"3579572842\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script data-jetpack-boost=\"ignore\">\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script><br \/>\n<\/p>\n<div>\n<p class=\"ds-markdown-paragraph\">Smile ID, Africa\u2019s leading identity verification company, has released its 2026 Digital Identity Fraud Report \u2014 \u201cFrom Selfies to Signals: Identity Enters the Security Era.\u201d.<\/p>\n<p class=\"ds-markdown-paragraph\">The report finds that AI has rapidly reduced the cost, while increasing the scalability and quality of deepfake fraud. In addition, as identity becomes part of the fabric of many essential applications, fraudsters increasingly attack the online ID capture pipeline itself \u2014 manipulating devices, operating systems, and verification sessions to try and bypass verification technology.<\/p>\n<p class=\"ds-markdown-paragraph\">In Southern Africa, nearly nine in ten rejected biometric verification attempts were linked to AI-assisted impersonation and spoofing. Specifically, impersonation (where the selfie doesn\u2019t match the claimed identity) accounted for 47% of rejected verifications, while spoofing attempts (including deepfake and face-swap techniques designed to bypass liveness checks) made up 40%. This highlights a significant shift towards advanced biometric attacks, with document-based fraud accounting for just over one-tenth of cases.<\/p>\n<p class=\"ds-markdown-paragraph\">How and where an identity is verified now matters as much as the image presented. In 2025, Smile ID saw more than 100,000 \u201cinjection-style\u201d fraud attempts per month linked to emulators, virtual cameras, and manipulated environments \u2014 showing a shift from visual spoofing toward systematic interference with the ID verification process.<\/p>\n<p class=\"ds-markdown-paragraph\">Authentication-related fraud attempts now exceed onboarding fraud by more than five times, confirming that identity risk has moved towards authentication. Attackers are no longer focused on breaking in; they are operating within verified accounts, targeting login flows, account recovery, device changes, and high-value transactions.<\/p>\n<p class=\"ds-markdown-paragraph\">AI-enabled automations allow attackers to reuse verified biometrics, take over accounts mid-journey, and move funds across platforms at scale. This shift has transformed digital fraud from isolated cases of document manipulation into more sophisticated attacks by criminal networks abusing the structural vulnerabilities of mobile-first digital systems.<\/p>\n<p class=\"ds-markdown-paragraph\">The findings are based on anonymised data from more than 200 million identity verification checks conducted in 2025 by Smile ID, spanning 37 industries in over 35 countries.<\/p>\n<figure id=\"attachment_4050183\" aria-describedby=\"caption-attachment-4050183\" style=\"width: 2560px\" class=\"wp-caption alignnone\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4050183 lazyload\" src=\"https:\/\/i0.wp.com\/eduzim.co.zw\/news\/wp-content\/uploads\/2026\/03\/87-of-Biometric-Fraud-Now-AI-Driven-Smile-ID.jpg?resize=640%2C427&#038;ssl=1\" alt=\"Biometrics\" width=\"640\" height=\"427\" srcset=\"https:\/\/eduzim.co.zw\/news\/wp-content\/uploads\/2026\/03\/87-of-Biometric-Fraud-Now-AI-Driven-Smile-ID.jpg 2560w, https:\/\/b2726120.smushcdn.com\/2726120\/wp-content\/uploads\/2026\/03\/paying-public-transport-by-card-public-transport-contactless-fare-payment-300x200.jpg?lossy=2&amp;strip=1&amp;webp=1 300w, https:\/\/b2726120.smushcdn.com\/2726120\/wp-content\/uploads\/2026\/03\/paying-public-transport-by-card-public-transport-contactless-fare-payment-1024x683.jpg?lossy=2&amp;strip=1&amp;webp=1 1024w, https:\/\/b2726120.smushcdn.com\/2726120\/wp-content\/uploads\/2026\/03\/paying-public-transport-by-card-public-transport-contactless-fare-payment-150x100.jpg?lossy=2&amp;strip=1&amp;webp=1 150w, https:\/\/b2726120.smushcdn.com\/2726120\/wp-content\/uploads\/2026\/03\/paying-public-transport-by-card-public-transport-contactless-fare-payment-768x512.jpg?lossy=2&amp;strip=1&amp;webp=1 768w, https:\/\/b2726120.smushcdn.com\/2726120\/wp-content\/uploads\/2026\/03\/paying-public-transport-by-card-public-transport-contactless-fare-payment-1536x1024.jpg?lossy=2&amp;strip=1&amp;webp=1 1536w, https:\/\/b2726120.smushcdn.com\/2726120\/wp-content\/uploads\/2026\/03\/paying-public-transport-by-card-public-transport-contactless-fare-payment-2048x1365.jpg?lossy=2&amp;strip=1&amp;webp=1 2048w, https:\/\/b2726120.smushcdn.com\/2726120\/wp-content\/uploads\/2026\/03\/paying-public-transport-by-card-public-transport-contactless-fare-payment-450x300.jpg?lossy=2&amp;strip=1&amp;webp=1 450w, https:\/\/b2726120.smushcdn.com\/2726120\/wp-content\/uploads\/2026\/03\/paying-public-transport-by-card-public-transport-contactless-fare-payment-1200x800.jpg?lossy=2&amp;strip=1&amp;webp=1 1200w, https:\/\/b2726120.smushcdn.com\/2726120\/wp-content\/uploads\/2026\/03\/paying-public-transport-by-card-public-transport-contactless-fare-payment.jpg?size=577x385&amp;lossy=2&amp;strip=1&amp;webp=1 577w, https:\/\/b2726120.smushcdn.com\/2726120\/wp-content\/uploads\/2026\/03\/paying-public-transport-by-card-public-transport-contactless-fare-payment.jpg?size=1083x722&amp;lossy=2&amp;strip=1&amp;webp=1 1083w, https:\/\/b2726120.smushcdn.com\/2726120\/wp-content\/uploads\/2026\/03\/paying-public-transport-by-card-public-transport-contactless-fare-payment.jpg?size=1444x963&amp;lossy=2&amp;strip=1&amp;webp=1 1444w, https:\/\/b2726120.smushcdn.com\/2726120\/wp-content\/uploads\/2026\/03\/paying-public-transport-by-card-public-transport-contactless-fare-payment.jpg?size=2166x1444&amp;lossy=2&amp;strip=1&amp;webp=1 2166w\" data-sizes=\"auto\" style=\"--smush-placeholder-width: 2560px; --smush-placeholder-aspect-ratio: 2560\/1707;\" data-original-sizes=\"(max-width: 2560px) 100vw, 2560px\"\/><figcaption id=\"caption-attachment-4050183\" class=\"wp-caption-text\">Paying for public transport by card. Public transport. Contactless fare payment. High quality photo. Copy space. Public transportation and people concept. Woman buying ticket via digital wallet.<\/figcaption><\/figure>\n<p class=\"ds-markdown-paragraph\">Africa\u2019s digital economy is expanding faster than the security infrastructure that supports it. Over the past decade, the percentage of adults in Africa owning a financial account rose from 34% to nearly 60%, creating more than 200 million new accounts across the continent.<\/p>\n<p class=\"ds-markdown-paragraph\">That expansion has unlocked extraordinary opportunity, but it has also created a structural vulnerability: identity verification systems remain largely designed for a one-time checkpoint model, while fraud has evolved into continuous, industrial-scale operations that exploit security gaps across the full customer lifecycle. In a single month in 2025, Smile ID traced more than 160,000 fraudulent verification attempts back to just 100 facial identities.<\/p>\n<p class=\"ds-markdown-paragraph\">Some of these faces appeared over 12,000 times across multiple platforms. In another case, attackers used the same identity to attempt more than 1,000 account registrations within 30 minutes. These patterns are not isolated incidents. They represent coordinated fraud networks operating at scale\u2014reusing stolen identities, automating attacks, and targeting the moments where value concentrates: login flows, password resets, device changes, and high-value withdrawals.<\/p>\n<p class=\"ds-markdown-paragraph\">As shared infrastructure, Smile ID identifies systemic fraud patterns that transcend individual institutions. As it identifies risk and fraud signals, its machines and analysts add signals to its dynamic defense network, creating a network defence that protects all of its clients. By leveraging a combination of traditional algorithms, controlled capture methods, and internally tuned LLMs, Smile ID\u2019s privacy-preserving metadata surfaced hundreds of thousands of examples of coordinated abuse that otherwise may appear legitimate in isolation.<\/p>\n<figure id=\"attachment_4050184\" aria-describedby=\"caption-attachment-4050184\" style=\"width: 1000px\" class=\"wp-caption alignnone\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4050184 lazyload\" src=\"https:\/\/i0.wp.com\/eduzim.co.zw\/news\/wp-content\/uploads\/2026\/03\/1772697861_156_87-of-Biometric-Fraud-Now-AI-Driven-Smile-ID.jpg?resize=640%2C457&#038;ssl=1\" alt=\"Biometrics\" width=\"640\" height=\"457\" srcset=\"https:\/\/eduzim.co.zw\/news\/wp-content\/uploads\/2026\/03\/1772697861_156_87-of-Biometric-Fraud-Now-AI-Driven-Smile-ID.jpg 1000w, https:\/\/b2726120.smushcdn.com\/2726120\/wp-content\/uploads\/2026\/03\/2148932862-300x214.jpg?lossy=2&amp;strip=1&amp;webp=1 300w, https:\/\/b2726120.smushcdn.com\/2726120\/wp-content\/uploads\/2026\/03\/2148932862-150x107.jpg?lossy=2&amp;strip=1&amp;webp=1 150w, https:\/\/b2726120.smushcdn.com\/2726120\/wp-content\/uploads\/2026\/03\/2148932862-768x548.jpg?lossy=2&amp;strip=1&amp;webp=1 768w, https:\/\/b2726120.smushcdn.com\/2726120\/wp-content\/uploads\/2026\/03\/2148932862-450x321.jpg?lossy=2&amp;strip=1&amp;webp=1 450w, https:\/\/b2726120.smushcdn.com\/2726120\/wp-content\/uploads\/2026\/03\/2148932862.jpg?size=577x412&amp;lossy=2&amp;strip=1&amp;webp=1 577w\" data-sizes=\"auto\" style=\"--smush-placeholder-width: 1000px; --smush-placeholder-aspect-ratio: 1000\/714;\" data-original-sizes=\"(max-width: 1000px) 100vw, 1000px\"\/><figcaption id=\"caption-attachment-4050184\" class=\"wp-caption-text\">Biometrics<\/figcaption><\/figure>\n<p class=\"ds-markdown-paragraph\"><strong>Key findings from the 2026 Digital Identity Fraud Report also include:<\/strong><\/p>\n<ul>\n<li>\n<p class=\"ds-markdown-paragraph\">Authentication fraud attempts are now 5x more common than at onboarding<\/p>\n<\/li>\n<li>\n<p class=\"ds-markdown-paragraph\">Nearly 90% of fraud blocked by Smile ID in 2025 was triggered by mobile SDK signals \u2014 up from 68% in 2024<\/p>\n<\/li>\n<li>\n<p class=\"ds-markdown-paragraph\">Duplicate attempts \u2014 those re-using stolen or fraudulent identity data \u2014 more than doubled year over year, and nearly tripled the combined prior 2023 &amp; 2024 total.<\/p>\n<\/li>\n<li>\n<p class=\"ds-markdown-paragraph\">Deepfake-driven fraud is rising, with AI-generated biometric attacks appearing across multiple markets and industries, enabled by radically affordable tooling<\/p>\n<\/li>\n<li>\n<p class=\"ds-markdown-paragraph\">Injection attacks \u2014 which bypass the camera entirely using synthetic or pre-recorded media \u2014 have been elevated to a central threat category in 2026<\/p>\n<\/li>\n<\/ul>\n<blockquote class=\"modern-quote full\">\n<p class=\"ds-markdown-paragraph\"><strong>Mark Straub, CEO of Smile ID<\/strong>, said, \u201cFraud is no longer a \u2018KYC\u2019 problem \u2014 it is a continuous cybersecurity challenge. AI enables fraudsters to operate at unprecedented scale and sophistication.<\/p>\n<p class=\"ds-markdown-paragraph\">\u201cEffective defence now requires network intelligence: By leveraging these privacy-preserving indicators throughout the customer lifecycle, we enable real-time adaptation.<\/p>\n<p class=\"ds-markdown-paragraph\">\u201cIdentity has entered the security era, where ecosystem-wide protection is essential to safeguarding the individual.\u201d<\/p>\n<\/blockquote><\/div>\n<p><script data-jetpack-boost=\"ignore\" async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-1669381584671856\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- Africa tv video display -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-1669381584671856\"\r\n     data-ad-slot=\"3579572842\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script data-jetpack-boost=\"ignore\">\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script><br \/>\n#Biometric #Fraud #AIDriven #Smile<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Smile ID, Africa\u2019s leading identity verification company, has released its 2026 Digital Identity Fraud Report \u2014 \u201cFrom Selfies to Signals:&hellip;<\/p>\n","protected":false},"author":1,"featured_media":51703,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-51702","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mzansi"],"_links":{"self":[{"href":"https:\/\/eduzim.co.zw\/news\/wp-json\/wp\/v2\/posts\/51702","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eduzim.co.zw\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eduzim.co.zw\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eduzim.co.zw\/news\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/eduzim.co.zw\/news\/wp-json\/wp\/v2\/comments?post=51702"}],"version-history":[{"count":1,"href":"https:\/\/eduzim.co.zw\/news\/wp-json\/wp\/v2\/posts\/51702\/revisions"}],"predecessor-version":[{"id":51704,"href":"https:\/\/eduzim.co.zw\/news\/wp-json\/wp\/v2\/posts\/51702\/revisions\/51704"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eduzim.co.zw\/news\/wp-json\/wp\/v2\/media\/51703"}],"wp:attachment":[{"href":"https:\/\/eduzim.co.zw\/news\/wp-json\/wp\/v2\/media?parent=51702"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eduzim.co.zw\/news\/wp-json\/wp\/v2\/categories?post=51702"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eduzim.co.zw\/news\/wp-json\/wp\/v2\/tags?post=51702"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}