* [Cyber Risk](/cyber-risk)AU10TIX Q3 2024 Global Identity Fraud Report Detects Skyrocketing Social Media Attacks AU10TIX Q3 2024 Global Identity Fraud Report Detects Skyrocketing Social Media Attacks=============================================================================================================================================================================
November 1, 2024 4 Min Read [](https://www.linkedin.com/sharing/share-offsite/?url=https://www.darkreading.com/cyber-risk/au10tix-q3-2024-global-identity-fraud-report-detects-skyrocketing-social-media-attacks)[](http://www.facebook.com/sharer/sharer.php?u=https://www.darkreading.com/cyber-risk/au10tix-q3-2024-global-identity-fraud-report-detects-skyrocketing-social-media-attacks)[](http://www.twitter.com/intent/tweet?url=https://www.darkreading.com/cyber-risk/au10tix-q3-2024-global-identity-fraud-report-detects-skyrocketing-social-media-attacks)[](/cdn-cgi/l/email-protection#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)[](https://www.reddit.com/submit?url=https://www.darkreading.com/cyber-risk/au10tix-q3-2024-global-identity-fraud-report-detects-skyrocketing-social-media-attacks&title=AU10TIX%20Q3%202024%20Global%20Identity%20Fraud%20Report%20Detects%20Skyrocketing%20Social%20Media%20Attacks) PRESS RELEASELAS VEGAS, Oct. 30, 2024 /PRNewswire/ — MONEY 20/20 — [AU10TIX](https://www.au10tix.com), a global technology leader in identity verification and management, today released its [Q3 2024 Global Identity Fraud Report](https://www.au10tix.com/landing/the-q3-2024-global-identity-fraud-report/) at Money 20/20 USA in Las Vegas. Drawing insights from millions of transactions processed around the globe from July to September 2024, the report uncovers significant trends in large-scale organized identity fraud. This quarter, automated bot attacks targeting social media platforms surged in the lead-up to next week’s US presidential election, with the sector accounting for 28% of all attacks in Q3, up from just 3% in Q1. The report also reveals a faster-than-anticipated leap in the sophistication of AI-powered impersonation bots and deepfake technology, including synthetic selfies that have shown the ability to bypass some leading verification systems.Rapid developments in AI technology have enabled the industrialization of identity fraud, with bad actors launching automated mega-attacks of thousands of false identities targeting payments, crypto and social media companies all over the world. In Q3, AU10TIX observed an especially high number of bot attacks combined with deepfake content in attempts to open fake social media accounts at scale. Some of the attacks appeared to incorporate advanced randomized GenAI elements, marking a new level of automated detection evasion. This rapid growth began in March 2024 and peaked in September, with outlets like [Associated Press](https://apnews.com/article/artificial-intelligence-elections-disinformation-chatgpt-bc283e7426402f0b4baa7df280a4c3fd) reporting on bots spreading disinformation and manipulating public perception in the weeks leading up to the US election.Another major Q3 development involved the debut of synthetic selfies. Selfies have historically been one of the least-used methods of fraud, due to the difficulty of outsmarting facial matching tech. However, fraudsters are now exploiting extremely sophisticated technology to create 100% deepfaked ‘selfies’ that match the synthetic IDs they use to trick automated KYC processes.’Fraudsters are evolving faster than ever, leveraging AI to scale and execute their attacks, especially in the social media and payments sectors,’ said Dan Yerushalmi, CEO of AU10TIX. ‘While companies are using AI to bolster security, criminals are weaponizing the same technology to create synthetic selfies and fake documents, making detection almost impossible. The only way to detect this type of fraud is by analyzing behavior at the traffic level, as AU10TIX does with our Serial Fraud Monitor. We are committed to continually advancing our detection methods to protect customers against this rapid evolution of fraud tactics, using a combination of advanced AI, biometric verification, and deepfake detection.’In addition to the increase in synthetic selfies, AU10TIX reported a 20% rise in the use of ‘image template’ attacks by bad actors. This trend suggests that AI is being used to rapidly create variations of synthetic identities—including photos, document numbers, and other personal information—using the same ID template. The regional hotspots driving this change are APAC and North America; the surges have not been observed in other regions.On a more positive note, fraud rates in the payments sector dropped from 52% in Q2 to 39% in Q3, which AU10TIX attributes to increased self-regulation and law enforcement interventions. Although the payments industry continued to be the most targeted segment, discouraged fraudsters shifted their attention to less regulated sectors like the crypto market, which accounted for 31% of Q3 attacks.AU10TIX’s Q3 2024 Global Identity Fraud Report offers three actionable insights to help organizations protect against identity fraud: * Adopt Behavior-Based Detection: Traditional document verification alone isn’t enough. To catch today’s sophisticated fraudsters, organizations must analyze user behavior and traffic patterns.* Use AI to Combat AI: As fraudsters deploy AI to scale attacks, it is critical to leverage AI-driven solutions to keep pace with these threats.* Be Ready for Synthetic Selfies: The rise in synthetic selfies means that relying on traditional KYC methods may no longer be effective. Organizations must enhance their detection systems to spot these new forms of fraud.About AU10TIX AU10TIX plays a pivotal role in establishing trust between individuals/companies and digital systems. Founded in 2002, it is the global leader in identity verification and management, protecting the world’s largest brands against advanced fraud. The company’s future-proof product portfolio helps businesses provide frictionless customer onboarding and verification in 4-8 seconds while staying ahead of emerging threats and evolving regulatory requirements. AU10TIX offers the world’s only 100% automated global identity management system, as well as the industry’s only solution that can detect organized mass attacks by analyzing traffic patterns and cross-checking data in a consortium of more than 60 major companies. With its deep roots in airport security, AU10TIX has authenticated billions of identities and prevented over $18 billion in identity fraud. AU10TIX is a subsidiary of ICTS International N.V. (OTCQB: [ICTSF](https://www.prnewswire.com/news-releases/au10tix-q3-2024-global-identity-fraud-report-detects-skyrocketing-social-media-attacks-in-lead-up-to-us-presidential-election-302290323.html#financial-modal)). Connect with AU10TIX on [LinkedIn](https://www.linkedin.com/company/au10tix-limited/) and on X at [@AU10TIXLimited](https://x.com/AU10TIXLimited). For more information, visit [AU10TIX.com](https://www.au10tix.com). [](https://www.linkedin.com/sharing/share-offsite/?url=https://www.darkreading.com/cyber-risk/au10tix-q3-2024-global-identity-fraud-report-detects-skyrocketing-social-media-attacks)[](http://www.facebook.com/sharer/sharer.php?u=https://www.darkreading.com/cyber-risk/au10tix-q3-2024-global-identity-fraud-report-detects-skyrocketing-social-media-attacks)[](http://www.twitter.com/intent/tweet?url=https://www.darkreading.com/cyber-risk/au10tix-q3-2024-global-identity-fraud-report-detects-skyrocketing-social-media-attacks)[](/cdn-cgi/l/email-protection#b788c4c2d5ddd2d4c38af6e28687e3feef97e684978587858397f0dbd8d5d6db97fed3d2d9c3dec3ce97f1c5d6c2d397e5d2c7d8c5c397f3d2c3d2d4c3c497e4dccec5d8d4dcd2c3ded9d097e4d8d4ded6db97fad2d3ded697f6c3c3d6d4dcc491d6dac78cd5d8d3ce8afe928587c3dfd8c2d0dfc3928587c3dfd2928587d1d8dbdbd8c0ded9d0928587d1c5d8da928587f3d6c5dc928587e5d2d6d3ded9d0928587daded0dfc3928587ded9c3d2c5d2c4c3928587ced8c2999287f39287f69287f39287f6928587f6e28687e3feef928587e68492858785878583928587f0dbd8d5d6db928587fed3d2d9c3dec3ce928587f1c5d6c2d3928587e5d2c7d8c5c3928587f3d2c3d2d4c3c4928587e4dccec5d8d4dcd2c3ded9d0928587e4d8d4ded6db928587fad2d3ded6928587f6c3c3d6d4dcc49287f39287f6dfc3c3c7c49284f69285f19285f1c0c0c099d3d6c5dcc5d2d6d3ded9d099d4d8da9285f1d4ced5d2c59ac5dec4dc9285f1d6c28687c3decf9ac6849a858785839ad0dbd8d5d6db9aded3d2d9c3dec3ce9ad1c5d6c2d39ac5d2c7d8c5c39ad3d2c3d2d4c3c49ac4dccec5d8d4dcd2c3ded9d09ac4d8d4ded6db9adad2d3ded69ad6c3c3d6d4dcc4)[](https://www.reddit.com/submit?url=https://www.darkreading.com/cyber-risk/au10tix-q3-2024-global-identity-fraud-report-detects-skyrocketing-social-media-attacks&title=AU10TIX%20Q3%202024%20Global%20Identity%20Fraud%20Report%20Detects%20Skyrocketing%20Social%20Media%20Attacks) Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. [Subscribe](https://dr-resources.darkreading.com/free/w_defa3135/prgm.cgi)You May Also Like*** ** * ** ***More Insights Webinars* [Transform Your Security Operations And Move Beyond Legacy SIEM](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_palo243&ch=SBX&cid=_upcoming_webinars_8.500001500&_mc=_upcoming_webinars_8.500001500)Nov 6, 2024* [Unleashing AI to Assess Cyber Security Risk](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_dark71&ch=SBX&cid=_upcoming_webinars_8.500001492&_mc=_upcoming_webinars_8.500001492)Nov 12, 2024* [Securing Tomorrow, Today: How to Navigate Zero Trust](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa7186&ch=SBX&cid=_upcoming_webinars_8.500001490&_mc=_upcoming_webinars_8.500001490)Nov 13, 2024* [The State of Attack Surface Management (ASM), Featuring Forrester](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa7317&ch=SBX&cid=_upcoming_webinars_8.500001501&_mc=_upcoming_webinars_8.500001501)Nov 15, 2024* [Applying the Principle of Least Privilege to the Cloud](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&pc=w_wiza60&ch=SBX&cid=_upcoming_webinars_8.500001499&_mc=_upcoming_webinars_8.500001499)Nov 18, 2024[More Webinars](/resources?types=Webinar) ### Editor’s Choice[A job classifieds newspaper ![](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blte25dc75c91574848/6723cae10ab4443f50b9047d/jobs-Helen_Sessions-Alamy.jpg?width=700&auto=webp&quality=80&disable=upscale)](/application-security/cybersecurity-job-market-stagnates-dissatisfaction-abounds)[Application Security](/application-security) [Cybersecurity Job Market Stagnates, Dissatisfaction Abounds](/application-security/cybersecurity-job-market-stagnates-dissatisfaction-abounds)[Cybersecurity Job Market Stagnates, Dissatisfaction Abounds](/application-security/cybersecurity-job-market-stagnates-dissatisfaction-abounds) by[Tara Seals, Managing Editor, News, Dark Reading](/author/tara-seals) Oct 31, 2024 4 Min Read [CrowdStrike logo on a cellphone screen ![](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltd5b6b5acba4421a3/66a7eb4a06ddc84394436d14/Crowdstrike(1800)_SOPA_Images_Limited_Alamy.jpg?width=700&auto=webp&quality=80&disable=upscale)](/vulnerabilities-threats/case-against-abandoning-crowdstrike-post-outage)[Vulnerabilities -& Threats](/vulnerabilities-threats) [The Case Against Abandoning CrowdStrike Post-Outage](/vulnerabilities-threats/case-against-abandoning-crowdstrike-post-outage)[The Case Against Abandoning CrowdStrike Post-Outage](/vulnerabilities-threats/case-against-abandoning-crowdstrike-post-outage) by[Vishaal ‘V8’ Hariprasad](/author/vishaal-v8-hariprasad) Oct 31, 2024 5 Min Read [Chinese Navy guided-missile destroyer Xian steams ahead ![](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt2406b312c8c87fcf/6722a0dee4d8441ebc87ca84/China_navy-US_Navy_Photo-Alamy.jpg?width=700&auto=webp&quality=80&disable=upscale)](/cyberattacks-data-breaches/china-seabed-sentinels-spying-trump-taps)[Cyberattacks -& Data Breaches](/cyberattacks-data-breaches) [China Says Seabed Sentinels Are Spying, After Trump Taps](/cyberattacks-data-breaches/china-seabed-sentinels-spying-trump-taps)[China Says Seabed Sentinels Are Spying, After Trump Taps](/cyberattacks-data-breaches/china-seabed-sentinels-spying-trump-taps) by[Tara Seals, Managing Editor, News, Dark Reading](/author/tara-seals) Oct 31, 2024 4 Min Read Reports* [Managing Third-Party Risk Through Situational Awareness](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_cybo171&ch=&cid=_analytics_7.300006016&_mc=_analytics_7.300006016)Jul 31, 2024* [2024 InformationWeek US IT Salary Report](https://iw-resources.informationweek.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_ingg253&ch=sbx&cid=_analytics_7.300006014&_mc=_analytics_7.300006014)May 29, 2024[More Reports](/resources?types=Report) Webinars* [Transform Your Security Operations And Move Beyond Legacy SIEM](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_palo243&ch=SBX&cid=_upcoming_webinars_8.500001500&_mc=_upcoming_webinars_8.500001500)Nov 6, 2024* [Unleashing AI to Assess Cyber Security Risk](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_dark71&ch=SBX&cid=_upcoming_webinars_8.500001492&_mc=_upcoming_webinars_8.500001492)Nov 12, 2024* [Securing Tomorrow, Today: How to Navigate Zero Trust](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa7186&ch=SBX&cid=_upcoming_webinars_8.500001490&_mc=_upcoming_webinars_8.500001490)Nov 13, 2024* [The State of Attack Surface Management (ASM), Featuring Forrester](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa7317&ch=SBX&cid=_upcoming_webinars_8.500001501&_mc=_upcoming_webinars_8.500001501)Nov 15, 2024* [Applying the Principle of Least Privilege to the Cloud](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&pc=w_wiza60&ch=SBX&cid=_upcoming_webinars_8.500001499&_mc=_upcoming_webinars_8.500001499)Nov 18, 2024[More Webinars](/resources?types=Webinar) White Papers* [2024 Cloud Security Report](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_tren83&ch=SBX&cid=_whitepaper_14.500005795&_mc=_whitepaper_14.500005795)* [The State of Asset Security: Uncovering Alarming Gaps -& Unexpected Exposures](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa6965&ch=SBX&cid=_whitepaper_14.500005790&_mc=_whitepaper_14.500005790)* [A CISO’s Guide to Geopolitics and CyberSecurity](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa6908&ch=SBX&cid=_whitepaper_14.500005778&_mc=_whitepaper_14.500005778)* [SANS 2024 Security Awareness Report](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa6822&ch=SBX&cid=_whitepaper_14.500005770&_mc=_whitepaper_14.500005770)* [SANS Security Awareness Maturity Model](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa6823&ch=SBX&cid=_whitepaper_14.500005769&_mc=_whitepaper_14.500005769)[More Whitepapers](/resources?types=Whitepaper)
Related Tags:
NAICS: 518 – Computing Infrastructure Providers
Data Processing
Web Hosting
Related Services
NAICS: 51 – Information
Impersonation
Blog: Dark Reading
Software Discovery: Security Software Discovery
Software Discovery
Associated Indicators:
null