SlideShare a Scribd company logo
1 of 19
Download to read offline
Global Identity
Fraud Report 2020
Copyright © Shufti Pro Ltd. All Rights Reserved. Copyright © Shufti Pro Ltd. All Rights Reserved.
Global Fraud Overview
02 | Global Fraud Overview
A 3.36% increase in identity fraud was observed in 2020
Egypt, Singapore and Switzerland experienced the highest
number of identity frauds
Biometric fraud attempts increased in 2020
Fake IDs, synthetic IDs, and doctored identity documents
were frequently used to manipulate document verification
checks
Frauds have become technically and strategically more
sophisticated than before
Biometric Fraud 2020
03 | Biometric Fraud 2020
Biometric fraud attempts are still not sophisticated enough
to beat biometric authentication
Biometric frauds skyrocketed in Australia, Cyprus, Egypt,
USA and Italy
Most common biometric frauds in 2020:
2D and 3D masks
Photoshopped images
Deep fakes
Photoshopped Images are
widely used for biometric fraud
04 | Photoshopped Images are widely used for biometric fraud
Intentionally modified or reconstructed digital images that
are difficult to identify with the naked eye
Fraudsters carry out financial crimes, access user identity,
disseminate incorrect information, and use the new fake
identity to defraud businesses.
Shufti Pro has trained AI models with real data to enhance
accuracy of the system
Identifies minor photo tweaks and captures fraud in the
blink of an eye
2D and 3D Face Masks
These attacks spoof the facial verification system
Traditional spoof attacks incorporate printed pictures,
replaying a video, 2D and 3D face masks
End-users cut eye holes on a paper-backed photo to
manipulate the face verification system
2D and 3D face mask attacks became more sophisticated
in 2020
05 | 2D and 3D Face Masks
Deep Fakes - a facet of biometric
fraud
Videos that have been manipulated with deep learning
techniques to make people believe the false
Fraudsters edit certain words or statements in the videos
to make them more authentic
Cyber criminals use deepfakes to dodge liveness detection
checks
It is predicted that 180,000 deep fake videos of victims
will be online in 2021
06 | Deep Fakes - a facet of biometric fraud
07 | AI-Powered Checks to Identify Biometric Fraud
AI-Powered
Checks to
Identify
Biometric Fraud
ID Document Fraud 2020
Around 19.78% of document verifications were some sort
of document fraud attempt
ID document fraud rate in 2020 was 1.34% higher than
in 2019
China, Egypt, Switzerland, and Sweden showed the
most increase in ID fraud
Two most common strategies for surpassing identity
verification checks are:
Tampering
Creating fake ID documents
08 | ID Document Fraud 2020
09 | ID Document Fraud Rate in 2019 and 2020
Synthetic Identity Fraud
Fraudsters consolidate both genuine and false data to
generate a new identity
For instance, an authentic SSN is combined with a fake PII
(Personally Identifiable Information)
According to the Federal Reserve Report, synthetic
identity fraud is the hardest fraud to detect due to
which 85 to 95% of this fraud is not flagged during
identity verification
10 | Synthetic Identity Fraud
IDENTITY FRAUD
Fake Documents
Criminals use advance technology to create government-
issued ID documents
The majority of these fake documents are created using
stolen identities
Fake documents are widely used to surpass ID
verification checks during the customer onboarding
Enhanced AI-powered document verification
authenticates the type, origin, hologram, and
rainbow prints
11 | Fake Documents
Doctored & Counterfeit IDs
Criminals create multiple versions of stolen identities
These versions are doctored IDs that were widely used to
dodge identity verification checks
Counterfeit identities are copies of real ID
documents
In 2020, digital counterfeit was higher than physical
ID document
12 | Doctored & Counterfeit IDs
AI-Powered
Checks to
Identify ID
Document Fraud
13 | AI-Powered Checks to Identify ID Document Fraud
Holiday Season and ID
Fraud 2020
This year, the virtual holiday season brought a rise in
fraud attempts
The number of fraud attempts made between January and
October is equivalent to the fraudulent activities in
November and December
Fraud rate:
- during 2020 from January to October 16.63%
- solely in the holiday season (November - December) 20.55%
14 | Holiday Season and ID Fraud 2020
15 | Holiday Season Fraud Rate in 2019 and 2020
Holiday
Season Fraud
Rate in 2019
and 2020
Industries with the Highest Rate of ID Fraud in 2020
Finance Sector
Identity theft grew by 13% between
2019 and 2020 in the finance sector
Insurance Sector
There was a 5% increase in
insurance fraud claims in 2020
Gaming Industry
Account takeover fraud significantly
increased in 2020
Government Agencies
Unemployment fraud and pension
fund fraud rapidly increased in 2020
Cryptocurrency
2020 experienced the highest rate of crypto
crimes accounting for USD 1.36 billion
16 | Industries with the Highest Rate of ID Fraud in 2020
Predictions for 2021
Synthetic identity fraud will become more common
Replay attacks will increase in 2021
Deep fakes will hinder biometric authentication
Re-victimisation will be the new normal for criminals
Healthcare fraud is expected to grow
Business Email Compromise (BEC) is another emerging
threat for businesses
17 | Predictions for 2021
AI-Powered Solutions to
Fight Identity Fraud
Know Your Customer (KYC) identity verification
- Document Verification
- Face Verification
- Address Verification
- Consent Verification
Video Interview KYC
Anti-Money Laundering (AML) Suite
18 | AI-Powered Solutions to Fight Identity Fraud
Download Shufti Pro Global
Identity Fraud Report 2020
Contact us
You can also call us at: +44 01225290329

More Related Content

What's hot

Cyber Claims: GDPR and business email compromise drive greater frequencies
Cyber Claims: GDPR and business email compromise drive greater frequenciesCyber Claims: GDPR and business email compromise drive greater frequencies
Cyber Claims: GDPR and business email compromise drive greater frequenciesΔρ. Γιώργος K. Κασάπης
 
State of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingState of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingIJSRED
 
Top Ten Trends in Lending and Leasing 2017
Top Ten Trends in Lending and Leasing 2017Top Ten Trends in Lending and Leasing 2017
Top Ten Trends in Lending and Leasing 2017Capgemini
 
White Paper on Raising The Cyber Security Bar In The Journey To a Digital India
White Paper on Raising The Cyber Security Bar In The Journey To a Digital IndiaWhite Paper on Raising The Cyber Security Bar In The Journey To a Digital India
White Paper on Raising The Cyber Security Bar In The Journey To a Digital IndiaRaaj Khanna
 
South Africa: A Digital Innovation Hub for Financial Services
South Africa: A Digital Innovation Hub for Financial ServicesSouth Africa: A Digital Innovation Hub for Financial Services
South Africa: A Digital Innovation Hub for Financial ServicesSeymourSloan
 
Payments Trends 2017
Payments Trends 2017Payments Trends 2017
Payments Trends 2017Capgemini
 
BCG_Digital_Insurance_in_Italy_Mar_2015_-__1
BCG_Digital_Insurance_in_Italy_Mar_2015_-__1BCG_Digital_Insurance_in_Italy_Mar_2015_-__1
BCG_Digital_Insurance_in_Italy_Mar_2015_-__1Carlo Bravin
 
Enterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to AdaptEnterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to AdaptCapgemini
 
Online Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
Online Transaction Fraud Detection using Hidden Markov Model & Behavior AnalysisOnline Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
Online Transaction Fraud Detection using Hidden Markov Model & Behavior AnalysisCSCJournals
 
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfDetecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfMoney 2Conf
 
Blockchain: Instead of Why, Ask Why Not?
Blockchain: Instead of Why, Ask Why Not?Blockchain: Instead of Why, Ask Why Not?
Blockchain: Instead of Why, Ask Why Not?Cognizant
 
Fintech Report Argentina 2017 [ENG]
Fintech Report Argentina 2017 [ENG]Fintech Report Argentina 2017 [ENG]
Fintech Report Argentina 2017 [ENG]pablobaldoma
 
2020 Fintech Trends amidst a huge digital shift
2020 Fintech Trends amidst a huge digital shift2020 Fintech Trends amidst a huge digital shift
2020 Fintech Trends amidst a huge digital shiftSai Sundar
 
Disruptions and Digital Banking Trends by Luigi Wewege, Jeo Lee and Michael C...
Disruptions and Digital Banking Trends by Luigi Wewege, Jeo Lee and Michael C...Disruptions and Digital Banking Trends by Luigi Wewege, Jeo Lee and Michael C...
Disruptions and Digital Banking Trends by Luigi Wewege, Jeo Lee and Michael C...Luigi Wewege
 

What's hot (16)

Cyber Claims: GDPR and business email compromise drive greater frequencies
Cyber Claims: GDPR and business email compromise drive greater frequenciesCyber Claims: GDPR and business email compromise drive greater frequencies
Cyber Claims: GDPR and business email compromise drive greater frequencies
 
State of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingState of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in Banking
 
Top Ten Trends in Lending and Leasing 2017
Top Ten Trends in Lending and Leasing 2017Top Ten Trends in Lending and Leasing 2017
Top Ten Trends in Lending and Leasing 2017
 
White Paper on Raising The Cyber Security Bar In The Journey To a Digital India
White Paper on Raising The Cyber Security Bar In The Journey To a Digital IndiaWhite Paper on Raising The Cyber Security Bar In The Journey To a Digital India
White Paper on Raising The Cyber Security Bar In The Journey To a Digital India
 
South Africa: A Digital Innovation Hub for Financial Services
South Africa: A Digital Innovation Hub for Financial ServicesSouth Africa: A Digital Innovation Hub for Financial Services
South Africa: A Digital Innovation Hub for Financial Services
 
Payments Trends 2017
Payments Trends 2017Payments Trends 2017
Payments Trends 2017
 
Building online truste commerce
Building online truste commerceBuilding online truste commerce
Building online truste commerce
 
BCG_Digital_Insurance_in_Italy_Mar_2015_-__1
BCG_Digital_Insurance_in_Italy_Mar_2015_-__1BCG_Digital_Insurance_in_Italy_Mar_2015_-__1
BCG_Digital_Insurance_in_Italy_Mar_2015_-__1
 
B2B Tech Trends 2019
B2B Tech Trends 2019B2B Tech Trends 2019
B2B Tech Trends 2019
 
Enterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to AdaptEnterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to Adapt
 
Online Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
Online Transaction Fraud Detection using Hidden Markov Model & Behavior AnalysisOnline Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
Online Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
 
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfDetecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2Conf
 
Blockchain: Instead of Why, Ask Why Not?
Blockchain: Instead of Why, Ask Why Not?Blockchain: Instead of Why, Ask Why Not?
Blockchain: Instead of Why, Ask Why Not?
 
Fintech Report Argentina 2017 [ENG]
Fintech Report Argentina 2017 [ENG]Fintech Report Argentina 2017 [ENG]
Fintech Report Argentina 2017 [ENG]
 
2020 Fintech Trends amidst a huge digital shift
2020 Fintech Trends amidst a huge digital shift2020 Fintech Trends amidst a huge digital shift
2020 Fintech Trends amidst a huge digital shift
 
Disruptions and Digital Banking Trends by Luigi Wewege, Jeo Lee and Michael C...
Disruptions and Digital Banking Trends by Luigi Wewege, Jeo Lee and Michael C...Disruptions and Digital Banking Trends by Luigi Wewege, Jeo Lee and Michael C...
Disruptions and Digital Banking Trends by Luigi Wewege, Jeo Lee and Michael C...
 

Similar to Global Identity Fraud Report 2020

Digital Fraud Prevention and Detection Techniques in 2024
Digital Fraud Prevention and Detection Techniques in 2024Digital Fraud Prevention and Detection Techniques in 2024
Digital Fraud Prevention and Detection Techniques in 2024FTx Identity
 
KYC Solutions for online gambling
KYC Solutions for online gamblingKYC Solutions for online gambling
KYC Solutions for online gamblingTrustIDnow
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docxwlynn1
 
How AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdfHow AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdfVLink Inc
 
Identity Verification: Who’s Really There?
Identity Verification: Who’s Really There?	Identity Verification: Who’s Really There?
Identity Verification: Who’s Really There? Ping Identity
 
Keep your office secure
Keep your office secureKeep your office secure
Keep your office secureKonica Minolta
 
phishingattackseminarpresentation-211230055252.pdf
phishingattackseminarpresentation-211230055252.pdfphishingattackseminarpresentation-211230055252.pdf
phishingattackseminarpresentation-211230055252.pdfchauhan323234
 
Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation AniketPandit18
 
THE CHANGING FACE OF IDENTITY THEFT
THE CHANGING FACE OF IDENTITY THEFTTHE CHANGING FACE OF IDENTITY THEFT
THE CHANGING FACE OF IDENTITY THEFT- Mark - Fullbright
 
5 Quest Fake News Survey Results June 2020
5 Quest Fake News Survey Results June 20205 Quest Fake News Survey Results June 2020
5 Quest Fake News Survey Results June 2020ZIGRAM
 
TeleSign’s Findings on the Future of Digital Identity, Guillaume Bourcy
TeleSign’s Findings on the Future of Digital Identity, Guillaume BourcyTeleSign’s Findings on the Future of Digital Identity, Guillaume Bourcy
TeleSign’s Findings on the Future of Digital Identity, Guillaume BourcyAlan Quayle
 
Ins & Outs of Biometric Authentication
Ins & Outs of Biometric AuthenticationIns & Outs of Biometric Authentication
Ins & Outs of Biometric AuthenticationIVR Technology Group
 
Fraud-Fighting Trends 2017
Fraud-Fighting Trends 2017Fraud-Fighting Trends 2017
Fraud-Fighting Trends 2017Sarah Beldo
 
Cyber crime ppt college.pptx
Cyber crime ppt college.pptxCyber crime ppt college.pptx
Cyber crime ppt college.pptxvb334531
 
Insurance Fraud (Business Decision Making Project - Fina.docx
Insurance Fraud (Business Decision Making Project - Fina.docxInsurance Fraud (Business Decision Making Project - Fina.docx
Insurance Fraud (Business Decision Making Project - Fina.docxmariuse18nolet
 
Presenting and persuading with data
Presenting and persuading with dataPresenting and persuading with data
Presenting and persuading with dataEstrella Spaans
 

Similar to Global Identity Fraud Report 2020 (20)

Digital Fraud Prevention and Detection Techniques in 2024
Digital Fraud Prevention and Detection Techniques in 2024Digital Fraud Prevention and Detection Techniques in 2024
Digital Fraud Prevention and Detection Techniques in 2024
 
KYC Solutions for online gambling
KYC Solutions for online gamblingKYC Solutions for online gambling
KYC Solutions for online gambling
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
 
How AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdfHow AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdf
 
Identity Verification: Who’s Really There?
Identity Verification: Who’s Really There?	Identity Verification: Who’s Really There?
Identity Verification: Who’s Really There?
 
What CFEs can do about digital ad fraud
What CFEs can do about digital ad fraudWhat CFEs can do about digital ad fraud
What CFEs can do about digital ad fraud
 
Keep your office secure
Keep your office secureKeep your office secure
Keep your office secure
 
phishingattackseminarpresentation-211230055252.pdf
phishingattackseminarpresentation-211230055252.pdfphishingattackseminarpresentation-211230055252.pdf
phishingattackseminarpresentation-211230055252.pdf
 
Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation
 
THE CHANGING FACE OF IDENTITY THEFT
THE CHANGING FACE OF IDENTITY THEFTTHE CHANGING FACE OF IDENTITY THEFT
THE CHANGING FACE OF IDENTITY THEFT
 
Ad fraud update for publishers Feb 2020
Ad fraud update for publishers Feb 2020Ad fraud update for publishers Feb 2020
Ad fraud update for publishers Feb 2020
 
5 Quest Fake News Survey Results June 2020
5 Quest Fake News Survey Results June 20205 Quest Fake News Survey Results June 2020
5 Quest Fake News Survey Results June 2020
 
TeleSign’s Findings on the Future of Digital Identity, Guillaume Bourcy
TeleSign’s Findings on the Future of Digital Identity, Guillaume BourcyTeleSign’s Findings on the Future of Digital Identity, Guillaume Bourcy
TeleSign’s Findings on the Future of Digital Identity, Guillaume Bourcy
 
Ad fraud is cash out for hacking
Ad fraud is cash out for hackingAd fraud is cash out for hacking
Ad fraud is cash out for hacking
 
2021 update on ad fraud brand safety privacy
2021 update on ad fraud brand safety privacy2021 update on ad fraud brand safety privacy
2021 update on ad fraud brand safety privacy
 
Ins & Outs of Biometric Authentication
Ins & Outs of Biometric AuthenticationIns & Outs of Biometric Authentication
Ins & Outs of Biometric Authentication
 
Fraud-Fighting Trends 2017
Fraud-Fighting Trends 2017Fraud-Fighting Trends 2017
Fraud-Fighting Trends 2017
 
Cyber crime ppt college.pptx
Cyber crime ppt college.pptxCyber crime ppt college.pptx
Cyber crime ppt college.pptx
 
Insurance Fraud (Business Decision Making Project - Fina.docx
Insurance Fraud (Business Decision Making Project - Fina.docxInsurance Fraud (Business Decision Making Project - Fina.docx
Insurance Fraud (Business Decision Making Project - Fina.docx
 
Presenting and persuading with data
Presenting and persuading with dataPresenting and persuading with data
Presenting and persuading with data
 

Recently uploaded

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Global Identity Fraud Report 2020

  • 1. Global Identity Fraud Report 2020 Copyright © Shufti Pro Ltd. All Rights Reserved. Copyright © Shufti Pro Ltd. All Rights Reserved.
  • 2. Global Fraud Overview 02 | Global Fraud Overview A 3.36% increase in identity fraud was observed in 2020 Egypt, Singapore and Switzerland experienced the highest number of identity frauds Biometric fraud attempts increased in 2020 Fake IDs, synthetic IDs, and doctored identity documents were frequently used to manipulate document verification checks Frauds have become technically and strategically more sophisticated than before
  • 3. Biometric Fraud 2020 03 | Biometric Fraud 2020 Biometric fraud attempts are still not sophisticated enough to beat biometric authentication Biometric frauds skyrocketed in Australia, Cyprus, Egypt, USA and Italy Most common biometric frauds in 2020: 2D and 3D masks Photoshopped images Deep fakes
  • 4. Photoshopped Images are widely used for biometric fraud 04 | Photoshopped Images are widely used for biometric fraud Intentionally modified or reconstructed digital images that are difficult to identify with the naked eye Fraudsters carry out financial crimes, access user identity, disseminate incorrect information, and use the new fake identity to defraud businesses. Shufti Pro has trained AI models with real data to enhance accuracy of the system Identifies minor photo tweaks and captures fraud in the blink of an eye
  • 5. 2D and 3D Face Masks These attacks spoof the facial verification system Traditional spoof attacks incorporate printed pictures, replaying a video, 2D and 3D face masks End-users cut eye holes on a paper-backed photo to manipulate the face verification system 2D and 3D face mask attacks became more sophisticated in 2020 05 | 2D and 3D Face Masks
  • 6. Deep Fakes - a facet of biometric fraud Videos that have been manipulated with deep learning techniques to make people believe the false Fraudsters edit certain words or statements in the videos to make them more authentic Cyber criminals use deepfakes to dodge liveness detection checks It is predicted that 180,000 deep fake videos of victims will be online in 2021 06 | Deep Fakes - a facet of biometric fraud
  • 7. 07 | AI-Powered Checks to Identify Biometric Fraud AI-Powered Checks to Identify Biometric Fraud
  • 8. ID Document Fraud 2020 Around 19.78% of document verifications were some sort of document fraud attempt ID document fraud rate in 2020 was 1.34% higher than in 2019 China, Egypt, Switzerland, and Sweden showed the most increase in ID fraud Two most common strategies for surpassing identity verification checks are: Tampering Creating fake ID documents 08 | ID Document Fraud 2020
  • 9. 09 | ID Document Fraud Rate in 2019 and 2020
  • 10. Synthetic Identity Fraud Fraudsters consolidate both genuine and false data to generate a new identity For instance, an authentic SSN is combined with a fake PII (Personally Identifiable Information) According to the Federal Reserve Report, synthetic identity fraud is the hardest fraud to detect due to which 85 to 95% of this fraud is not flagged during identity verification 10 | Synthetic Identity Fraud IDENTITY FRAUD
  • 11. Fake Documents Criminals use advance technology to create government- issued ID documents The majority of these fake documents are created using stolen identities Fake documents are widely used to surpass ID verification checks during the customer onboarding Enhanced AI-powered document verification authenticates the type, origin, hologram, and rainbow prints 11 | Fake Documents
  • 12. Doctored & Counterfeit IDs Criminals create multiple versions of stolen identities These versions are doctored IDs that were widely used to dodge identity verification checks Counterfeit identities are copies of real ID documents In 2020, digital counterfeit was higher than physical ID document 12 | Doctored & Counterfeit IDs
  • 13. AI-Powered Checks to Identify ID Document Fraud 13 | AI-Powered Checks to Identify ID Document Fraud
  • 14. Holiday Season and ID Fraud 2020 This year, the virtual holiday season brought a rise in fraud attempts The number of fraud attempts made between January and October is equivalent to the fraudulent activities in November and December Fraud rate: - during 2020 from January to October 16.63% - solely in the holiday season (November - December) 20.55% 14 | Holiday Season and ID Fraud 2020
  • 15. 15 | Holiday Season Fraud Rate in 2019 and 2020 Holiday Season Fraud Rate in 2019 and 2020
  • 16. Industries with the Highest Rate of ID Fraud in 2020 Finance Sector Identity theft grew by 13% between 2019 and 2020 in the finance sector Insurance Sector There was a 5% increase in insurance fraud claims in 2020 Gaming Industry Account takeover fraud significantly increased in 2020 Government Agencies Unemployment fraud and pension fund fraud rapidly increased in 2020 Cryptocurrency 2020 experienced the highest rate of crypto crimes accounting for USD 1.36 billion 16 | Industries with the Highest Rate of ID Fraud in 2020
  • 17. Predictions for 2021 Synthetic identity fraud will become more common Replay attacks will increase in 2021 Deep fakes will hinder biometric authentication Re-victimisation will be the new normal for criminals Healthcare fraud is expected to grow Business Email Compromise (BEC) is another emerging threat for businesses 17 | Predictions for 2021
  • 18. AI-Powered Solutions to Fight Identity Fraud Know Your Customer (KYC) identity verification - Document Verification - Face Verification - Address Verification - Consent Verification Video Interview KYC Anti-Money Laundering (AML) Suite 18 | AI-Powered Solutions to Fight Identity Fraud
  • 19. Download Shufti Pro Global Identity Fraud Report 2020 Contact us You can also call us at: +44 01225290329