Close Menu
TechurzTechurz

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    My favorite projector from Samsung doubles as a gaming hub, and it’s discounted for Labor Day

    September 1, 2025

    Web3’s Speed Is No Longer Optional. It’s the Path to Adoption.

    September 1, 2025

    LayerX uses AI to cut enterprise back-office workload, scores $100M in Series B

    September 1, 2025
    Facebook X (Twitter) Instagram
    Trending
    • My favorite projector from Samsung doubles as a gaming hub, and it’s discounted for Labor Day
    • Web3’s Speed Is No Longer Optional. It’s the Path to Adoption.
    • LayerX uses AI to cut enterprise back-office workload, scores $100M in Series B
    • The M4 iPad Pro is discounted $100 as a last-minute Labor Day deal
    • Google Confirms Gmail Data Breach Warning Is Fake News
    • IEEE Presidents Note: Preserving Tech History’s Impact
    • Android Droppers Now Deliver SMS Stealers and Spyware, Not Just Banking Trojans
    • How to make IT operations more efficient
    Facebook X (Twitter) Instagram Pinterest Vimeo
    TechurzTechurz
    • Home
    • AI
    • Apps
    • News
    • Guides
    • Opinion
    • Reviews
    • Security
    • Startups
    TechurzTechurz
    Home»News»How AI-powered “repeaters” are quietly hacking banks and crypto platforms with deepfake identities
    News

    How AI-powered “repeaters” are quietly hacking banks and crypto platforms with deepfake identities

    TechurzBy TechurzMay 31, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Concept image of a person having their face scanned, indicating the risk of identity theft.
    Share
    Facebook Twitter LinkedIn Pinterest Email


    • Security experts say traditional identity checks fail because they treat each verification as an isolated event
    • Deepfake variations let fraudsters bypass biometric and liveness detection systems with ease
    • Consortium validation shares data across organizations to detect subtle, repeated fraud attempts in real time

    In a digital world increasingly shaped by artificial intelligence, identity fraud is evolving in scale and sophistication.

    Experts from AU10TIX have flagged a new threat tactic known as “Repeaters” which is reshaping the way fraudsters infiltrate digital systems.

    Unlike traditional attacks, these aren’t designed for instant damage – instead, Repeaters quietly test the defenses of banks, crypto platforms, and other services by using slightly varied synthetic identities.


    You may like

    Once weak points are identified, those same assets are redeployed across multiple platforms in large-scale, coordinated fraud campaigns.

    At the heart of this strategy are deepfake-enhanced identities, slightly modified versions of a core digital asset.

    These changes may include tweaks to facial features, background images, or document numbers.

    When examined individually, each variation appears legitimate, often bypassing traditional Know Your Customer (KYC) processes and biometric checks.

    Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

    AU10TIX’s CEO, Yair Tal, describes them as “the fingerprint of a new class of fraud: automated, AI-enhanced attacks that reuse synthetic identities and digital assets at scale.”

    What makes Repeaters particularly dangerous is how they exploit gaps in current fraud detection systems.

    Most traditional defenses rely on static validation, evaluating each identity as an isolated event. Techniques like biometric scans, liveness detection, and ID checks often miss the broader picture.

    Because these synthetic identities are only submitted a few times per platform and appear unique, conventional tools struggle to detect the repetition.

    To counter this threat, AU10TIX therefore introduces “consortium validation”. Unlike siloed systems, this method allows multiple organizations to share identity signals across a real-time network, just like the best endpoint protection platforms.

    If an identity, or even a slightly modified version, appears at more than one member organization, the system flags it immediately.

    It’s a collaborative defense strategy aimed at connecting the dots between otherwise isolated incidents.

    “We’re proud to be at the forefront of detecting and blocking these attacks through advanced pattern recognition and real-time consortium validation,” Tal added

    AU10TIX recommends organizations also audit for vulnerabilities to deepfakes and synthetic identities that can bypass traditional KYC defenses.

    It also recommends the close monitoring of behaviors across devices, sessions and onboarding events because it can reveal coordinated activities before they scale.

    The best chance at early detection of such fraudulent activity is a connected and behaviorally aware security infrastructure because no single solution can claim to be the best antivirus or the best malware protection against this new generation of fraud.

    You might also like

    AIpowered banks Crypto Deepfake Hacking identities Platforms Quietly repeaters
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleA new Nebraska law wants to make social media less addictive for kids
    Next Article How to Tell If Your Phone Has a Virus
    Techurz
    • Website

    Related Posts

    Security

    Chinese hacking group Salt Typhoon expansion prompts multinational advisory

    August 30, 2025
    Startups

    How to Protect Your Company From Deepfake Fraud

    August 29, 2025
    AI

    Google will now let everyone use its AI-powered video editor Vids

    August 27, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Start Saving Now: An iPhone 17 Pro Price Hike Is Likely, Says New Report

    August 17, 20258 Views

    You Can Now Get Starlink for $15-Per-Month in New York, but There’s a Catch

    July 11, 20257 Views

    Non-US businesses want to cut back on using US cloud systems

    June 2, 20257 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    Start Saving Now: An iPhone 17 Pro Price Hike Is Likely, Says New Report

    August 17, 20258 Views

    You Can Now Get Starlink for $15-Per-Month in New York, but There’s a Catch

    July 11, 20257 Views

    Non-US businesses want to cut back on using US cloud systems

    June 2, 20257 Views
    Our Picks

    My favorite projector from Samsung doubles as a gaming hub, and it’s discounted for Labor Day

    September 1, 2025

    Web3’s Speed Is No Longer Optional. It’s the Path to Adoption.

    September 1, 2025

    LayerX uses AI to cut enterprise back-office workload, scores $100M in Series B

    September 1, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer
    © 2025 techurz. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.