Close Menu
TechurzTechurz
    What's Hot

    Quartermaster is building a maritime hive mind

    May 20, 2026

    From teen hacker to Iron Dome researcher, this founder raised $28M to fight AI phishing

    May 19, 2026

    ‘Survivor’ stars Kyle Fraser and Kamilla Karthigesu introduce a goal-tracking app, Paprclip

    May 19, 2026
    Facebook X (Twitter) Instagram
    Tech Pulse
    • Quartermaster is building a maritime hive mind
    • From teen hacker to Iron Dome researcher, this founder raised $28M to fight AI phishing
    • ‘Survivor’ stars Kyle Fraser and Kamilla Karthigesu introduce a goal-tracking app, Paprclip
    • Forget the feed: Status AI raises $17M to turn social media into interactive entertainment
    • Stilta raises $10.5M from a16z and YC to help companies rediscover the patents they forgot they had
    X (Twitter) Pinterest YouTube LinkedIn WhatsApp
    TechurzTechurz
    • Home
    • AI Systems
    • Cyber Reality
    • Future Tech
    • Disruption Lab
    • Signals
    • Tech Pulse
    TechurzTechurz
    Home - News - How AI-powered “repeaters” are quietly hacking banks and crypto platforms with deepfake identities
    News

    How AI-powered “repeaters” are quietly hacking banks and crypto platforms with deepfake identities

    TechurzBy TechurzMay 31, 2025Updated:May 11, 2026No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Concept image of a person having their face scanned, indicating the risk of identity theft.
    Share
    Facebook Twitter LinkedIn Pinterest Email


    • Security experts say traditional identity checks fail because they treat each verification as an isolated event
    • Deepfake variations let fraudsters bypass biometric and liveness detection systems with ease
    • Consortium validation shares data across organizations to detect subtle, repeated fraud attempts in real time

    In a digital world increasingly shaped by artificial intelligence, identity fraud is evolving in scale and sophistication.

    Experts from AU10TIX have flagged a new threat tactic known as “Repeaters” which is reshaping the way fraudsters infiltrate digital systems.

    Unlike traditional attacks, these aren’t designed for instant damage – instead, Repeaters quietly test the defenses of banks, crypto platforms, and other services by using slightly varied synthetic identities.


    You may like

    Once weak points are identified, those same assets are redeployed across multiple platforms in large-scale, coordinated fraud campaigns.

    At the heart of this strategy are deepfake-enhanced identities, slightly modified versions of a core digital asset.

    These changes may include tweaks to facial features, background images, or document numbers.

    When examined individually, each variation appears legitimate, often bypassing traditional Know Your Customer (KYC) processes and biometric checks.

    Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

    AU10TIX’s CEO, Yair Tal, describes them as “the fingerprint of a new class of fraud: automated, AI-enhanced attacks that reuse synthetic identities and digital assets at scale.”

    What makes Repeaters particularly dangerous is how they exploit gaps in current fraud detection systems.

    Most traditional defenses rely on static validation, evaluating each identity as an isolated event. Techniques like biometric scans, liveness detection, and ID checks often miss the broader picture.

    Because these synthetic identities are only submitted a few times per platform and appear unique, conventional tools struggle to detect the repetition.

    To counter this threat, AU10TIX therefore introduces “consortium validation”. Unlike siloed systems, this method allows multiple organizations to share identity signals across a real-time network, just like the best endpoint protection platforms.

    If an identity, or even a slightly modified version, appears at more than one member organization, the system flags it immediately.

    It’s a collaborative defense strategy aimed at connecting the dots between otherwise isolated incidents.

    “We’re proud to be at the forefront of detecting and blocking these attacks through advanced pattern recognition and real-time consortium validation,” Tal added

    AU10TIX recommends organizations also audit for vulnerabilities to deepfakes and synthetic identities that can bypass traditional KYC defenses.

    It also recommends the close monitoring of behaviors across devices, sessions and onboarding events because it can reveal coordinated activities before they scale.

    The best chance at early detection of such fraudulent activity is a connected and behaviorally aware security infrastructure because no single solution can claim to be the best antivirus or the best malware protection against this new generation of fraud.

    You might also like

    AIpowered banks Crypto Deepfake Hacking identities Platforms Quietly repeaters
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleA new Nebraska law wants to make social media less addictive for kids
    Next Article How to Tell If Your Phone Has a Virus
    Techurz
    • Website

    Related Posts

    Opinion

    AI Dungeon maker Latitude unveils Voyage, a platform for creating AI-powered RPGs

    April 21, 2026
    Opinion

    Luma launches AI-powered production studio with faith-focused Wonder Project

    April 17, 2026
    Opinion

    Welcome to the post-hype crypto market

    February 25, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    College social app Fizz expands into grocery delivery

    September 3, 20252,288 Views

    A Former Apple Luminary Sets Out to Create the Ultimate GPU Software

    September 25, 202516 Views

    The Reason Murderbot’s Tone Feels Off

    May 14, 202512 Views
    Stay In Touch
    • YouTube
    • WhatsApp
    • Twitter
    • Pinterest
    • LinkedIn
    Latest Reviews

    Techurz is a future-first technology publication covering AI systems, cyber reality, future tech, disruption, and digital signals — written today, searched tomorrow.

    Useful Links
    • Affiliate Disclosure
    • Terms and Conditions
    • Privacy Policy
    • Cookie Policy
    • Write For Us
    • About Us
    • Contact Us
    USEFUL LINKS
    • Our Authors / Editorial Team
    • Advertise
    • Disclaimer
    • DMCA
    • Editorial Policy
    • Sitemap

    Join the Techurz Brief

    The future does not arrive suddenly.
    Get sharp weekly signals on the technologies, risks, tools, and shifts that matter before they become obvious.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer
    © 2026 techurz. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.