Like selling your virtual soul: Researchers uncover extraordinary identity farming operation where the culprits are the victims
Advanced attackers use AI and real documents to bypass security systems
- Across LATAM and East Europe, people are deliberately selling their ID documents
- Individuals willingly provide photos and documentation in exchange for payment
- This twist in ID misuse criminality makes standard forgery detection redundant
Researchers at iProov have uncovered a complex dark web operation aimed at undermining Know Your Customer (KYC) verification processes.
Unlike conventional identity theft, the scheme involves unsuspecting victims voluntarily handing over their identity documents and facial images in return for financial compensation.
This approach, dubbed "identity farming," allows criminals to exploit genuine credentials to bypass verification systems, complicating detection efforts.
Exploiting genuine credentials
In amassing genuine credentials, the operation, predominantly active in the LATAM region (Latin America), can outwit traditional document verification methods that excel at spotting forgeries or alterations.
While similar activities have been observed in Eastern Europe, no direct connection between the groups has been established.
In regions facing economic hardship and high unemployment, individuals are willing to compromise their identities for short-term financial gains.
Fraudsters exploit their victims in this way, offering payment in exchange for identity documents and biometric data, often under false pretenses. Many victims perceive this as a low-risk transaction.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
How identity farming operations work
Attackers are a mixed ability group. Those at entry-level rely on simple yet effective techniques such as presenting static images or pre-recorded videos.
More sophisticated actors employ advanced tools like face-swapping software and lighting manipulations, and the most capable attackers use custom AI models and 3D animations, designed to mimic natural human behavior in real-time.
According to iProov, there's a need for a multi-layered strategy when safeguarding identity verification systems.
This includes measures such as verifying that the presented identity aligns with official documentation, using embedded imagery and metadata analysis to confirm the presence of a real person, and deploying real-time challenge-response systems to detect fraudulent behavior.
"What's particularly alarming about this discovery is not just the sophisticated nature of the operation, but the fact that individuals are willingly compromising their identities for short-term financial gain," said Andrew Newell, Chief Scientific Officer at iProov.
"When people sell their identity documents and biometric data, they're not just risking their own financial security - they're providing criminals with complete, genuine identity packages that can be used for sophisticated impersonation fraud."
"These identities are particularly dangerous because they include both real documents and matching biometric data, making them extremely difficult to detect through traditional verification methods.’’
You might also like
- Identity fraud attacks using AI are fooling biometric security systems
- These are the best customer database software
- Here are the best IT asset management software
Efosa has been writing about technology for over 7 years, initially driven by curiosity but now fueled by a strong passion for the field. He holds both a Master's and a PhD in sciences, which provided him with a solid foundation in analytical thinking. Efosa developed a keen interest in technology policy, specifically exploring the intersection of privacy, security, and politics. His research delves into how technological advancements influence regulatory frameworks and societal norms, particularly concerning data protection and cybersecurity. Upon joining TechRadar Pro, in addition to privacy and technology policy, he is also focused on B2B security products. Efosa can be contacted at this email: udinmwenefosa@gmail.com