- Security experts say traditional identity control fails because they treat each verification as an isolated event
- Deepfake Variations Easy scammers bypassing Biometric and Livity Detection Systems Easy
- Consortium Validation shares data across organizations to detect subtle, repeated fraud attempts in real time
In a digital world that is increasingly shaped by artificial intelligence, identity fraud develops in scale and sophistication.
Experts from AU10TIX have marked a new threat acting that is known as “repeaters” which transforms the way scammers infiltrate digital systems.
Unlike traditional attacks, these are not designed for immediate damage – instead, the repeaters test quietly defense of banks, crypto platforms and other services using slightly varied synthetic identities.
Once the weak points are identified, the same assets are rediscovered across multiple platforms in large, coordinated fraud campaigns.
In the heart of this strategy, deep phase -enhanced identities are easily modified versions of a centrally digital asset.
These changes may include adjustments to facial features, background images or document numbers.
When examined individually, each variation occurs legitimate, often bypassing traditional Know Your Customer (KYC) processes and biometric controls.
AU10TIX CEO, YAIR TAL, describes them as “the fingerprint of a new class of fraud: automated, AI-enhanced attacks that reuse synthetic identities and digital assets on scale.”
What makes repeaters particularly dangerous is how they utilize gaps in current declaration of fraud.
Most traditional defense depends on static validation and evaluating each identity as an isolated event. Techniques such as Biometric Scans, Livity -Detection and ID -Check often miss out on the wider image.
Because these synthetic identities are submitted only a few times per day. Platform and occurs unique, fighting conventional tools to detect repetition.
Therefore, to counter this threat, AU10TIX introduces “consortium validation”. Unlike Siled systems, this method allows multiple organizations to share identity signals across a real-time network, as well as the best Endpoint protection platforms.
If an identity, or even a slightly modified version, appears on more than one member organization, the system will mark it immediately.
It is a collaborative defense strategy that aims to connect the dots between otherwise isolated events.
“We are proud to be at the forefront of discovering and blocking these attacks through advanced pattern recognition and real -time consortium validation,” numbers added
AU10TIX also recommends organizations revision of vulnerabilities to deep -fakes and synthetic identities that can bypass traditional KYC defense.
It also recommends the close monitoring of behavior across devices, sessions and onboarding events because it can reveal coordinated activities before scaling.
The best chance of early detection of such fraudulent activity is a connected and behaviorally attentive security infrastructure because no single solution can claim to be the best antivirus or the best malware protection against this new generation of fraud.



