{"id":163,"date":"2022-01-29T13:42:34","date_gmt":"2022-01-29T13:42:34","guid":{"rendered":"https:\/\/prod.ondato.com\/?p=163"},"modified":"2025-10-02T13:50:06","modified_gmt":"2025-10-02T10:50:06","slug":"spoofing-101-biometrics-fraud","status":"publish","type":"post","link":"https:\/\/ondato.com\/pl\/blog\/spoofing-101-biometrics-fraud\/","title":{"rendered":"Spoofing 101: Biometrics Fraud"},"content":{"rendered":"\n<p>While the reliance on traditional passwords is shrinking, other authentication methods are carving their way into your most-used services. Since they&#8217;re newer, it would seem that this would probably mean that they&#8217;re more resilient against spoofing attempts. Though, the reality of it is that as authentication tech is advancing, so are the methods to bypass it.<\/p>\n\n\n\n<p>Hackers are catching up to <a href=\"https:\/\/ondato.com\/benefits-of-biometric-authentication\/\" target=\"_blank\" rel=\"noreferrer noopener\">biometric authentication<\/a>, which was seen as an uncrackable measure against spoofing attempts. Those attacks are very harmful because the idea that it can be done isn&#8217;t in the top-of-mind awareness for most of the public.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Biometric Spoofing<\/h2>\n\n\n\n<p>To put it bluntly, biometric spoofing is a method in which the perpetrator tries to fool the face recognition checks by imitating other human beings. While previously, this was seen only as something that spies do in Hollywood movies, we&#8217;ve now reached the point where this is very much a reality. To avoid being caught off-guard, let&#8217;s familiarize ourselves with the main types of biometric spoofing.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Photo Attacks<\/h2>\n\n\n\n<p>This type uses printed or displayed person&#8217;s face photos to bypass the checks. They can be successful if the mechanism doesn&#8217;t check the photo depth. It&#8217;s one of the easiest spoofing methods, and most facial recognition technologies usually include the depth check to prevent photo attacks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">User Replay Video Attack<\/h2>\n\n\n\n<p>User replay video attacks are very similar to photo attacks. The main difference is that users replay dynamic video attacks and use a video rather than a static image. This also means that they could look more realistically and be more effective at bypassing checks. Though, they still lack depth and introduce some screen flickering. It may not be that noticeable for a human eye, but that can be detected with special filters.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">3D Masks<\/h2>\n\n\n\n<p>3D masks are life-like reproductions of a particular person&#8217;s face. They even include holes for real eyes to bypass blinking and motion checks. This is one of the most advanced biometric spoofing methods because it provides depth and seemingly has all the same properties of an imitated face. The major drawback is that a mask doesn&#8217;t replicate all the facial characteristics of its wearer \u2013 there will be some proportional deviations. The second thing will be the retina, which can be an additional biometric factor to check in order to prevent manipulation.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Deepfake Attack<\/h2>\n\n\n\n<p><a href=\"https:\/\/ondato.com\/blog\/what-are-deepfakes\/\">Deepfake<\/a> attack makes use of machine learning algorithm to feed it a wide dataset of images or videos of their target digitally substituting their face on top of theirs. That way, they can live stream and generate videos. While the results are impressive, this technology has its limitations and can produce various artefacts in the feed that can be detected and revealed as fake.<\/p>\n\n\n\n<p>These new developments put enormous pressure on businesses that are offering remote services. The main challenge of <a href=\"https:\/\/ondato.com\/blog\/know-your-customer\/\">KYC procedures<\/a> is that fraudsters use more advanced methods. That said, there are an abundance of various filters and methods to check whether the photo or video is fake. Using a combination of them, it&#8217;s possible to provide service without disruption and protect your client base from fraud attempts.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>While the reliance on traditional passwords is shrinking, other authentication methods are carving their way into your most-used services. Since they&#8217;re newer, it would seem that this would probably mean that they&#8217;re more resilient against spoofing attempts. Though, the reality of it is that as authentication tech is advancing, so are the methods to bypass [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":2628,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[12],"tags":[],"class_list":["post-163","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.6 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Spoofing 101: Biometrics Fraud | Ondato Blog<\/title>\n<meta name=\"description\" content=\"Learn about the spoofing techniques hackers use to commit biometrics fraud during the verification process.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ondato.com\/pl\/blog\/spoofing-101-biometrics-fraud\/\" \/>\n<meta property=\"og:locale\" content=\"pl_PL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Spoofing 101: Biometrics Fraud\" \/>\n<meta property=\"og:description\" content=\"Learn about the spoofing techniques hackers use to commit biometrics fraud during the verification process.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ondato.com\/pl\/blog\/spoofing-101-biometrics-fraud\/\" \/>\n<meta property=\"og:site_name\" content=\"Ondato\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/OndatoKYC\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-29T13:42:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-02T10:50:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ondato.com\/wp-content\/uploads\/2022\/01\/v01_Spoofing-101.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Aist\u0117 Jok\u0161ait\u0117\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@OndatoKYC\" \/>\n<meta name=\"twitter:site\" content=\"@OndatoKYC\" \/>\n<meta name=\"twitter:label1\" content=\"Napisane przez\" \/>\n\t<meta name=\"twitter:data1\" content=\"Aist\u0117 Jok\u0161ait\u0117\" \/>\n\t<meta name=\"twitter:label2\" content=\"Szacowany czas czytania\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuty\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/ondato.com\\\/pl\\\/blog\\\/spoofing-101-biometrics-fraud\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ondato.com\\\/pl\\\/blog\\\/spoofing-101-biometrics-fraud\\\/\"},\"author\":{\"name\":\"Aist\u0117 Jok\u0161ait\u0117\",\"@id\":\"https:\\\/\\\/ondato.com\\\/pl\\\/#\\\/schema\\\/person\\\/7ae54278438044c034643f1b362a7f05\"},\"headline\":\"Spoofing 101: Biometrics Fraud\",\"datePublished\":\"2022-01-29T13:42:34+00:00\",\"dateModified\":\"2025-10-02T10:50:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/ondato.com\\\/pl\\\/blog\\\/spoofing-101-biometrics-fraud\\\/\"},\"wordCount\":528,\"commentCount\":4,\"publisher\":{\"@id\":\"https:\\\/\\\/ondato.com\\\/pl\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/ondato.com\\\/pl\\\/blog\\\/spoofing-101-biometrics-fraud\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ondato.com\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/v01_Spoofing-101.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/ondato.com\\\/pl\\\/blog\\\/spoofing-101-biometrics-fraud\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ondato.com\\\/pl\\\/blog\\\/spoofing-101-biometrics-fraud\\\/\",\"url\":\"https:\\\/\\\/ondato.com\\\/pl\\\/blog\\\/spoofing-101-biometrics-fraud\\\/\",\"name\":\"Spoofing 101: Biometrics Fraud | Ondato Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ondato.com\\\/pl\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/ondato.com\\\/pl\\\/blog\\\/spoofing-101-biometrics-fraud\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/ondato.com\\\/pl\\\/blog\\\/spoofing-101-biometrics-fraud\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ondato.com\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/v01_Spoofing-101.jpg\",\"datePublished\":\"2022-01-29T13:42:34+00:00\",\"dateModified\":\"2025-10-02T10:50:06+00:00\",\"description\":\"Learn about the spoofing techniques hackers use to commit biometrics fraud during the verification process.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ondato.com\\\/pl\\\/blog\\\/spoofing-101-biometrics-fraud\\\/#breadcrumb\"},\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ondato.com\\\/pl\\\/blog\\\/spoofing-101-biometrics-fraud\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/ondato.com\\\/pl\\\/blog\\\/spoofing-101-biometrics-fraud\\\/#primaryimage\",\"url\":\"https:\\\/\\\/ondato.com\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/v01_Spoofing-101.jpg\",\"contentUrl\":\"https:\\\/\\\/ondato.com\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/v01_Spoofing-101.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"Silhouette of a person in front of a digital screen symbolizing identity spoofing and cybercrime risks.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ondato.com\\\/pl\\\/blog\\\/spoofing-101-biometrics-fraud\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/ondato.com\\\/pl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Spoofing 101: Biometrics Fraud\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ondato.com\\\/pl\\\/#website\",\"url\":\"https:\\\/\\\/ondato.com\\\/pl\\\/\",\"name\":\"Ondato\",\"description\":\"complete and cost-effective compliance management suite\",\"publisher\":{\"@id\":\"https:\\\/\\\/ondato.com\\\/pl\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ondato.com\\\/pl\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pl-PL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/ondato.com\\\/pl\\\/#organization\",\"name\":\"Ondato\",\"url\":\"https:\\\/\\\/ondato.com\\\/pl\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/ondato.com\\\/pl\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/ondato.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/v01_Profile-photo-1.png\",\"contentUrl\":\"https:\\\/\\\/ondato.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/v01_Profile-photo-1.png\",\"width\":1080,\"height\":1080,\"caption\":\"Ondato\"},\"image\":{\"@id\":\"https:\\\/\\\/ondato.com\\\/pl\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/OndatoKYC\",\"https:\\\/\\\/x.com\\\/OndatoKYC\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/12576605\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UC4eMJhSGAf5hRO4YxnzrFFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/ondato.com\\\/pl\\\/#\\\/schema\\\/person\\\/7ae54278438044c034643f1b362a7f05\",\"name\":\"Aist\u0117 Jok\u0161ait\u0117\",\"description\":\"Aist\u0117 is a copywriter who loves all things tech. She\u2019s passionate about ethical verification practices, cybersecurity, and data protection, so she spends her time educating people on their importance. For the past sixteen years, Aist\u0117 has worked to perfect her storytelling skills, which she now uses to explain AML and KYC compliance to the masses.\",\"url\":\"https:\\\/\\\/ondato.com\\\/pl\\\/author\\\/aiste-joksaite\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Spoofing 101: Biometrics Fraud | Ondato Blog","description":"Learn about the spoofing techniques hackers use to commit biometrics fraud during the verification process.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ondato.com\/pl\/blog\/spoofing-101-biometrics-fraud\/","og_locale":"pl_PL","og_type":"article","og_title":"Spoofing 101: Biometrics Fraud","og_description":"Learn about the spoofing techniques hackers use to commit biometrics fraud during the verification process.","og_url":"https:\/\/ondato.com\/pl\/blog\/spoofing-101-biometrics-fraud\/","og_site_name":"Ondato","article_publisher":"https:\/\/www.facebook.com\/OndatoKYC","article_published_time":"2022-01-29T13:42:34+00:00","article_modified_time":"2025-10-02T10:50:06+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/ondato.com\/wp-content\/uploads\/2022\/01\/v01_Spoofing-101.jpg","type":"image\/jpeg"}],"author":"Aist\u0117 Jok\u0161ait\u0117","twitter_card":"summary_large_image","twitter_creator":"@OndatoKYC","twitter_site":"@OndatoKYC","twitter_misc":{"Napisane przez":"Aist\u0117 Jok\u0161ait\u0117","Szacowany czas czytania":"3 minuty"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/ondato.com\/pl\/blog\/spoofing-101-biometrics-fraud\/#article","isPartOf":{"@id":"https:\/\/ondato.com\/pl\/blog\/spoofing-101-biometrics-fraud\/"},"author":{"name":"Aist\u0117 Jok\u0161ait\u0117","@id":"https:\/\/ondato.com\/pl\/#\/schema\/person\/7ae54278438044c034643f1b362a7f05"},"headline":"Spoofing 101: Biometrics Fraud","datePublished":"2022-01-29T13:42:34+00:00","dateModified":"2025-10-02T10:50:06+00:00","mainEntityOfPage":{"@id":"https:\/\/ondato.com\/pl\/blog\/spoofing-101-biometrics-fraud\/"},"wordCount":528,"commentCount":4,"publisher":{"@id":"https:\/\/ondato.com\/pl\/#organization"},"image":{"@id":"https:\/\/ondato.com\/pl\/blog\/spoofing-101-biometrics-fraud\/#primaryimage"},"thumbnailUrl":"https:\/\/ondato.com\/wp-content\/uploads\/2022\/01\/v01_Spoofing-101.jpg","articleSection":["Blog"],"inLanguage":"pl-PL","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ondato.com\/pl\/blog\/spoofing-101-biometrics-fraud\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ondato.com\/pl\/blog\/spoofing-101-biometrics-fraud\/","url":"https:\/\/ondato.com\/pl\/blog\/spoofing-101-biometrics-fraud\/","name":"Spoofing 101: Biometrics Fraud | Ondato Blog","isPartOf":{"@id":"https:\/\/ondato.com\/pl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ondato.com\/pl\/blog\/spoofing-101-biometrics-fraud\/#primaryimage"},"image":{"@id":"https:\/\/ondato.com\/pl\/blog\/spoofing-101-biometrics-fraud\/#primaryimage"},"thumbnailUrl":"https:\/\/ondato.com\/wp-content\/uploads\/2022\/01\/v01_Spoofing-101.jpg","datePublished":"2022-01-29T13:42:34+00:00","dateModified":"2025-10-02T10:50:06+00:00","description":"Learn about the spoofing techniques hackers use to commit biometrics fraud during the verification process.","breadcrumb":{"@id":"https:\/\/ondato.com\/pl\/blog\/spoofing-101-biometrics-fraud\/#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ondato.com\/pl\/blog\/spoofing-101-biometrics-fraud\/"]}]},{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/ondato.com\/pl\/blog\/spoofing-101-biometrics-fraud\/#primaryimage","url":"https:\/\/ondato.com\/wp-content\/uploads\/2022\/01\/v01_Spoofing-101.jpg","contentUrl":"https:\/\/ondato.com\/wp-content\/uploads\/2022\/01\/v01_Spoofing-101.jpg","width":1920,"height":1080,"caption":"Silhouette of a person in front of a digital screen symbolizing identity spoofing and cybercrime risks."},{"@type":"BreadcrumbList","@id":"https:\/\/ondato.com\/pl\/blog\/spoofing-101-biometrics-fraud\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ondato.com\/pl\/"},{"@type":"ListItem","position":2,"name":"Spoofing 101: Biometrics Fraud"}]},{"@type":"WebSite","@id":"https:\/\/ondato.com\/pl\/#website","url":"https:\/\/ondato.com\/pl\/","name":"Ondato","description":"complete and cost-effective compliance management suite","publisher":{"@id":"https:\/\/ondato.com\/pl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ondato.com\/pl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pl-PL"},{"@type":"Organization","@id":"https:\/\/ondato.com\/pl\/#organization","name":"Ondato","url":"https:\/\/ondato.com\/pl\/","logo":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/ondato.com\/pl\/#\/schema\/logo\/image\/","url":"https:\/\/ondato.com\/wp-content\/uploads\/2022\/08\/v01_Profile-photo-1.png","contentUrl":"https:\/\/ondato.com\/wp-content\/uploads\/2022\/08\/v01_Profile-photo-1.png","width":1080,"height":1080,"caption":"Ondato"},"image":{"@id":"https:\/\/ondato.com\/pl\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/OndatoKYC","https:\/\/x.com\/OndatoKYC","https:\/\/www.linkedin.com\/company\/12576605\/","https:\/\/www.youtube.com\/channel\/UC4eMJhSGAf5hRO4YxnzrFFw"]},{"@type":"Person","@id":"https:\/\/ondato.com\/pl\/#\/schema\/person\/7ae54278438044c034643f1b362a7f05","name":"Aist\u0117 Jok\u0161ait\u0117","description":"Aist\u0117 is a copywriter who loves all things tech. She\u2019s passionate about ethical verification practices, cybersecurity, and data protection, so she spends her time educating people on their importance. For the past sixteen years, Aist\u0117 has worked to perfect her storytelling skills, which she now uses to explain AML and KYC compliance to the masses.","url":"https:\/\/ondato.com\/pl\/author\/aiste-joksaite\/"}]}},"_links":{"self":[{"href":"https:\/\/ondato.com\/pl\/wp-json\/wp\/v2\/posts\/163","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ondato.com\/pl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ondato.com\/pl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ondato.com\/pl\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/ondato.com\/pl\/wp-json\/wp\/v2\/comments?post=163"}],"version-history":[{"count":0,"href":"https:\/\/ondato.com\/pl\/wp-json\/wp\/v2\/posts\/163\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ondato.com\/pl\/wp-json\/wp\/v2\/media\/2628"}],"wp:attachment":[{"href":"https:\/\/ondato.com\/pl\/wp-json\/wp\/v2\/media?parent=163"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ondato.com\/pl\/wp-json\/wp\/v2\/categories?post=163"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ondato.com\/pl\/wp-json\/wp\/v2\/tags?post=163"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}