{"data":{"id":"98b9fce7-a01a-4d50-b42e-5a87dda56f1f","title":"How Deepfakes and Injection Attacks Are Breaking Identity Verification","summary":"Deepfakes and injection attacks (where attackers substitute fake video or audio into a system's input stream) are increasingly being used to bypass identity verification systems in critical moments like bank account opening, remote hiring, and account recovery. Traditional deepfake detection alone is insufficient because attackers can either create high-quality synthetic media or completely bypass the camera sensor using injection attacks, so organizations need to validate entire identity sessions end-to-end, including device integrity and user behavior signals, rather than just checking if a face looks real.","solution":"N/A -- no mitigation discussed in source.","labels":["security","safety"],"sourceUrl":"https://www.bleepingcomputer.com/news/security/how-deepfakes-and-injection-attacks-are-breaking-identity-verification/","publishedAt":"2026-03-02T15:01:11.000Z","cveId":null,"cweIds":null,"cvssScore":null,"cvssSeverity":null,"severity":"info","attackType":["model_evasion","jailbreak"],"issueType":"news","affectedPackages":null,"affectedVendors":[],"affectedVendorsRaw":["Incode"],"classifierModel":"claude-haiku-4-5-20251001","classifierPromptVersion":"v3","cvssVector":null,"attackVector":null,"attackComplexity":null,"privilegesRequired":null,"userInteraction":null,"exploitMaturity":null,"epssScore":null,"patchAvailable":null,"disclosureDate":null,"capecIds":null,"crossRefCount":0,"attackSophistication":"moderate","impactType":["integrity","safety"],"aiComponentTargeted":"inference","llmSpecific":false,"classifierConfidence":0.75,"researchCategory":null,"atlasIds":null}}