SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on Cybersecurity

Read now!

Entrust 2026 Identity Fraud Report: Key insights

19 Nov 2025

Entrust 2026 Identity Fraud Report: Key insights
Contact company
Contact Entrust Inc.
icon Add as a preferred source Download PDF version
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • Deepfakes and injection attacks surge, posing challenges for fraud detection systems.
  • Onboarding fraud rampant in cryptocurrency; ATO fraud dominates banking sector.
  • Fraudsters exploit national ID cards; digital forgeries on the rise globally.
Related Links
  • Tony Ball appointed new Chief Executive Officer (CEO) of Entrust Inc.
  • Entrust & Mastercard: Elevating identity fraud prevention
  • Entrust nShield HSMs: Post-quantum security validated

Entrust, a global entity known for its identity-focused security measures, has unveiled its seventh annual Identity Fraud Report for 2026.

This report highlights key global trends, tactics, and methodologies employed in identity fraud over the previous year, offering practical insights for businesses to safeguard their clientele and operations.

Biometric fraud attempts

The report indicates that deepfakes now comprise 20% of biometric fraud attempts, with occurrences of deepfaked selfies rising by 58% in 2025. Other common fraud methods across biometric systems include imagery such as photos of screens, printouts, and masks, as well as videos showing a photo or video on screen.

These developments reflect a larger trend of increasingly sophisticated attacks, propelled by injection attacks, which have surged by 40% year-on-year. Fraudsters use these attacks to bypass live capture processes by inserting manipulated images or videos directly into verification systems.

When paired with deepfakes, these advanced techniques can convincingly replicate user and real-time capture experiences, complicating detection unless robust, multi-layered fraud prevention strategies are implemented.

Fraud throughout the customer lifecycle

The report further examines at what points fraud occurs within the customer lifecycle

The report further examines at what points fraud occurs within the customer lifecycle and how it differs across industries and business models. Industries that offer sign-up incentives, such as cryptocurrency sectors, experience the highest rates of onboarding fraud, constituting 67% of fraud attempts.

Conversely, sectors with valuable, longstanding accounts, like payments and digital-first banks, are more prone to account takeover (ATO) fraud, which consists of 82% and 55% of authentication-targeted fraud attempts, respectively.

ATO fraud involves the usurpation of existing user accounts through stolen credentials, phishing, malware, or social engineering, to either misappropriate funds or access sensitive data.

Psychological manipulation in fraud schemes

Apart from technical threats, fraudsters are increasingly relying on psychological manipulation. By employing tactics such as phishing, impersonation, and coercion, they convince victims to use their genuine identities, divulge sensitive information, or transfer funds.

The 2026 Identity Fraud Report also details that digital forgeries made up 35% of document fraud in 2025, a significant increase from the 29% average recorded between 2022 and 2024. Although physical counterfeit volumes remain higher at 47%, digital forgeries are often more sophisticated, aided by AI tools readily available online.

Exploited documents and fraud patterns

Almost half (46%) of all fraudulent document submissions globally involved national ID cards

Almost half (46%) of all fraudulent document submissions globally involved national ID cards. While in EMEA and APAC fraudulent national IDs are most common (45% and 60% respectively), the AMER region sees more fraudulent driver's licenses at 37%.

Fraud activity is particularly prevalent between 2:00 am and 4:00 am UTC, reflecting how modern fraud operations are both highly organised and global.

Additionally, fraudsters often employ a "rinse and repeat" strategy, recycling fake details across multiple identity documents with commonly used elements including names like Jon Doe.

Combatting evolving threats

Simon Horswell, Senior Fraud Specialist Manager at Entrust, remarked, "As detection improves, fraud rings evolve, becoming faster, more organised, and commercially driven. Generative AI and shared tactics fuel volumes and sophistication, targeting people, credentials, and systems. Identity is now the front line, and protecting it with trusted, verified identity across the customer lifecycle is essential to staying ahead of adaptive threats."

Tony Ball, President of Payments & Identity and Incoming CEO at Entrust, added, "With over 1 billion identity verifications conducted across 195 countries and more than 30 industries, Entrust offers unparalleled insights into how fraud operates and how to help mitigate it."

"Our global reach and deep fraud intelligence mean we’re uniquely placed to drive continuous innovation and share meaningful insights for customers. The future of digital trust lies in layered, identity-centric strategies powered by AI, delivering fraud prevention and seamless user experiences."

Find out about secure physical access control systems through layered cybersecurity practices.

Show full press release

Entrust, a global pioneer in identity-centric security solutions, released its seventh annual Identity Fraud Report for 2026. The report examines global trends, tactics, and techniques used in identity fraud over the past year, providing actionable insights to help businesses protect their customers and operations.

Deepfakes and injection attacks on the rise    

New data reveals deepfakes account for one in five biometric fraud attempts, and instances of deepfaked selfies increased by 58% in 2025. Other fraud tactics across biometric systems include photo of a screen, photo of a printout, 2D and 3D masks, video of a video on screen, and video of photo on screen.

This rise in deepfakes is part of a broader trend of increasingly sophisticated attacks driven by injection attacks, which surged 40% year-over-year. Injection attacks enable fraudsters to bypass live capture processes by feeding manipulated images or videos directly into verification systems.

When combined with deepfakes, these sophisticated techniques can convincingly mimic users and live capture experiences, making detection difficult without robust, multi-layered fraud prevention.

Fraud across the customer lifecycle

The report also highlights trends in when fraud happens during the customer lifecycle and how it varies by industry and business models. Sectors offering sign-up bonuses, such as cryptocurrency, face the highest rates of onboarding fraud, accounting for 67% of fraud attempts.

Meanwhile, industries with valuable, long-standing accounts, such as payments and digital-first banks, experience higher rates of account takeover (ATO) fraud, accounting for 82% and 55% of fraud attempts targetting the authentication process, respectively.

ATO fraud involves hijacking existing user accounts, typically through stolen credentials, phishing, malware, or social engineering, to steal funds or harvest sensitive data.

Social engineering and psychological manipulation    

Building on the technical threats, the report also reveals how fraudsters are increasingly targetting individuals through psychological manipulation. By using tactics such as phishing, impersonation, and coercion, fraudsters are convincing victims to use their genuine identity, hand over sensitive data, or transfer funds.

Additional key findings from the 2026 Identity Fraud Report include:

  • Physical and digital document fraud: In 2025, digital forgeries made up 35% of document fraud – up from a 29% average between 2022 and 2024. Overall, there’s a higher volume of physical counterfeits (47%), but typically the sophistication of digital forgeries is higher, driven by the online availability of AI tools. 
  • National ID cards most exploited: National ID cards accounted for nearly half (46%) of all fraudulent document submissions globally. Fraudulent national IDs are most prevalent in EMEA (45%) and APAC (60%), whereas AMER experiences more fraudulent driver’s licenses (37%). 
  • Peak activity after hours: Modern fraud operations are highly organised and global in scale, making fraud a 24/7 business. Data from Entrust reveals that fraud attempts peak between 2:00 am and 4:00 am UTC, when defenses in many regions are offline.
  • Fraud on repeat: Fraudsters often use a “rinse and repeat” strategy, recycling fake details across multiple fraudulent identity documents. Commonly used elements include names such as Jon Doe, document numbers like A12345678, and birthdates including October 16, 1986.

Protecting identity from evolving threats

“As detection improves, fraud rings evolve, becoming faster, more organised, and commercially driven,” said Simon Horswell, Senior Fraud Specialist Manager at Entrust.

“Generative AI and shared tactics fuel volumes and sophistication, targetting people, credentials, and systems. Identity is now the front line, and protecting it with trusted, verified identity across the customer lifecycle is essential to staying ahead of adaptive threats.”

Unparalleled insights

“With over 1 billion identity verifications conducted across 195 countries and more than 30 industries, Entrust offers unparalleled insights into how fraud operates and how to help mitigate it,” said Tony Ball, President of Payments & Identity and Incoming CEO at Entrust.

"Our global reach and deep fraud intelligence mean we’re uniquely placed to drive continuous innovation and share meaningful insights for customers. The future of digital trust lies in layered, identity-centric strategies powered by AI, delivering fraud prevention and seamless user experiences.”

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Biometrics
  • Physical Security Information Management (PSIM)
  • Cyber security
  • Data Security
  • Related links
  • Biometric Access control software
  • Quad Technology Detectors Intruder detectors
  • Smart Card Access control software
  • Centrally managed access solution Access control software
  • Combined online/offline solution Access control software
  • Related categories
  • Access control software
  • Intruder detectors
  • Video servers (IP transmission)
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
  5. Corporate news
About this page

Discover Entrust's 2026 Identity Fraud Report, highlighting deepfakes and injection attacks. Gain insights into evolving identity fraud tactics and protect your business today. Read now!

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec