Like selling your virtual soul: Researchers uncover extraordinary identity farming operation where the culprits are the victims

Biometrics
(Image credit: Shutterstock)

  • Across LATAM and East Europe, people are deliberately selling their ID documents
  • Individuals willingly provide photos and documentation in exchange for payment
  • This twist in ID misuse criminality makes standard forgery detection redundant

Researchers at iProov have uncovered a complex dark web operation aimed at undermining Know Your Customer (KYC) verification processes.

Unlike conventional identity theft, the scheme involves unsuspecting victims voluntarily handing over their identity documents and facial images in return for financial compensation.

This approach, dubbed "identity farming," allows criminals to exploit genuine credentials to bypass verification systems, complicating detection efforts.

Exploiting genuine credentials

In amassing genuine credentials, the operation, predominantly active in the LATAM region (Latin America), can outwit traditional document verification methods that excel at spotting forgeries or alterations.

While similar activities have been observed in Eastern Europe, no direct connection between the groups has been established.

In regions facing economic hardship and high unemployment, individuals are willing to compromise their identities for short-term financial gains.

Fraudsters exploit their victims in this way, offering payment in exchange for identity documents and biometric data, often under false pretenses. Many victims perceive this as a low-risk transaction.

How identity farming operations work

Attackers are a mixed ability group. Those at entry-level rely on simple yet effective techniques such as presenting static images or pre-recorded videos.

More sophisticated actors employ advanced tools like face-swapping software and lighting manipulations, and the most capable attackers use custom AI models and 3D animations, designed to mimic natural human behavior in real-time.

According to iProov, there's a need for a multi-layered strategy when safeguarding identity verification systems.

This includes measures such as verifying that the presented identity aligns with official documentation, using embedded imagery and metadata analysis to confirm the presence of a real person, and deploying real-time challenge-response systems to detect fraudulent behavior.

"What's particularly alarming about this discovery is not just the sophisticated nature of the operation, but the fact that individuals are willingly compromising their identities for short-term financial gain," said Andrew Newell, Chief Scientific Officer at iProov.

"When people sell their identity documents and biometric data, they're not just risking their own financial security - they're providing criminals with complete, genuine identity packages that can be used for sophisticated impersonation fraud."

"These identities are particularly dangerous because they include both real documents and matching biometric data, making them extremely difficult to detect through traditional verification methods.’’

You might also like

Efosa Udinmwen
Freelance Journalist

Efosa has been writing about technology for over 7 years, initially driven by curiosity but now fueled by a strong passion for the field. He holds both a Master's and a PhD in sciences, which provided him with a solid foundation in analytical thinking. Efosa developed a keen interest in technology policy, specifically exploring the intersection of privacy, security, and politics. His research delves into how technological advancements influence regulatory frameworks and societal norms, particularly concerning data protection and cybersecurity. Upon joining TechRadar Pro, in addition to privacy and technology policy, he is also focused on B2B security products. Efosa can be contacted at this email: udinmwenefosa@gmail.com

Read more
Dark Web cybercriminals are buying up ID to bypass KYC methods
Concept image of a person having their face scanned, indicating the risk of identity theft.
Identity fraud attacks using AI are fooling biometric security systems
An illustration of a hooded hacker with an obscured face holding a large fingerprint against a red background.
ID theft – what happens when someone steals your identity
Concept art representing cybersecurity principles
Cybercriminals cashing in on holiday sales rush
A graphic showing fleet tracking locations over a city.
How can banks truly understand the changing regulatory landscape?
Someone holding a passport with two boarding passes inside it
Top digital loan firm security slip-up puts data of 36 million users at risk
Latest in Pro
Cloud, networking and internet
Under the hood of data sovereignty
A business woman looking at AI on a transparent screen
Businesses are facing an "AI Divide" - which could be the difference between success and failure
Apple Vision Pro with Dassault Systèmes 3DEXPERIENCE platform
Dassault Systèmes teams up with Apple to use Vision Pro headsets to bring spatial CAD to life
A graphic showing fleet tracking locations over a city.
Lost & Found tracking site hit by major data breach - over 800,000 could be affected
US President Donald Trump speaks to the press as he signs an executive order to create a US sovereign wealth fund, in the Oval Office of the White House on February 3, 2025, in Washington, DC.
US set to pause cyber-offensive operations against Russia - but CISA says it won't stop
Web DDoS attacks see major surge as AI allows more powerful attacks
Latest in News
Google Gemini iPhone Lock Screen
You can now access Gemini from your iPhone's lock screen
Michelle, Keats, and Doctor Amherst looking unimpressed and worried in The Electric State
Netflix drops trailer for The Electric State, and I'm getting serious District 9 vibes
YouTube TV
YouTube TV might be planning a big Netflix update that puts the best streaming services first
Google Pixel 9 Pro
Here are the 7 best Pixel 9 and Pixel Watch 3 features landing in March’s Pixel Feature Drop
Bang & Olufsen Beogram 4000C Saint Laurent Rive Droite Edition
Bang & Olufsen's latest reworked turntable is a masterpiece of retro revival, in a breathtaking wooden presentation box
Apple Watch Series 10
Apple unveils new Apple Watch bands – here's what's in the Spring 2025 collection