SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hikvision Gets ISO 37301 Certification For Compliance Management System
    • SentriGuard: Revolutionizing Key Management Solutions
    • Axis Signs CISA Secure By Design For Cybersecurity
    • Xtract One's SmartGateway Boosts Security In Nova Scotia
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Software House
    Other Resources
    • eMagazines
    • Videos
    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

    Enhancing Physical Access Control Using A Self-Service Model

    Enhancing Physical Access Control Using A Self-Service Model

About us Advertise
  • AI special report
  • Cybersecurity special report
  • Casino security & surveillance
  • Cloud-based security
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check Out Our Special Report On Cybersecurity

Read now!

Entrust 2026 Identity Fraud Report: Key Trends Revealed

19 Nov 2025

Entrust 2026 Identity Fraud Report: Key Trends Revealed
Contact company
Contact Entrust Inc.
icon Add as a preferred source Download PDF version
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • Deepfakes and injection attacks surge, driving sophisticated biometric fraud in 2026.
  • Cryptocurrency sign-up bonuses face highest onboarding fraud, 67% of attempts involve ATO.
  • Fraudsters exploit AI tools for digital forgeries, peak activity at 2:00-4:00 am UTC.
Related Links
  • Entrust Names Tony Ball As New CEO In Security Sector
  • Entrust & Mastercard Boost Fraud Prevention Collaboration
  • Entrust nShield HSMs: NIST Validation For Quantum Safety

Entrust has unveiled its seventh annual Identity Fraud Report for 2026, shedding light on the evolving global landscape of identity fraud.

The report identifies key trends and strategies used in identity fraud over the past year, offering valuable insights aimed at aiding businesses in enhancing security measures for their customers and operations.

biometric fraud attempts

Recent data reveal that deepfakes now represent 20% of attempted biometric fraud cases, with a 58% rise in deepfaked selfies reported in 2025. Other prevalent fraud tactics in biometric systems include the use of screen photos, printout photos, 2D and 3D masks, video replays on screens, and photo videos on screens.

Injection attacks, which increased by 40% year-over-year, are contributing to this sophistication, as fraudsters use these to infiltrate live capture processes by introducing manipulated media into verification systems.

The combination of deepfakes with injection techniques makes replicating users and mimicking live capture scenarios easier for fraudsters, posing significant challenges for detection without comprehensive, multi-layered fraud prevention strategies.

Fraud Patterns Throughout the Customer Lifecycle

The report further explores fraud patterns based on customer lifecycle stages and variations across industries

The report further explores fraud patterns based on customer lifecycle stages and variations across industries.

Notably, sectors offering sign-up bonuses like cryptocurrency face elevated rates of onboarding fraud, which account for 67% of fraudulent activities. 

Conversely, industries managing high-value, long-term accounts—such as payments and digital-first banks—are more susceptible to account takeover (ATO) fraud. ATO incidents account for 82% and 55% of targeting attempts during the authentication phase across these sectors, respectively.

Emerging Threats: Social Engineering and Psychological Manipulation

In addition to technical threats, the report highlights a surge in phishing, impersonation, and coercion tactics aimed at exploiting individuals through psychological manipulation. Such strategies convince victims to share their authentic identity data, divulge sensitive information, or transfer funds.

Increased Document Fraud

Key findings include a 35% occurrence of digital forgeries in document fraud cases in 2025, up from an average of 29% between 2022 and 2024. Although physical counterfeits remain predominant (47%), the complexity of digital forgeries is rising, facilitated by accessible AI tools online.

National ID cards remain the most exploited document type globally, making up 46% of fraudulent document submissions. Meanwhile, the EMEA region faces a 45% occurrence of such frauds, while APAC experiences a significant 60%. In contrast, the AMER region sees more fraudulent drivers' licenses at 37%.

Fraud Activities Surge in Off-Hours

Fraud activities tend to peak between 2:00 am and 4:00 am UTC, according to Entrust data, attributing to the fact that organized and globalized fraud operations exploit offline defenses during these hours.

Strategies and Quotes from Entrust Experts

Detecting and countering these adaptive threats have become critical, as detailed by Simon Horswell, Senior Fraud Specialist Manager at Entrust: “As detection improves, fraud rings evolve, becoming faster, more organized, and commercially driven.

Generative AI and shared tactics fuel volumes and sophistication, targeting people, credentials, and systems. Identity is now the front line, and protecting it with trusted, verified identity across the customer lifecycle is essential to staying ahead of adaptive threats.”

Tony Ball, President of Payments & Identity and Incoming CEO at Entrust, emphasized the importance of Entrust’s global reach and expertise: “With over 1 billion identity verifications conducted across 195 countries and more than 30 industries, Entrust offers unparalleled insights into how fraud operates and how to help mitigate it."

"Our global reach and deep fraud intelligence mean we’re uniquely placed to drive continuous innovation and share meaningful insights for customers. The future of digital trust lies in layered, identity-centric strategies powered by AI, delivering fraud prevention and seamless user experiences.”

Find out about secure physical access control systems through layered cybersecurity practices.

Show full press release

Entrust, a global pioneer in identity-centric security solutions, released its seventh annual Identity Fraud Report for 2026. The report examines global trends, tactics, and techniques used in identity fraud over the past year, providing actionable insights to help businesses protect their customers and operations.

Deepfakes and injection attacks on the rise    

New data reveals deepfakes account for one in five biometric fraud attempts, and instances of deepfaked selfies increased by 58% in 2025. Other fraud tactics across biometric systems include photo of a screen, photo of a printout, 2D and 3D masks, video of a video on screen, and video of photo on screen.

This rise in deepfakes is part of a broader trend of increasingly sophisticated attacks driven by injection attacks, which surged 40% year-over-year. Injection attacks enable fraudsters to bypass live capture processes by feeding manipulated images or videos directly into verification systems.

When combined with deepfakes, these sophisticated techniques can convincingly mimic users and live capture experiences, making detection difficult without robust, multi-layered fraud prevention.

Fraud across the customer lifecycle

The report also highlights trends in when fraud happens during the customer lifecycle and how it varies by industry and business models. Sectors offering sign-up bonuses, such as cryptocurrency, face the highest rates of onboarding fraud, accounting for 67% of fraud attempts.

Meanwhile, industries with valuable, long-standing accounts, such as payments and digital-first banks, experience higher rates of account takeover (ATO) fraud, accounting for 82% and 55% of fraud attempts targeting the authentication process, respectively.

ATO fraud involves hijacking existing user accounts, typically through stolen credentials, phishing, malware, or social engineering, to steal funds or harvest sensitive data.

Social engineering and psychological manipulation    

Building on the technical threats, the report also reveals how fraudsters are increasingly targeting individuals through psychological manipulation. By using tactics such as phishing, impersonation, and coercion, fraudsters are convincing victims to use their genuine identity, hand over sensitive data, or transfer funds.

Additional key findings from the 2026 Identity Fraud Report include:

  • Physical and digital document fraud: In 2025, digital forgeries made up 35% of document fraud – up from a 29% average between 2022 and 2024. Overall, there’s a higher volume of physical counterfeits (47%), but typically the sophistication of digital forgeries is higher, driven by the online availability of AI tools.
  • National ID cards most exploited: National ID cards accounted for nearly half (46%) of all fraudulent document submissions globally. Fraudulent national IDs are most prevalent in EMEA (45%) and APAC (60%), whereas AMER experiences more fraudulent driver’s licenses (37%). 
  • Peak activity after hours: Modern fraud operations are highly organized and global in scale, making fraud a 24/7 business. Data from Entrust reveals that fraud attempts peak between 2:00 am and 4:00 am UTC, when defenses in many regions are offline.
  • Fraud on repeat: Fraudsters often use a “rinse and repeat” strategy, recycling fake details across multiple fraudulent identity documents. Commonly used elements include names such as Jon Doe, document numbers like A12345678, and birthdates including October 16, 1986.

Protecting identity from evolving threats

“As detection improves, fraud rings evolve, becoming faster, more organized, and commercially driven,” said Simon Horswell, Senior Fraud Specialist Manager at Entrust.

“Generative AI and shared tactics fuel volumes and sophistication, targeting people, credentials, and systems. Identity is now the front line, and protecting it with trusted, verified identity across the customer lifecycle is essential to staying ahead of adaptive threats.”

Unparalleled insights

“With over 1 billion identity verifications conducted across 195 countries and more than 30 industries, Entrust offers unparalleled insights into how fraud operates and how to help mitigate it,” said Tony Ball, President of Payments & Identity and Incoming CEO at Entrust.

"Our global reach and deep fraud intelligence mean we’re uniquely placed to drive continuous innovation and share meaningful insights for customers. The future of digital trust lies in layered, identity-centric strategies powered by AI, delivering fraud prevention and seamless user experiences.”

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Biometrics
  • Physical Security Information Management (PSIM)
  • Cyber security
  • Data Security
  • Related links
  • Biometric Access control software
  • Quad Technology Detectors Intruder detectors
  • Smart Card Access control software
  • Centrally managed access solution Access control software
  • Combined online/offline solution Access control software
  • Related categories
  • Access control software
  • Intruder detectors
  • Video servers (IP transmission)
Related white papers
Aligning Physical And Cyber Defence For Total Protection

Aligning Physical And Cyber Defence For Total Protection

Download
Combining Security And Networking Technologies For A Unified Solution

Combining Security And Networking Technologies For A Unified Solution

Download
System Design Considerations To Optimize Physical Access Control

System Design Considerations To Optimize Physical Access Control

Download
Related articles
How Physical Security Consultants Ensure Cybersecurity For End Users

How Physical Security Consultants Ensure Cybersecurity For End Users

How Managed Detection And Response Enhances Cybersecurity Management In Organizations

How Managed Detection And Response Enhances Cybersecurity Management In Organizations

Drawbacks Of PenTests And Ethical Hacking For The Security Industry

Drawbacks Of PenTests And Ethical Hacking For The Security Industry

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report Casino security & surveillance RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Cyber security
  4. News
  5. Corporate news
About this page

Discover key trends in identity fraud from the 2026 Entrust Report. Learn about rising deepfake and injection attacks, and safeguard your business with actionable insights.

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Addressing Cybersecurity Vulnerabilities In The Physical World
Addressing Cybersecurity Vulnerabilities In The Physical World
Artificial Intelligence in Security
Artificial Intelligence in Security
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec