{"id":16303,"date":"2025-10-29T18:32:01","date_gmt":"2025-10-29T18:32:01","guid":{"rendered":"https:\/\/igotoffer.com\/blog\/?p=16303"},"modified":"2025-10-29T18:32:01","modified_gmt":"2025-10-29T18:32:01","slug":"scammers-clone-persons-faces-to-steal-all-the-money","status":"publish","type":"post","link":"https:\/\/igotoffer.com\/blog\/scammers-clone-persons-faces-to-steal-all-the-money","title":{"rendered":"Scammers Clone Person&#8217;s Faces to steal all the money"},"content":{"rendered":"<h2>This scam clones a person\u2019s face to steal all the money from their bank account without needing a password<\/h2>\n<p>Cybercriminals take advantage of the fact that many financial applications require biometric data for access; they use artificial intelligence to copy several facial features of the victim.<\/p>\n<p>The case of a Vietnamese citizen who lost $400,000 after a sophisticated digital theft has alerted the international community to a new type of fraud. This scheme uses artificial intelligence (AI) to clone faces and drain bank accounts.<\/p>\n<p>According to data from cybersecurity firm Group-IB, this type of attack was first detected in Southeast Asian countries, but experts warn that it may spread to other regions soon.<\/p>\n<p>The criminal group behind these attacks employs an advanced mobile trojan called GoldPickaxe. Initially, this virus targeted iOS users. A version for Android has already been identified.<\/p>\n<div id=\"attachment_16311\" style=\"width: 830px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-16311\" loading=\"lazy\" class=\"size-full wp-image-16311\" src=\"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2025\/10\/scammers-clone-persons-faces-to-steal-all-the-money-goldpick.png\" alt=\"The criminal group behind these attacks employs an advanced mobile trojan called GoldPickaxe.\" width=\"820\" height=\"500\" srcset=\"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2025\/10\/scammers-clone-persons-faces-to-steal-all-the-money-goldpick.png 820w, https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2025\/10\/scammers-clone-persons-faces-to-steal-all-the-money-goldpick-300x183.png 300w, https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2025\/10\/scammers-clone-persons-faces-to-steal-all-the-money-goldpick-620x378.png 620w, https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2025\/10\/scammers-clone-persons-faces-to-steal-all-the-money-goldpick-246x150.png 246w, https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2025\/10\/scammers-clone-persons-faces-to-steal-all-the-money-goldpick-600x366.png 600w\" sizes=\"(max-width: 820px) 100vw, 820px\" \/><p id=\"caption-attachment-16311\" class=\"wp-caption-text\">The criminal group behind these attacks employs an advanced mobile trojan called GoldPickaxe.<\/p><\/div>\n<h2>How this facial data\u2013cloning cyberattack works<\/h2>\n<p>This malicious software allows attackers to collect biometric data, such as facial images, as well as identity documents and SMS messages. With this information, criminals can access victims\u2019 bank accounts without knowing their passwords.<\/p>\n<p>The perpetrators of these frauds use the collected data to create deepfakes \u2014 digital simulations of the victim\u2019s face generated through artificial intelligence.<\/p>\n<p>These facial replicas enable attackers to bypass biometric verification systems implemented by banks and other financial institutions.<\/p>\n<p>Furthermore, according to Group-IB, there is an AI-based face-swapping service that facilitates the creation of these deepfakes. This increases the risk of facial recognition systems being deceived.<\/p>\n<div id=\"attachment_16312\" style=\"width: 830px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-16312\" loading=\"lazy\" class=\"size-full wp-image-16312\" src=\"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2025\/10\/scammers-clone-persons-faces-to-steal-all-the-money-deepfake.png\" alt=\"According to Group-IB, there is an AI-based face-swapping service that facilitates the creation of these deepfakes.\" width=\"820\" height=\"500\" srcset=\"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2025\/10\/scammers-clone-persons-faces-to-steal-all-the-money-deepfake.png 820w, https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2025\/10\/scammers-clone-persons-faces-to-steal-all-the-money-deepfake-300x183.png 300w, https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2025\/10\/scammers-clone-persons-faces-to-steal-all-the-money-deepfake-620x378.png 620w, https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2025\/10\/scammers-clone-persons-faces-to-steal-all-the-money-deepfake-246x150.png 246w, https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2025\/10\/scammers-clone-persons-faces-to-steal-all-the-money-deepfake-600x366.png 600w\" sizes=\"(max-width: 820px) 100vw, 820px\" \/><p id=\"caption-attachment-16312\" class=\"wp-caption-text\">According to Group-IB, there is an AI-based face-swapping service that facilitates the creation of these deepfakes.<\/p><\/div>\n<h2>Where cases related to this cyberattack have appeared<\/h2>\n<p>The first incidents linked to this trojan were recorded in Thailand, shortly after the Bank of Thailand introduced facial biometric verification as a security measure.<\/p>\n<p>Following those events, the case of the Vietnamese citizen who lost $400,000 was reported, revealing the effectiveness and reach of this new criminal technique.<\/p>\n<p>Cybersecurity experts stated that, so far, the attacks have focused on financial companies and their clients in Vietnam and Thailand, though it is not unlikely that cybercriminals will expand their operations to other countries.<\/p>\n<div id=\"attachment_16313\" style=\"width: 830px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-16313\" loading=\"lazy\" class=\"size-full wp-image-16313\" src=\"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2025\/10\/scammers-clone-persons-faces-to-steal-all-the-money-expand.png\" alt=\"Cybersecurity experts stated that, so far, the attacks have focused on financial companies and their clients in Vietnam and Thailand, though it is not unlikely that cybercriminals will expand their operations to other countries.\" width=\"820\" height=\"500\" srcset=\"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2025\/10\/scammers-clone-persons-faces-to-steal-all-the-money-expand.png 820w, https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2025\/10\/scammers-clone-persons-faces-to-steal-all-the-money-expand-300x183.png 300w, https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2025\/10\/scammers-clone-persons-faces-to-steal-all-the-money-expand-620x378.png 620w, https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2025\/10\/scammers-clone-persons-faces-to-steal-all-the-money-expand-246x150.png 246w, https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2025\/10\/scammers-clone-persons-faces-to-steal-all-the-money-expand-600x366.png 600w\" sizes=\"(max-width: 820px) 100vw, 820px\" \/><p id=\"caption-attachment-16313\" class=\"wp-caption-text\">Cybersecurity experts stated that, so far, the attacks have focused on financial companies and their clients in Vietnam and Thailand, though it is not unlikely that cybercriminals will expand their operations to other countries.<\/p><\/div>\n<h2>What causes the rise of these cyberattacks<\/h2>\n<p>The proliferation of personal images on social networks and other digital platforms makes it easier for attackers to obtain facial data. Today, most people have photos of their faces available online, which increases vulnerability to this type of fraud.<\/p>\n<p>Group-IB explained that although passwords are still in use, the trend is moving toward broader adoption of biometric identification systems, such as facial or fingerprint recognition, under the assumption that these methods cannot be stolen in the same way as traditional passwords.<\/p>\n<p>However, the emergence of trojans like GoldPickaxe and the use of deepfakes demonstrate that biometric security can also be compromised.<\/p>\n<p>The sophistication of these tools calls into question the effectiveness of facial authentication systems, especially when attackers have access to image databases and AI technology capable of generating convincing replicas.<\/p>\n<p>The evolution of these types of cyber threats presents new challenges for financial institutions and app developers, who must strengthen their protective mechanisms and seek alternatives to reduce the risk of identity theft through deepfakes.<\/p>\n<p>The ease with which cybercriminals can access biometric data and use it for bank fraud represents a growing challenge in the field of digital security.<\/p>\n<p>Another point to consider is the risk of posting photos on social networks without restricting who can view this information.<\/p>\n<h2>Links<\/h2>\n<ul>\n<li><a href=\"https:\/\/www.santander.com\/en\/stories\/deepfakes-and-how-to-safeguard-against-scams\" target=\"_blank\" rel=\"noopener noreferrer\">Deepfakes, how to protect ourselves against fraud<\/a> &#8211; Santander<\/li>\n<li><a href=\"https:\/\/igotoffer.com\" target=\"_blank\" rel=\"noreferrer noopener\">Sell pre-owned Apple device online<\/a> &#8211; iGotOffer<\/li>\n<\/ul>\n<h2>Deepfake scams: New face of fraud | FOX 5 News [Video]<\/h2>\n<div class=\"ytb\">\n<p style=\"text-align:center;\">\n<iframe title=\"Deepfake scams: New face of fraud | FOX 5 News\" width=\"620\" height=\"349\" src=\"https:\/\/www.youtube.com\/embed\/VlnelC3c-4k?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/p>\n<\/div>\n<p style=\"text-align:center;\">Video uploaded by <a class=\"yt-simple-endpoint style-scope yt-formatted-string\" rel=\"noopener noreferrer\" href=\"https:\/\/www.youtube.com\/@fox5atlanta\" target=\"_blank\">Fox 5 Atalanta<\/a> on <strong class=\"watch-time-text\">October 19, 2025<\/strong>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This scam clones a person\u2019s face to steal all the money from their bank account without needing a password Cybercriminals take advantage of the fact that many financial applications require biometric data for access; they use artificial intelligence to copy several facial features of the victim. The case of a Vietnamese citizen who lost $400,000 [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":16310,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[460,435,429,458],"tags":[707,675,706],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Scammers Clone Person&#039;s Faces to steal all the money | iGotOffer<\/title>\n<meta name=\"description\" content=\"Cybercriminals use artificial intelligence to copy several facial features of the victim for many financial applications.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/igotoffer.com\/blog\/scammers-clone-persons-faces-to-steal-all-the-money\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Scammers Clone Person&#039;s Faces to steal all the money | iGotOffer\" \/>\n<meta property=\"og:description\" content=\"Cybercriminals use artificial intelligence to copy several facial features of the victim for many financial applications.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/igotoffer.com\/blog\/scammers-clone-persons-faces-to-steal-all-the-money\" \/>\n<meta property=\"og:site_name\" content=\"iGotOffer Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iGotOffer\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-29T18:32:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2025\/10\/scammers-clone-persons-faces-to-steal-all-the-money.png\" \/>\n\t<meta property=\"og:image:width\" content=\"820\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@iGotOffer\" \/>\n<meta name=\"twitter:site\" content=\"@iGotOffer\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"author author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/igotoffer.com\/blog\/#website\",\"url\":\"https:\/\/igotoffer.com\/blog\/\",\"name\":\"iGotOffer Blog\",\"description\":\"News and reviews about electronics &amp; apps\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/igotoffer.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/igotoffer.com\/blog\/scammers-clone-persons-faces-to-steal-all-the-money#primaryimage\",\"url\":\"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2025\/10\/scammers-clone-persons-faces-to-steal-all-the-money.png\",\"contentUrl\":\"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2025\/10\/scammers-clone-persons-faces-to-steal-all-the-money.png\",\"width\":820,\"height\":500,\"caption\":\"Scammers Clone Person's Faces to steal all the money\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/igotoffer.com\/blog\/scammers-clone-persons-faces-to-steal-all-the-money#webpage\",\"url\":\"https:\/\/igotoffer.com\/blog\/scammers-clone-persons-faces-to-steal-all-the-money\",\"name\":\"Scammers Clone Person's Faces to steal all the money | iGotOffer\",\"isPartOf\":{\"@id\":\"https:\/\/igotoffer.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/igotoffer.com\/blog\/scammers-clone-persons-faces-to-steal-all-the-money#primaryimage\"},\"datePublished\":\"2025-10-29T18:32:01+00:00\",\"dateModified\":\"2025-10-29T18:32:01+00:00\",\"author\":{\"@id\":\"https:\/\/igotoffer.com\/blog\/#\/schema\/person\/b645d3b30dfcc19d397ec51499cb0b67\"},\"description\":\"Cybercriminals use artificial intelligence to copy several facial features of the victim for many financial applications.\",\"breadcrumb\":{\"@id\":\"https:\/\/igotoffer.com\/blog\/scammers-clone-persons-faces-to-steal-all-the-money#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/igotoffer.com\/blog\/scammers-clone-persons-faces-to-steal-all-the-money\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/igotoffer.com\/blog\/scammers-clone-persons-faces-to-steal-all-the-money#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/igotoffer.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Scammers Clone Person&#8217;s Faces to steal all the money\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/igotoffer.com\/blog\/#\/schema\/person\/b645d3b30dfcc19d397ec51499cb0b67\",\"name\":\"author author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/igotoffer.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9a751e7e33f98c8ee4441814a9bdf2e4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9a751e7e33f98c8ee4441814a9bdf2e4?s=96&d=mm&r=g\",\"caption\":\"author author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Scammers Clone Person's Faces to steal all the money | iGotOffer","description":"Cybercriminals use artificial intelligence to copy several facial features of the victim for many financial applications.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/igotoffer.com\/blog\/scammers-clone-persons-faces-to-steal-all-the-money","og_locale":"en_US","og_type":"article","og_title":"Scammers Clone Person's Faces to steal all the money | iGotOffer","og_description":"Cybercriminals use artificial intelligence to copy several facial features of the victim for many financial applications.","og_url":"https:\/\/igotoffer.com\/blog\/scammers-clone-persons-faces-to-steal-all-the-money","og_site_name":"iGotOffer Blog","article_publisher":"https:\/\/www.facebook.com\/iGotOffer","article_published_time":"2025-10-29T18:32:01+00:00","og_image":[{"width":820,"height":500,"url":"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2025\/10\/scammers-clone-persons-faces-to-steal-all-the-money.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_creator":"@iGotOffer","twitter_site":"@iGotOffer","twitter_misc":{"Written by":"author author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/igotoffer.com\/blog\/#website","url":"https:\/\/igotoffer.com\/blog\/","name":"iGotOffer Blog","description":"News and reviews about electronics &amp; apps","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/igotoffer.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/igotoffer.com\/blog\/scammers-clone-persons-faces-to-steal-all-the-money#primaryimage","url":"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2025\/10\/scammers-clone-persons-faces-to-steal-all-the-money.png","contentUrl":"https:\/\/igotoffer.com\/blog\/wp-content\/uploads\/2025\/10\/scammers-clone-persons-faces-to-steal-all-the-money.png","width":820,"height":500,"caption":"Scammers Clone Person's Faces to steal all the money"},{"@type":"WebPage","@id":"https:\/\/igotoffer.com\/blog\/scammers-clone-persons-faces-to-steal-all-the-money#webpage","url":"https:\/\/igotoffer.com\/blog\/scammers-clone-persons-faces-to-steal-all-the-money","name":"Scammers Clone Person's Faces to steal all the money | iGotOffer","isPartOf":{"@id":"https:\/\/igotoffer.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/igotoffer.com\/blog\/scammers-clone-persons-faces-to-steal-all-the-money#primaryimage"},"datePublished":"2025-10-29T18:32:01+00:00","dateModified":"2025-10-29T18:32:01+00:00","author":{"@id":"https:\/\/igotoffer.com\/blog\/#\/schema\/person\/b645d3b30dfcc19d397ec51499cb0b67"},"description":"Cybercriminals use artificial intelligence to copy several facial features of the victim for many financial applications.","breadcrumb":{"@id":"https:\/\/igotoffer.com\/blog\/scammers-clone-persons-faces-to-steal-all-the-money#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/igotoffer.com\/blog\/scammers-clone-persons-faces-to-steal-all-the-money"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/igotoffer.com\/blog\/scammers-clone-persons-faces-to-steal-all-the-money#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/igotoffer.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Scammers Clone Person&#8217;s Faces to steal all the money"}]},{"@type":"Person","@id":"https:\/\/igotoffer.com\/blog\/#\/schema\/person\/b645d3b30dfcc19d397ec51499cb0b67","name":"author author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/igotoffer.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9a751e7e33f98c8ee4441814a9bdf2e4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9a751e7e33f98c8ee4441814a9bdf2e4?s=96&d=mm&r=g","caption":"author author"}}]}},"_links":{"self":[{"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/posts\/16303"}],"collection":[{"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/comments?post=16303"}],"version-history":[{"count":4,"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/posts\/16303\/revisions"}],"predecessor-version":[{"id":16315,"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/posts\/16303\/revisions\/16315"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/media\/16310"}],"wp:attachment":[{"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/media?parent=16303"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/categories?post=16303"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/igotoffer.com\/blog\/wp-json\/wp\/v2\/tags?post=16303"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}