Loading...

Photo-Altering Apps: Harmless Fun or a Fraudster’s Goldmine?

Published: July 19, 2019 by Kelly Nguyen

If you’ve seen an uptick in photos of friends and celebrities looking older with wrinkles on your social media feeds, you’re not alone. A new free photo editor has taken the internet by a storm, featuring an AI-powered image-altering application that allows users to see their “future self.” All you have to do is upload a single photo (or few) from your camera roll to be enhanced.

While this may seem like harmless fun, the app is now making headlines over increased privacy concerns about what occurs behind the scenes once users submit their selfies. Red flags were raised when multiple alleged negative implications were connected to the app – including the app’s ownership and the potential risk that the app downloaded a user’s entire photo album onto their database.

In fact, the privacy concerns also prompted Democratic Party officials to implore federal agencies, including the FBI, “to look into the potential national security and privacy risks the phone app poses to the United States.”

Since then, the app’s creators have addressed these concerns, stating most of the photo processing occurs in the cloud and most photos are deleted within 48 hours. Additionally, the only photos uploaded are ones that have been personally submitted by the user.

Regardless, a database of user-submitted photos could be seen as a goldmine to fraudsters. In a time where personal and biometric data (including facial recognition) are some of the key ways to validate security, it’s important for consumers to be aware of how and where they’re sharing their data, whether it’s for an age-progression photo app, or their financial accounts. Consumers, businesses, financial institutions – everyone – should exhibit caution and take measures to ensure personal information remains secure and is not being used for nefarious reasons.

While consumers may be aware that businesses are collecting data, companies should take steps to form digital trust with transparency. This could be achieved by:

  1. Educating consumers on how their data is being used
  2. Effectively communicating privacy policies and service terms more concisely
  3. Helping consumers feel in control of their information

To learn more about research that indicates a shift to advanced authentication methods (including biometrics), fraud trends and how to combat them, download our e-book.

Download Now

Related Posts

Fraud rings cause an estimated $5 trillion in financial damages every year, making them one of the most dangerous threats facing today’s businesses. They’re organized, sophisticated and only growing more powerful with the advent of Generative AI (GenAI). Armed with advanced tools and an array of tried-and-true attack strategies, fraud rings have perfected the art of flying under the radar and circumventing traditional fraud detection tools. Their ability to adapt and innovate means they can identify and exploit vulnerabilities in businesses' fraud stacks; if you don’t know how fraud rings work and the right signs to look for, you may not be able to catch a fraud ring attack until it’s too late. What is a fraud ring? A fraud ring is an organized group of cybercriminals who collaborate to execute large-scale, coordinated attacks on one or more targets. These highly sophisticated groups leverage advanced techniques and technologies to breach fraud defenses and exploit vulnerabilities. In the past, they were primarily humans working scripts at scale; but with GenAI they’re increasingly mobilizing highly sophisticated bots as part of (or the entirety of) the attack. Fraud ring attacks are rarely isolated incidents. Typically, these groups will target the same victim multiple times, leveraging insights gained from previous attack attempts to refine and enhance their strategies. This iterative approach enables them to adapt to new controls and increase their impact with each subsequent attack. The impacts of fraud ring attacks far exceed those of an individual fraudster, incurring significant financial losses, interrupting operations and compromising sensitive data. Understanding the keys to spotting fraud rings is crucial for crafting effective defenses to stop them. Uncovering fraud rings There’s no single tell-tale sign of a fraud ring. These groups are too agile and adaptive to be defined by one trait. However, all fraud rings — whether it be an identity fraud ring, coordinated scam effort, or large-scale ATO fraud scheme — share common traits that produce warning signs of imminent attacks. First and foremost, fraud rings are focused on efficiency. They work quickly, aiming to cause as much damage as possible. If the fraud ring’s goal is to open fraudulent accounts, you won’t see a fraud ring member taking their time to input stolen data on an application; instead, they’ll likely copy and paste data from a spreadsheet or rely on fraud bots to execute the task. Typically, the larger the fraud ring attack, the more complex it is. The biggest fraud rings leverage a variety of tools and strategies to keep fraud teams on their heels and bypass traditional fraud defenses. Fraud rings often test strategies before launching a full-scale attack. This can look like a small “probe” preceding a larger attack, or a mass drop-off after fraudsters have gathered the information they needed from their testing phase. Fraud ring detection with behavioral analytics Behavioral analytics in fraud detection uncovers third-party fraud, from large-scale fraud ring operations and sophisticated bot attacks to individualized scams. By analyzing user behavior, organizations can effectively detect and mitigate these threats. With behavioral analytics, businesses have a new layer of fraud ring detection that doesn’t exist elsewhere in their fraud stack. At a crowd level, behavioral analytics reveals spikes in risky behavior, including fraud ring testing probes, that may indicate a forthcoming fraud ring attack, but would typically be hidden by sheer volume or disregarded as normal traffic. Behavioral analytics also identifies the high-efficiency techniques that fraud rings use, including copy/paste or “chunking” behaviors, or the use of advanced fraud bots designed to mimic human behavior. Learn more about our behavioral analytics solutions and their fraud ring detection capabilities. Learn more

Published: February 27, 2025 by Presten Swenson

Fraud never sleeps, and neither do the experts working to stop it. That’s why we’re thrilled to introduce Meet the Maker, our new video series spotlighting the brilliant minds behind Experian’s cutting-edge fraud solutions. In our first episode, Matt Ehrlich, Senior Director of Identity and Fraud Product Management, and Andrea Nighswander, Senior Director of Global Solution Strategy, share how they use data, advanced analytics, and deep industry expertise to stay ahead of fraudsters. With 35+ years of combined experience, these fraud-fighting veterans know exactly what it takes to keep bad actors at bay. Watch now for an exclusive look at the minds shaping the future of fraud prevention.    Stay tuned for more episodes featuring the visionaries driving fraud innovation.

Published: February 21, 2025 by Julie Lee

The days of managing credit risk, fraud prevention, and compliance in silos are over. As fraud threats evolve, regulatory scrutiny increases, and economic uncertainty persists, businesses need a more unified risk strategy to stay ahead. Our latest e-book, Navigating the intersection of credit, fraud, and compliance, explores why 94% of forward-looking companies expect credit, fraud, and compliance to converge within the next three years — and what that means for your business.1 Key insights include: The line between fraud and credit risk is blurring. Many organizations classify first-party fraud losses as credit losses, distorting the true risk picture. Fear of fraud is costing businesses growth. 68% of organizations say they’re denying too many good customers due to fraud concerns. A unified approach is the future. Integrating risk decisioning across credit, fraud, and compliance leads to stronger fraud detection, smarter credit risk assessments, and improved compliance. Read the full e-book to explore how an integrated risk approach can protect your business and fuel growth. Download e-book 1Research conducted by InsightAvenue on behalf of Experian

Published: February 20, 2025 by Julie Lee