• Big Story
  • News
    • News
    • Consumer Technology
    • Market Updates
    • Technology Insights
  • Interviews
  • Opinion
  • Digital Transformation Series
  • Special Reports
    • MWC Africa
    • Nigeria 5G Spectrum Auction
Friday, February 13, 2026
  • Login
  • Register
Technology Times | Latest and Breaking Nigeria Tech News
No Result
View All Result
Technology Times | Latest and Breaking Nigeria Tech News
No Result
View All Result
Technology Times | Latest and Breaking Nigeria Tech News
No Result
View All Result
Your text
Remita Remita Remita
ADVERTISEMENT

Protecting your data from face-stealing scams

Adrian Stanford, Group CTO at ESET Southern Africa, says that face-stealing scams are rising as cybercriminals are adapting quickly to the use of less sophisticated biometric technology.

Technology Times ContributorbyTechnology Times Contributor
30/10/2024
in Technology Insights
Reading Time: 4 mins read
2 0
A A
0
eset-protecting-data-from-face-stealing-scams

Adrian Stanford, Group CTO at ESET Southern Africa, says that face-stealing scams are rising as cybercriminals are adapting quickly to the use of less sophisticated biometric technology.

ADVERTISEMENT

As facial recognition technology becomes more widespread, many people are embracing it as a secure and convenient means of authentication. With tech giants like Apple popularising Face ID, which not only encrypts facial data and only stores it on device in Secure Enclave, but also uses sophisticated 3D scanning that can’t be easily fooled or compromised, financial institutions however have also integrated facial recognition into their security protocols.

However, Adrian Stanford, Group CTO at ESET Southern Africa, says the latest ESET Threat Report H1 2024 reveals that cybercriminals are adapting quickly to the use of less sophisticated biometric technology.

Using advanced techniques, attackers are now exploiting AI-driven face-swapping services to bypass security measures and gain unauthorised access to victims’ accounts via fake mobile applications. “While facial recognition is undoubtedly a popular and useful security tool, it’s crucial to understand its limitations. Simply relying on camera-based biometrics can provide a false sense of security. Cybercriminals are continuously innovating, and they have found ways to manipulate even the most some facial recognition technologies to suit their objectives.”

eset-protecting-data-from-face-stealing-scams
Adrian Stanford, Group CTO at ESET Southern Africa..

The power of biometric authentication

Biometric authentication methods, including facial and fingerprint recognition, are becoming increasingly popular among consumers and businesses alike. According to research in 2023, more than 50% of consumers used biometric authentication for online transactions, while fingerprint and facial recognition emerged as the top biometric methods, used by nearly 30% and 50% of consumers respectively​. Additionally, the adoption of biometric authentication is gaining significant traction among IT and cybersecurity professionals, with many organisations shifting towards these methods to replace traditional passwords in workplace environments​.

This growing reliance on biometrics reflects a global trend. The biometric market, valued at approximately $5 billion in 2022, is expected to reach $19.3 billion by 2032. “Biometric technology provides ease of use and a level of security that many people find reassuring. However, this demand has also attracted the attention of cybercriminals who are adept at exploiting new technologies,” Stanford notes.

The malware threat

As biometric systems become more sophisticated, so do the tactics used by cybercriminals. “The GoldPickaxe malware is one of the latest threats to exploit biometric data. Posing as legitimate apps, these fake applications trick users into providing videos of their faces and other personal information, which are then used to create deepfake videos. These realistic-looking videos are capable of bypassing some forms of biometric security,” Stanford explains.


GoldPickaxe malware has been observed targeting both Android and iOS users by impersonating legitimate applications. In one case, it posed as a Thai government app, collecting sensitive information such as identification documents, SMS messages, and facial recognition data.

Victims are tricked into installing a mobile device management (MDM) profile, which allows attackers to control the victim’s iOS device. On Android, it is typically distributed through websites masquerading as the Google Play Store. The ultimate aim is to gain access to users’ banking applications and other high-value targets.

As biometric systems become more sophisticated, so do the tactics used by cybercriminals. “The GoldPickaxe malware is one of the latest threats to exploit biometric data. Posing as legitimate apps, these fake applications trick users into providing videos of their faces and other personal information, which are then used to create deepfake videos. These realistic-looking videos are capable of bypassing some forms of biometric security,” Stanford explains.

How to avoid face-stealing scams

“While biometric security is a powerful tool, it is not infallible. Users should remain vigilant and take additional steps to protect their personal information,” says Stanford.

  • Download apps only from official sources

Always use official app stores, such as Google Play or the Apple App Store, to reduce the risk of downloading malicious applications.

  • Be cautious of ‘too good to be true’ offers

Always try to verify claims about eligibility for prizes, discounts, or, as in the case of GoldPickaxe, refunds and bonuses. If it seems too good to be true, it probably is.

  • Use Multi-Factor Authentication (MFA)

MFA adds an extra layer of security by requiring multiple forms of identification before granting access.

  • Verify the authenticity of financial apps

Scrutinise any app that requests biometric data, particularly financial applications. Look for reviews and official endorsements before proceeding.

Related Articles

Identy.io explores Nigeria entry, names Olasiyan-Ola to lead West Africa

Nigeria Police arrest suspects in Microsoft 365 phishing crackdown

EFCC uncovers fintech identity fraud ring exploiting young Nigerians

Nigeria‘s digital health drive to boost access, FG says

Interpol seeks Nigerian, global experts to tackle AI Deepfake threats

‘On the preponderance of caution’ — How MTN Nigeria navigated 72-hour countdown in data breach incident

Increased risk of fraud during times of economic uncertainty

NIMC warns Nigerians to guard their data amid illegal NIN harvesting in Anambra 

Kaspersky, Smart Africa sign cybersecurity deal

FBI, CISA warn software makers of flaws exploited by cybercriminals

  • Run regular security scans

Suspicious activity on your smartphone? Run a security scan with a reputable security app. If you discover a malicious app, delete it and restart your phone. Resetting your Android device to factory settings may be necessary.

“Creating fake videos using AI for scams sounds scary, but even these elaborate attacks can be avoided or stopped via appropriate cybersecurity solutions and sufficient awareness. While no single technology is the ultimate answer for everything, reliable cybersecurity consists of a multilayered defence combined with a prevention-first approach,” Stanford adds.

Tags: cybersecuritybiometricsesetface-stealing scamsIdentity theft
Share30Tweet19Share5SendShare
Previous Post

Minister tasks online content creators on ethical standards

Next Post

FG adopts 24/7 surveillance technology for border security

Technology Times Contributor

Technology Times Contributor

Related Posts

how-mtn-nigeria-navigated-72-hour-data-breach
The Big Story

‘On the preponderance of caution’ — How MTN Nigeria navigated 72-hour countdown in data breach incident

byFejiro Awowede
21/05/2025
efcc-and-nira-to-strengthen-cybersecurity-tie
News

Cybersecurity: EFCC, NIRA strengthen tie to ‘sanitise Nigeria’s cyberspace’

byFejiro Awowede
31/01/2025
ngcert-warns-of-anatsa-banking-malware
News

ngCERT: Anatsa, malware stealing banking data, hits 70,000 Android devices

byOladapo Riliwan
11/07/2024
#NGTF2015: Cybersecurity must top priority for Nigeria, Awe says
News

#NGTF2015: Cybersecurity must top priority for Nigeria, Awe says

byTechnology Times Contributor
20/04/2015
cybersecurity-detected-467000-malicious-files
News

Cybersecurity experts ‘detected 467,000 malicious files daily in 2024’

byFejiro Awowede
12/01/2025
lagos-state-judiciary-on-ways-to-fix-cybercrime
News

Lagos State judiciary outlines ways to combat cybercrime in Nigeria

byOmokanye Damilola
24/09/2024
corporate-internal-controls-and-cybersecurity
Technology Insights

Cybersecurity: Company’s internal controls are great – until they’re not

byTechnology Times Contributor
12/07/2024
fbi-cisa-warn-software-makers-of-security-flaws
News

FBI, CISA warn software makers of flaws exploited by cybercriminals

byFejiro Awowede
13/02/2025
Mr. Godwin Emefiele, Governor of the Central Bank of Nigeria (CBN), undergoing a biometric verification exercise
News

Implementing Data Protection and Privacy in Africa

byTechnology Times Contributor
13/07/2015
Mr. Godwin Emefiele, Governor of the Central Bank of Nigeria (CBN), undergoing a biometric verification exercise
Consumer Technology

BVN: Biometrics tech raises security bar for Nigerian banks

byKayode Oladeinde
15/06/2015
Next Post
fg-adopts-surveillance-technology-for-border

FG adopts 24/7 surveillance technology for border security

nitda-parents-protect-children-on-social-media

NITDA to Nigerian parents: Protect children from social media risks

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

four × 4 =

Latest Articles

boi-funds-100-tech-ventures-amid-record-₦636bn

BOI Funds 100 tech ventures amid record ₦636bn disbursement in 2025

13/02/2026
IHS Towers sells 51% stakes to to Brazil’s TIM in $452.6m deal

IHS Towers sells 51% stakes to to Brazil’s TIM in $452.6m deal

11/02/2026
nigeria-overhauls-outdated-telecoms-policy

Nigeria overhauls ‘outdated’ telecoms policy that heralded mobile explosion, eyes next telecoms growth phase

11/02/2026
fg-ericsson-launch-connect-nextgen-hackathon

FG, Ericsson launch Connect NextGen Hackathon to up Nigerian youths in 5G, AI

11/02/2026
identy-io-explores-nigeria-entry-names-olasiyan

Identy.io explores Nigeria entry, names Olasiyan-Ola to lead West Africa

10/02/2026
CrownCrystal Technologies CrownCrystal Technologies CrownCrystal Technologies
ADVERTISEMENT
ADVERTISEMENT
eGovernance Nigeria Magazine eGovernance Nigeria Magazine eGovernance Nigeria Magazine
ADVERTISEMENT

POPULAR ARTICLES

  • fg-ericsson-launch-connect-nextgen-hackathon

    FG, Ericsson launch Connect NextGen Hackathon to up Nigerian youths in 5G, AI

    50 shares
    Share 20 Tweet 13
  • BOI Funds 100 tech ventures amid record ₦636bn disbursement in 2025

    50 shares
    Share 20 Tweet 13
  • Nigerians consumed 13 million terabytes of internet data in 2025

    72 shares
    Share 29 Tweet 18
  • Critical National Information Infrastructure: Tinubu orders NSA to secure 13 key sectors including banking, ICT tech assets

    432 shares
    Share 173 Tweet 108
  • IHS Towers sells 51% stakes to to Brazil’s TIM in $452.6m deal

    65 shares
    Share 26 Tweet 16
  • Nigeria, South Korea opens talk on electric vehicle manufacturing plant

    63 shares
    Share 25 Tweet 16
  • UNILAG unveils Faculty of Computing and Informatics to drive digital-era innovation

    178 shares
    Share 71 Tweet 45
  • Nigeria overhauls ‘outdated’ telecoms policy that heralded mobile explosion, eyes next telecoms growth phase

    59 shares
    Share 24 Tweet 15
  • Identy.io explores Nigeria entry, names Olasiyan-Ola to lead West Africa

    61 shares
    Share 24 Tweet 15
  • FG unveils plan to digitize cooperative societies across Nigeria

    68 shares
    Share 27 Tweet 17

Latest Videos

  • TT TV
data-privacy-and-nigerias-online-consumers

Data privacy and Nigeria’s online consumers | Technology Times Live TV

11/08/2025
9mobile Rebranding Livestream | Technology Meets Tenacity | Technology Times Live

9mobile Rebranding Livestream | Technology Meets Tenacity | Technology Times Live

08/08/2025
teniola-advocates-dynamic-billing-for-nigerians

Teniola advocates dynamic billing to protect Nigerian consumers | Technology Times Policy eXchange

14/04/2025
watch-mtn-nigeria-board-lawsuit-interview

#Watch: MTN Nigeria’s board is filled with ex-regulators—is this a conflict of interest?

24/03/2025
engr-banjo-on-local-content-in-nigeris-telecoms

Watch: Engr. Banjo on local content in Nigeria’s telecoms market

23/03/2025
Load More
Facebook Twitter Youtube LinkedIn RSS

ABOUT TECHNOLOGY TIMES

technology-times-logo

Nigeria Technology Media Group

Founded in 2004, Technology Times’ trusted technology news, market intelligence, views and business services reach readers and partners across Nigeria, Africa and beyond.

Advertising

Sign up for TT eNews

Get in touch here

CONTACT US

Phone: +234 201 454 1818
WhatsApp: +234 815 700 0100
Email: info@technologytimes.ng
Web: www.technologytimes.ng

LEGAL & COMPLIANCE

technology-times-logoHome

TT Privacy Policy

TT Terms & Conditions

TT Website Disclaimer

TT Guest Post Guidelines

TT Sitemap

VOffice

  • credicorp-portal-for-nigeria-consumer-credit

    CREDICORP: FG opens portal on www.credicorp.ng for Nigerians to access consumer credit

    15731 shares
    Share 6292 Tweet 3933
  • CUG: NCC caps call rate at ₦50, bans data bundling

    5058 shares
    Share 2023 Tweet 1265
  • 9mobile rebrands today, targets multibillion-naira comeback in mobile market

    4413 shares
    Share 1765 Tweet 1103
  • Exclusive: Boardroom battle erupts at 9mobile, threatens spectrum trade deal with MTN

    3890 shares
    Share 1556 Tweet 973

©2004-2025 Technology Times, owned and operated by Digital Transformation Media Limited (DTML), Nigeria or its affiliates. All rights reserved.

Welcome Back!

Sign In with Facebook
Sign In with Google
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Big Story
  • News
    • News
    • Consumer Technology
    • Market Updates
    • Technology Insights
  • Interviews
  • Opinion
  • Digital Transformation Series
  • Special Reports
    • MWC Africa
    • Nigeria 5G Spectrum Auction
  • Login
  • Sign Up

©2004-2025 Technology Times, owned and operated by Digital Transformation Media Limited (DTML), Nigeria or its affiliates. All rights reserved.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy Page.