Somewhere in West Africa, a fraud syndicate is running what amounts to a shift. Not a heist. Not a scam. A shift — organised, repeatable, and automated. In a single month in 2025, one operation cycled through 160,000 verification attempts using just 100 real human faces. One of those faces was tried more than 12,000 times across multiple platforms. In one documented case, a single identity attempted over 1,000 account registrations in 30 minutes.
These are not the numbers of opportunists. They are the numbers of an industry.
Africa’s fintech sector has spent the better part of a decade solving inclusion — getting the unbanked into the financial system, building mobile-first platforms that work at the infrastructure edge, reducing the friction between a person and their first account. That effort has worked. The share of African adults with a financial account has risen from 34% to nearly 60% over the past decade, adding more than 200 million new account holders to the continent’s digital economy.
What has also worked, with comparable efficiency, is the fraud infrastructure built to exploit it.
The Checkpoint Model Is Broken
Identity verification in Africa, for most of its history, operated as a gate. Submit a selfie. Match a face. Check a document. If the inputs looked legitimate, the system let you through. This made sense when fraud was predominantly individual — a person with a fake ID, a low-quality spoof, a borrowed document. The assumption baked into most systems was that fraud was rare and detectable through visual inspection.
That assumption collapsed somewhere around 2024.
According to data from Smile ID, which processed more than 200 million identity checks across Africa in 2025, authentication-related fraud attempts are now five times more common than fraud at onboarding. The attackers have not gotten better at getting through the front door. They have stopped trying. Instead, they wait until an account is verified, trusted, and funded — then move against it at the moments that unlock value: login flows, password resets, device changes, and high-value withdrawals.
The shift reflects a straightforward economic calculation. Onboarding is increasingly well-defended. Post-onboarding flows, by contrast, are often designed for user convenience — lighter controls, faster pathways, fewer friction points. An account that has already passed KYC is worth more to an attacker than a fresh application, because it carries higher transaction limits, established history, and access to liquid funds that can be moved quickly before anyone notices.
In West African retail banking, potential fraud attempts rose approximately 50% year-over-year in 2025, driven almost entirely by activity in authentication and account recovery flows. The accounts being targeted had already cleared compliance. Most of the fraud did not happen at the perimeter. It happened inside trusted systems.
When Fraud Becomes a Supply Chain
Understanding what changed requires understanding what generative AI did to the economics of fraud — not just technically, but structurally.
High-quality synthetic documents, deepfake video, and AI-generated facial imagery are no longer expensive or difficult to produce. What previously required specialist skills and meaningful investment can now be generated cheaply, iterated rapidly, and deployed at scale. The marginal cost of each additional fraud attempt, when the underlying infrastructure already exists, approaches zero.
This changes everything about how fraud operates. When attempts are cheap, attackers do not need to succeed on the first try. They probe continuously, test responses, and iterate until they find the gap. A face repository, an emulator farm, a virtual camera injection tool — these are fixed costs, amortised across thousands of attempts, dozens of platforms, and months of coordinated campaigns. The return on fraud infrastructure increases the more it is reused.
What this produces, in practice, is something closer to a supply chain than a crime. Identity farming — the large-scale acquisition or creation of verified accounts, left dormant for weeks or months to build transaction history before being activated for fraud or money laundering — has become a standard operating model. Syndicates source real identity credentials, use insider-assisted onboarding to get accounts approved, then let them age until they look legitimate. By the time the account is activated, it can move significant funds in short bursts before any detection system can respond.
The number of duplicate fraud attempts detected by Smile ID’s biometric deduplication system more than doubled year-over-year in 2025, reaching nearly three times the combined 2023 and 2024 total. That growth reflects not just more attacks, but more sophisticated reuse — the same faces, devices, and behavioural patterns deployed across multiple platforms in coordinated waves.
The Camera Is No Longer the Truth
Perhaps the most technically significant shift in 2025 was the rise of injection attacks — fraud that targets not what a verification system sees, but how it sees it.
Traditional fraud tries to fool the model. Injection attacks bypass it entirely. Instead of presenting a manipulated face to a real camera, attackers replace the camera feed itself — feeding pre-recorded video, AI-generated imagery, or synthetic media streams directly into the verification pipeline through virtual cameras or tampered application environments. The output can look visually flawless. The face matches. The liveness check passes. The document looks clean. But the capture environment was compromised before any analysis began.
Smile ID flagged more than 100,000 injection-style attempts per month in 2025, linked to emulator farms, virtual cameras, or modified SDKs. These attempts often look legitimate when assessed in isolation. The fraud is revealed not through the image itself, but through metadata inconsistencies, abnormal capture timing, conflicting hardware fingerprints, and environmental signals that only become visible when the full capture pipeline is examined.
This explains one of the report’s more striking statistics: nearly 90% of verifications rejected for suspected fraud in 2025 were caught using mobile SDK integrations, compared to 15% in 2023 and 65% in 2024. SDKs sit inside the application and can validate that media originated from a live camera on a real device in a legitimate environment. API-based flows, which process only the final submitted image, have limited visibility into how that image was produced — a gap that injection attacks exploit systematically.
The implication is significant. The question that used to drive fraud detection — “does this look real?” — is no longer sufficient. The question that matters now is “can we trust where this came from?”
A Continent of Different Risks
Africa is not a single fraud environment, and the tactics being deployed reflect that. Regional infrastructure, regulatory frameworks, and verification maturity shape which attacks work where.
In West Africa — particularly Nigeria and Ghana — fraud is dominated by biometric reuse and insider-assisted account takeover. Attackers source identity credentials, use agent networks or compromised staff to get accounts approved, then target those accounts post-verification. Impersonation and no-face-match account for roughly two-thirds of detected fraud attempts in the region.
In East Africa, the picture is different. Kenya, Uganda, and parts of the broader region rely heavily on document-led verification flows, with inconsistent access to real-time biometric cross-checks against authoritative national databases. Where documents are the primary control, attackers exploit documents — portrait swaps, photocopies, and screen-based manipulation account for roughly 60% of rejected verifications in the region. In Uganda, a 2025 fraud case involved a forged national ID used in an attempted bank theft exceeding $100,000. In Kenya, a December 2025 crackdown targeted syndicates manufacturing counterfeit citizenship documents at scale.
Southern Africa presents yet another pattern. Biometric impersonation dominates, with nearly 90% of rejected verifications driven by spoofing and no-face-match. Deepfake attempts, which averaged under 200 per month in 2024, surged to more than 3,000 monthly attempts by end of 2025 — a signal of growing sophistication and a more technically capable attacker base.
In Francophone markets, regulatory restrictions on biometric data processing in several countries limit private-sector access to authoritative biometric matching, pushing verification toward document-based flows. Where documents dominate, document fraud dominates: portrait anomalies and photocopies account for roughly two-thirds of flagged attempts across these markets.
The Detty December Footnote
Not all fraud in Africa is technical. One pattern from late 2024 illustrates a simpler, more familiar form of financial exploitation.
In the weeks following Nigeria and Ghana’s festive travel season — the period known locally as Detty December — a wave of chargebacks was filed in January 2025, predominantly initiated from abroad. The pattern aligned with cardholders who had travelled to West Africa during the holiday period, spent money at local merchants, then disputed the charges on return.
Issuers tend to side with cardholders in payment disputes. Smaller merchants, particularly in hospitality and retail, rarely have documentation strong enough to contest a dispute filed from another country. Revenue recognised in December was quietly reversed in January — often without merchants understanding the pattern until the losses had accumulated.
The mechanism is not sophisticated. It exploits the gap between where spending happens and where payment disputes are adjudicated. But the timing is deliberate: merchants managing peak-season volume are poorly positioned to track and contest a wave of reversals that arrives weeks later.
What Comes Next
The overall fraud rejection rate across Smile ID’s network declined from 25% in 2024 to 22% in 2025. On the surface, this looks like progress. It is not — or at least, not straightforwardly. The decline reflects a shift in attacker behaviour, not a reduction in threat. Low-value, noisy onboarding fraud has fallen. High-value, targeted account takeover has risen. Attackers are becoming more selective, not less active.
The structural challenge this creates for African fintechs, banks, and digital platforms is significant. Systems designed for one-time KYC verification are now facing adversaries who treat the entire customer lifecycle as an attack surface. Controls calibrated for rare, isolated incidents are being tested by automated, coordinated campaigns running continuously across multiple platforms simultaneously.
Addressing this requires a different model: verification that operates across the full customer lifecycle rather than at a single checkpoint; authentication controls that apply proportionate friction at the moments value becomes accessible; and capture integrity validation that confirms not just what was submitted, but the trustworthiness of the system that produced it.
The fraud operations targeting Africa’s digital economy have already made that architectural shift. The platforms they target are still catching up.
Data in this article is drawn from Smile ID’s Digital Identity Fraud in Africa 2026 report, covering more than 200 million identity verification checks conducted across 35+ African countries in 2025.

