Digital ForensicsFraud Prevention

Catfishing in the AI Era: Detecting Synthetics

TraxinteL Threat IntelligenceJuly 2, 2025

The Death of the 'Stolen Photo'

Until recently, identifying a catfish was relatively simple: Download their profile picture, run it through Google Reverse Image Search, and find the real person whose photos they stole (often an influencer or military personnel).

In 2025, that methodology is dead. Scammers now use Generative Adversarial Networks (GANs) and models like Midjourney to summon an infinite array of non-existent humans. Because the image is entirely new, a reverse image search will return zero results.

1. Detecting the Synthetic Face

While Generative AI is powerful, it still leaves digital fingerprints. Analysts use deep-learning models to hunt for these artifacts:

  • Pupil Asymmetry: AI often renders pupils that are slightly irregular in shape or pointing in micro-divergent directions.
  • Background Melting: The AI focuses its rendering power on the face. If you look at the background—the texture of a brick wall, the lines of a bookshelf, the text on an abstract sign—it often breaks down into nonsensical 'melting' shapes.
  • Ear Cartilage Topology: Human ears are incredibly complex. Synthetics frequently generate ears that lack depth or biological logic.

2. The Deepfake Video Call

The ultimate proof of life used to be a live video call. Today, live calls can still contain synthetic overlays or post-processing artifacts that merit closer review.

  • Profile Consistency: Analysts review whether side profiles, jawlines, and lighting remain coherent as the subject moves across the frame.
  • Occlusion Handling: Hand movement, hair movement, or rapid head turns can introduce rendering artifacts that signal the call should be reviewed more carefully.

3. Syntactic and Temporal Analysis

If the visual data is inconclusive, we deploy behavioral OSINT.

  • LLM Scripting: Scammers are using ChatGPT to generate highly romantic, persuasive dialogue. We analyze text frequency and syntactic structure. If a target's writing style is wildly inconsistent, or perfectly mimics the output of a specific LLM model, it is flagged.
  • Timezone Inconsistencies: Message timing, claimed routines, and public activity windows can reveal whether a user claiming to be in London is actually operating on a very different daily schedule.

Relevant Investigation Paths

Stronger workflow and use-case pages derived from this briefing.

Need analyst help on a live case?

Our analysts use these methodologies daily. Start a Deep Search case when you need a scoped review.

Start Deep Search