How Underground Groups Use Stolen Identities and Deepfakes

Pixel_

Level 4
Thread author
Verified
Well-known
Jun 7, 2022
153
The growing appearance of deepfake attacks is significantly reshaping the threat landscape for organizations, financial institutions, celebrities, political figures, and even ordinary people.
The use of deepfakes brings attacks such as business email compromise (BEC) and identity verification bypassing to new levels.


There are several preconditions for and reasons that these attacks have been successful:


  • All the technological pillars are in place. The source code for deepfake generation is public and available to anyone willing to use it.
  • The number of available images in public is enough for bad actors to create millions of fake identities using deepfake technologies.
  • Criminal groups are early adaptors of such technologies and regularly discuss the use of deepfake technologies to increase the effectiveness of existing money laundering and monetization schemes.
  • We are seeing trends of deepfake implementation in newer attacks scenarios, such as in social engineering attacks, where deepfakes are a key technological enabler.

 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top