A deepfake is a video or image produced by a neural network that attempts to perfectly capture the likeness of someone else. Commonly it is used to map the face of one person onto another. Deepfake technology has become more and more advanced, and it represents a real technical feat: not only are people now able to simulate the faces of high-profile celebrities such as Tom Cruise, they are also able to accurately simulate the voices of their targets. Similar technologies have been used by film production companies to recreate the likeness of actors, for example in Lucasfilms' CGI Carrie Fisher and Peter Cushing, however there are tools on the internet such as Lyrebird that allow anyone to make high-quality deepfakes of anybody they like.
To create a believable deepfake the creator needs to have access to a lot of good quality sample data, and generally this means that the most common targets are politicians, actors and other celebrities. Consider the aforementioned viral sensation DeepTomCruise, who is in fact not Tom Cruise himself but a project by Chris Umé and Miles Fisher. More sinister, however, are the deep-faked videos of Ukraine's President Zelensky asking his troops to surrender, or the deep-faked videos of Elon Musk promoting a new cryptocurrency that is actually a rug-pull designed to scam investors.
Deepfakes also represent a real threat to businesses as a vishing technique - phishing using voice and video. In 2019, a company insured by Euler Hermes Group lost $243,000 to a fraudster who had managed to deep-fake the voice of the company's CEO over the phone, and asked for the funds to be wired to a Hungarian bank account from which they then disappeared. The same thing happened again to a different company in early 2020 where vishing was used as part of a scheme to trick a Hong Kong bank manager into authorising a $35,000,000 transfer of company funds. Multiple reports have surfaced of other deep-fake vishing attempts.
LinkedIn has also been struggling with deep-fakes of a different variety: not high-profile individuals, but AI-generated humans which are indistinguishable from real people. Fake profiles have been used by some companies as a marketing ploy which leverages physiognomy: their profile photos are professional and attractive which statistically makes them appear more trustworthy. They then used these profiles to sell and promote services to real LinkedIn users. This practice has deceived much of LinkedIn's userbase and has required the company to intervene, which banned over 15 million fake accounts in the first half of 2021.
There are concerns that the rapid move from office work to online corporate environments necessitated by the pandemic has created many new vulnerabilities for bad actors to exploit. People unfamiliar to the digital landscape can be trained to recognise a vast array of cybercrime attempts, but deepfakes represent a sophisticated and insidious threat which is constantly improving to become less and less detectable. Today, they are an important tool which is increasingly utilised by bad actors to strengthen their phishing and business-email compromise attacks, so you need to know how to spot a fake video when you see one.
Given the potential harm that deepfakes can cause, it is important to know how to spot a deepfake. Here are a few methods for detecting deepfakes:
It's important to note that even with these methods, it can still be difficult to spot a deepfake, and may get more difficult still. However, by being aware of the potential signs of a deepfake, and staying up-to-date on the latest methods for detecting them, you can better protect yourself against fraud, phishing and the spread of misinformation.
In conclusion, deepfakes are a growing concern for businesses, and it's important to know how to spot them. By checking for inconsistencies, looking for artificial elements, analyzing the audio, checking the context, and using specialized software and tools, you can increase your chances of identifying a deepfake and protecting yourself from the potential harm it can cause.
Sources
https://www.pnas.org/doi/10.1073/pnas.2120481119
https://www.wabe.org/that-smiling-linkedin-profile-face-might-be-a-computer-generated-fake/
https://www.npr.org/2022/03/27/1088140809/fake-linkedin-profiles
The information contained in this article is provided for informational purposes only and does not constitute professional advice and is not guaranteed to be accurate, complete, reliable, current or error-free
Mishing attacks, a form of mobile phishing, are being used in recruitment scams to target job seekers. These attacks involve sending fake job offers via SMS or messaging apps, leading victims to download malware onto their devices. This article explores the rise of mishing attacks, how they work, and the steps you can take to safeguard your personal information and financial data from these threats.
Read moreThe risks of online scams, including imposter scams, fake deals, and malvertising, are significantly higher during the holiday season. With so many tempting offers, shoppers are often targeted by cybercriminals. Learn some simple tips for safe online shopping and safeguard your personal and financial information.
Read moreBad actors, who may be any kind of hacker, carder, social engineer or otherwise, are always on the hunt for their next victim. how likely is it that you, yourself, are attacked in this way? Are you a target?
Read moreis perpetrated. In this article, we will take you through some key points which illustrate the direction that cybercrime is taking. This might help to inform users about the types of attacks we can expect throughout the rest of 2023.
Read moreA cybersecurity gap analysis is a process used in organisations to evaluate the organization’s current defences, identifies vulnerabilities and weaknesses in the company security framework, and guides improvements, helping businesses prioritize risks and enhance defences. It’s an essential step in building a compliant security framework and staying ahead of evolving cyber threats.
Read moreWhile a set of login credentials stolen from a personal account can cause a big inconvenience for an individual in the form of identity theft and financial loss, the same set of credentials taken from an employee’s company account can cause much larger-scale disruptions and financial losses to the company and its customers, as well as putting other employees and customers at risk. In this case, a simple password change might not cut it.
Read morePlease fill in the form below (fields with * are mandatory) and we will respond to your request as soon as possible!