You can edit almost every page by Creating an account. Otherwise, see the FAQ.

Deepfake phishing

From EverybodyWiki Bios & Wiki




Script error: No such module "Draft topics". Script error: No such module "AfC topic".

Deepfake phishing - this is a type of phishing attack that include deepfake mechanism for convincing a user that he or she speaks with some of his or her relatives, manager or CEO. This attack happens via phone call or video call an attacker use a deepfake technology for changing appearances and looks like someone else, for example, relatives, bank manager, accountant or CEO, and claim for some money transfer or reveal sensitive information to the attacker.

History[edit]

In 2019 the beginning of the COVID-19 pandemic many countries were locked down because of the lockdown. Business sphere was moved to online for a work, including hiring processes, daily meetings and even decision makings. This lockdowns also leads to the popularization of remote work, remote study, remote medicine, etc.

Such working conditions, where people start using an application for a video talk, leads to the popularization of the deepfake phishing.

Type of phishing[edit]

Deepfake phishing could be divided into following types:[1][2]

Audio[edit]

AI is trained to mimic a voice of a person. It could be used as a separate phishing attack by phone call or in combination with video. Currently, it is mostly used deepfake technique

Visual[edit]

A standard deepfake mechanism for making a pre-recorded videos with some phishing ideas. For example, the missed video calls or some video of chairmen, who suggests you some investment plan or donation.

Real time[edit]

Real-time deepfakes are still a relatively fresh innovation and could be easily detected by some visual artifacts

Example of attacks[edit]

Criminals used artificial intelligence-based software to impersonate a chief executive’s voice and demand a fraudulent transfer of €220,000 ($243,000).[3]

AI voice cloning techniques were used to impersonate the CEO of a large company and tricked the organization’s bank manager into transferring $35 million to another account to complete an “acquisition.”[4]

References[edit]

  1. "DEEPFAKE PHISHING – AN EMERGING THREAT". 2022-11-13. Unknown parameter |url-status= ignored (help)
  2. "Why deepfake phishing is a disaster waiting to be skyrocket". 2022-12-09. Unknown parameter |url-status= ignored (help)
  3. "Fraudsters Used AI to Mimic CEO's Voice in Unusual Cybercrime Case". 2019-08-30. Unknown parameter |url-status= ignored (help)
  4. "Fraudsters Cloned Company Director's Voice In $35 Million Bank Heist, Police Find". 2021-10-14. Unknown parameter |url-status= ignored (help)


This article "Deepfake phishing" is from Wikipedia. The list of its authors can be seen in its historical and/or the page Edithistory:Deepfake phishing. Articles copied from Draft Namespace on Wikipedia could be seen on the Draft Namespace of Wikipedia and not main one.