74% of Africans tricked into believing deepfakes are real

Issue 2 2023 Cyber Security, Security Services & Risk Management

Fake messages, emails, photos and videos are getting better at tricking people every day, which is making it riskier than ever to operate online, and harder than ever to identify misinformation.

The Top Risks Report 2023 by the Eurasia Group defined advances in deepfakes and the rapid rise of misinformation as ‘weapons of mass disruption’ and it is not far from wrong. Advances in artificial intelligence (AI) and powerful facial recognition and voice synthesis technologies have shifted the boundaries of reality, while the recent explosion of AI-powered intelligences like ChatGPT and Stable Diffusion have made it harder than ever to distinguish between the work of a human versus that of a machine. These are extraordinary and have immense positive potential, but, as Anna Collard, SVP Content Strategy & Evangelist at KnowBe4 Africa points out, there are some significant risks to businesses and individuals.

“Apart from abusing these platforms with online bullying, shaming or sexual harassment, such as fake revenge porn, these tools can be used to increase the effectiveness of phishing and business email compromise (BEC) attacks,” she adds. “These deepfake platforms are capable of creating civil and societal unrest when used to spread mis- or dis-information in political and election campaigns, and remain a dangerous element in modern digital society. This is cause for concern and asks for more awareness and understanding among the public and policymakers.”

In a recent survey undertaken by KnowBe4 across 800 employees aged 18-54 in Mauritius, Egypt, Botswana, South Africa and Kenya, 74% said that they had believed a communication via email or direct message, or a photo or video, was true when, in fact, it was a deepfake. Considering how deepfake technology uses both machine learning and AI to manipulate data and imagery using real-world images and information, it is easy to see how they were tricked. The problem is, awareness of deepfakes and how they work is very low in Africa and this puts users at risk.

Just over 50% of respondents said they were aware of deepfakes, while 48% were unsure or had little understanding of what they were. While a significant percentage of respondents were not clear as to what a deepfake was, most (72%) said they did not believe that every photo or video they saw was genuine, which was a positive step in the right direction, even though nearly 30% believed that the camera never lies.

“It is also important to note that nearly 67% of respondents would trust a message from a friend or legitimate contact on WhatsApp or a direct message while 43% would trust a video, 42% an email and 39% a voice note. Any one of these could be a fake that the trusted contact did not recognise or their account was hacked,” says Collard.

Interestingly, when asked if they would believe a video showing an acquaintance in a compromising position, even if this was out of character, most were hesitant to do so and nearly half (49%) said they would speak to the acquaintance to get to the bottom of it. However, nearly 21% said that they would believe it and 17% believed a video is impossible to fake. The response was similar when they were asked the same question, but of a video with a high-profile person in the compromising situation, with 50% saying they would give them the benefit of the doubt and 36% saying they would believe it.

“Another concern, other than reputational damage, is loss to company,” says Collard. “Most respondents (57%) would be cautious if they got a voice message or an email asking them to carry out a task they would not normally do but 20% would follow the instructions without question.”

When people were asked to select clues that they thought would give away a fake, most said that the language, spelling and expressions used would not be in the person’s usual style (72%) or that the request was out of ordinary or unexpected (63%). If it was an audio or video file, they believed they could identify a fake based on the words, tone and accent sounding unlike the person being emulated (75%), while 54% said the speech would not flow naturally.

When asked ‘What clues do you think would give away a deepfake in a video?’, respondents selected ‘their mouth movements do not sync with the audio’ (73%), ‘The request or the message is out of the ordinary, alarm signals should go off’ (49%), ‘Their head movements seem odd’ (49%), ‘The person doesn’t blink’ (46%), and ‘The person’s skin colour looks unnatural’ (44%).

“The problem is, deepfake technology has become so sophisticated that most people would find it challenging to spot a fake,” concludes Collard. “Training and awareness have become critical. These are the only tools that will help users to understand the risks and recognise the red flags when it comes to faked photo and video content. They should also be trained to understand that they should not believe everything they see and should not act on any unusual instructions without first confirming they are legitimate.”




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Prevention-first approach to cybersecurity
News Cyber Security
Check Point CEO, Gil Shwed, highlights the increasing importance of artificial intelligence in defending evolving networks and protecting against cyber threats at annual CPX 360 customer and partner event.

Read more...
Three new portable power stations to ease load shedding
News Security Services & Risk Management Products
EcoFlow has launched three portable power stations that provide sufficient power for consumers wherever they are; the DELTA 2 and RIVER 2 Series are feature-filled power solutions to the volatile electricity supply.

Read more...
You cannot bribe a computer
Access Control & Identity Management Security Services & Risk Management
Corruption is a cancer that destroys the prospects and stability of countries and businesses. It widens wealth gaps and punishes the poor. It costs countries many billions in lost revenue.

Read more...
How much protection does cyber insurance really give businesses?
Cyber Security Security Services & Risk Management
If organisations don’t meet even the minimum requirements of security and data protection, insurance will do them little good. Instead, it needs to be just one part of the digital resiliency toolbox.

Read more...
Introducing adaptive active adversary
Cyber Security Products
New adaptive active adversary protection; Linux malware protection enhancements; account health check capabilities; an integrated zero trust network access (ZTNA) agent for Windows and macOS devices; and improved frontline defences against advanced cyberthreats and streamline endpoint security management.

Read more...
Off-grid power solution for residential estate
Editor's Choice Security Services & Risk Management Residential Estate (Industry) Products
Coral Beach Estate, an upmarket residential estate based in East London, has been struggling with load shedding and power outages due to South Africa's energy crisis, as well as the vandalism of its power infrastructure.

Read more...
SafeCity Guarding rolls out across 14 suburbs in Johannesburg
News Security Services & Risk Management
In a major drive to provide communities across Johannesburg with additional safety, Vumacam, in partnership with Fidelity ADT and other security providers across the region, rolled out the innovative SafeCity Guarding initiative in 14 suburbs.

Read more...
FleetDomain underpins Afrirent’s value proposition
Logistics (Industry) Security Services & Risk Management
Afrirent, a 100% female black-owned fleet management company, has been relying on FleetDomain software for a number of years to help it deliver outstanding service to a growing number of clients.

Read more...
Eleven steps to an effective ransomware response checklist
Editor's Choice Cyber Security
Anyone is a viable target for ransomware attacks and should have a plan in place to deal with a worst-case scenario. Fortinet offers this ransomware attack response checklist to effectively deal with an active ransomware attack.

Read more...
Blurring the lines between data management and cybersecurity
Cyber Security IT infrastructure
In the past, data management and cybersecurity would fall under separate domains, but with more organisations making the shift to the cloud, data management and data protection have merged, essentially blurring the lines between the two.

Read more...