How deepfakes attack business and how to combat them

Issue 4 2022 News & Events

Recently, the FBI announced that more companies have been reporting people applying for jobs using deepfakes. Imposters use video, images, recordings, and stolen identities pretending to be someone else to get a remote IT position. This may sound like a joke, but hiring a deepfake can lead to serious problems when a fake employee gets access to sensitive corporate information and customer data.

This may pose a threat to a company’s data security, and in the event of a breach, the company likely won’t have a chance to bring the fraudster to justice.

The case mentioned above is not the only way scammers use deepfakes to take advantage of a business. As technology evolves, adversaries can use this new method to cheat biometric tests used by banks and cryptocurrency exchanges to verify users’ identities for money laundering. According to the Sensity report, 9 of the top 10 Know Your Customer (KYC) vendors were highly vulnerable to deepfake attacks.

Deepfakes are also used for spear, or targeted, phishing. Adversaries can mimic a company’s executives to gain a person’s trust and trick them into turning over sensitive data, money or access to the organisation’s infrastructure. In one case, criminals managed to get $35 million by forging the voice of a company’s director.

“Understanding the danger is half the battle. Educate your employees and let them know about the new fraudulent methods. A high-quality deepfake requires a lot of expertise and effort, while fakes used for scams or synchronous interaction during an interview would probably be low-quality,” says Vladislav Tushkanov, lead data scientist at Kaspersky.

“Among signs of a deepfake, there are unnatural lip movements, poorly rendered hair, mismatched face shapes, little to no blinking, skin colour mismatches, and errors in the rendering of clothes, or a hand passing over the face. However, an adversary may intentionally lower the video quality to hide these artefacts. To minimise the chance of hiring a fake employee, break job interviews into several stages involving not only HR managers, but also people who will be working with a new employee. This will increase the chances of spotting anything unusual.”

Technologies are also good helpers in combating deepfakes. A reliable cybersecurity solution will ensure support if a high-quality deepfake convinces an employee to download malicious files or programs, or to visit any suspicious links or phishing websites. An anti-fraud solution that provides user behavioural analysis and financial transaction monitoring may be a good option for companies using KYC, providing an additional layer of protection.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Pentagon appointed as Milestone distributor
Elvey Security Technologies News & Events Surveillance
Milestone Systems appointed Pentagon Distribution (an Elvey Group company within the Hudaco Group of Companies) as a distributor. XProtect’s open architecture means no lock-in and the ability to customise the connected video solution that will accomplish the job.

Read more...
Gallagher Security’s Integrate Roadshow
Gallagher News & Events
Gallagher Security recently teamed up with nine technology partners to showcase the latest integrated security capabilities at the Integrate Roadshow in Durban, bringing together about 60 attendees, including end users, channel partners, consultants, and other industry professionals.

Read more...
Ransomware impersonates employees and self-spreads
News & Events
Following a recent incident, the Kaspersky Global Emergency Response team is shedding light on an attack where adversaries crafted their own variant of encryption malware equipped with self-propagation capabilities.

Read more...
Level of RDP abuse unprecedented
Sophos News & Events
Cybercriminals abused Remote Desktop Protocol (RDP) in 90% of attacks handled by Sophos Incident Response in 2023, Sophos’ newest Active Adversary Report finds. External remote services were the number-one way attackers’ initially breached networks.

Read more...
Hexagon rebrands Qognify
News & Events
Hexagon’s Safety, Infrastructure & Geospatial division announced that Qognify has officially adopted the Hexagon corporate identity and fully integrated into the division as the physical security business unit.

Read more...
Five efficiency strategies for your security installation business
Securex South Africa News & Events
A recent conversation with one Securex South Africa 2024 exhibitor, led to the event organisers being able to share some advice on helping security installers make their businesses more efficient.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
Sales basics for security installers
News & Events
Being the best security business in South Africa means little if no one uses your services. Your business success is only partly linked to how good you are at security installations.

Read more...
From security technician to salesperson
News & Events
Being great at security sales starts with having the right mindset. How you think informs what you say and how you act; and how you act informs the results you will achieve in your business.

Read more...
From the Editor's Desk: Something old and something new
Technews Publishing News & Events
      Welcome to the 2024 edition of SMART Security Solutions’ Mining Handbook. Mining is a challenging industry for security professionals, although security is a challenge on this continent, no matter your ...

Read more...