banner



Get ready for Zoom-based deepfake phishing attacks, expert warns

Become ready for Zoom-based deepfake phishing attacks, expert warns

A video conference with nine participants on a laptop screen.
(Prototype credit: Andrey_Popov/Shutterstock)

Deepfake attacks volition become more sophisticated and harder to discover, Matthew Canham, a University of Central Florida inquiry professor and cybersecurity consultant, told the Blackness Hat security conference last calendar week.

Canham added that we may presently see phishing attacks using deepfakes on Zoom or other videoconferencing apps, which he dubbed "zishing," as well as deepfake attacks using biometric media similar fingerprints or facial recognition.

  • How to set up a Zoom meeting
  • The best identity theft protection services
  • Plus: Your Wi-Fi router might tell anybody where yous live — what you can exercise

"My friend Dolores got a series of text letters from her dominate to buy gift cards for 17 employees for the upcoming vacation political party — and not to tell anyone," Canham said, "Dolores bought the souvenir cards, the political party came, and the dominate didn't know anything about information technology."

Dolores, Canham explained, had been the target of a text-message-based deepfake attack, in which an automated script or "bot" initially contacted her and impersonated her boss by "spoofing" her boss's cell number.

The bot exchanged several messages with Dolores to establish trust, so a man took over on the other end and walked her through the rest of the scam.

Other deepfake scams

A well-publicized attack in the U.1000. a few years ago involved phone calls, Canham said. A computer-generated vox application — or maybe a skilled homo impersonator — that mimicked the dominate's voice called a visitor posing every bit the chief executive, and then ordered that wire transfers exist fabricated to a specific account.

This happened two or three times earlier the company got suspicious and asked the "boss" to verify his identity.

Canham calls these "synthetic media" attacks, in which the charade involved a combination of existent and false information. He's come up up with a classification framework that gauges five factors: medium (text, voice, video or a combination), control (run by a human, a bot or both), familiarity (how well does the target "know" the false person), interactivity (are communications slow, fast or instant?), target (a detail individual, or anyone?).

Canham cited a wave of virtual-kidnapping scams that took place in Indiana. People would receive calls from a family unit member, merely to speak to a scammer who said he had abducted their family unit member and demanded ransom. One man fifty-fifty got a such a call virtually his daughter, even as his own son got a bribe phone call from someone pretending to exist the begetter.

The only "proof" was that the calls seemed to be coming from a loved i. However, it's not difficult to "spoof" a phone number.

What the time to come holds for deepfake video scams

More video-based scams are coming, Canham said. We've already seen the deepfake video that comedian and manager Hashemite kingdom of jordan Peele did in which former President Barack Obama seems to comment on the movie Black Panther and insults then-President Donald Trump.

In that example, Peele impersonated Obama'south voice himself, then used a deepfake program to modify existing video of Obama then that the rima oris movements matched the words.

More than alarming, though it may non be obvious, Canham said, was the "I'chiliad not a cat" Zoom video from 2020 in which a Texas lawyer establish himself stuck with a kitten avatar during a courtroom hearing.

In this case, the kitten avatar perfectly matched the Texas lawyer's mouth and eye movements in real-time. It may not be long earlier similar overlays and avatars can brand videoconferencing participants convincingly wait similar completely dissimilar people.

"Requite it a few years, and I recollect we'll soon see Zoom-based phishing attacks," Canham said, "Take that lawyer kitten video — imagine it wasn't a true cat, simply the image of a different lawyer."

Later on that, he said, the side by side frontier is biometric-based phishing attacks, although that might involve "Mission Impossible"-way physical creations.

"You could argue that a 3D-printed fingerprint might authorize," Canham said.

However, there could be a digital component to that too. A few years ago, High german researchers showed that a high-resolution photograph of Chancellor Angela Merkel'south eyes might be good enough to fool an iris scanner, and that a similarly precise photograph of another German politician'due south raised paw could be used to create convincing false fingerprint.

To stop a deepfake set on before it goes too far, Canham said, some surprisingly low-tech solutions might be effective. He said he'd heard of one company boss who told his staffers he would never ask them to buy souvenir cards.

In other instances, pre-shared code words might exist required for an authorized person to transfer large amounts of money, or the approval of more than one person might exist necessary.

He likewise suggested fighting a bot with a bot, as it were. There'southward already the Jolly Roger Telephone project, Cahnam said, a calculator plan that'due south designed to draw telemarketers into pointless conversations and waste their time. Maybe the all-time defence against deepfakes is some other deepfake.

You tin can view Canham's Black Lid presentation slides here, as well every bit a related white newspaper.

Paul Wagenseil is a senior editor at Tom's Guide focused on security and privacy. He has also been a dishwasher, fry cook, long-haul commuter, lawmaking monkey and video editor. He'southward been rooting effectually in the information-security space for more than than 15 years at FoxNews.com, SecurityNewsDaily, TechNewsDaily and Tom's Guide, has presented talks at the ShmooCon, DerbyCon and BSides Las Vegas hacker conferences, shown upward in random TV news spots and even moderated a console discussion at the CEDIA home-technology conference. You can follow his rants on Twitter at @snd_wagenseil.

Source: https://www.tomsguide.com/news/deepfake-phishing-attacks

Posted by: smithhisom1989.blogspot.com

0 Response to "Get ready for Zoom-based deepfake phishing attacks, expert warns"

Post a Comment

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel