Fraud And The Dark Side Of AI

Fake news is believed to have played an important role in such important electoral processes as the 2016 US presidential election and the 2016 Brexit referendum on the withdrawal of the United Kingdom from the European Union. Now there is another kind of fake that is causing concern when deep fake uses of artificial intelligence (AI) to create and edit seemingly real videos and audio recordings of people.

To do this, deepfakes use Generative Adversarial Networks (GAN), which are a kind of algorithm that can create new data from existing datasets. According to the experts at Panda Security, a GAN can analyse thousands of recordings of a person’s voice, and from this analysis, create a totally new audio file that sounds the same, and uses the same speech patterns.

The worries surrounding this technology lie in the possibility that it could be used to spread fake videos and recordings of politicians and other public figures. For example, a deepfake of a politician giving a racist speech could influence the outcome of an election, or even incite violence.

Deepfake Technology and Cybercrime
Although deepfakes are yet to cause any problems in the world of politics, we have now seen their first use in the world of cybercrime.In August this year, it was revealed that a cybercriminal had used deep fake to steal $220,000. The fraud began back in March 2019, when the scammer created a deepfake imitating the voice of the CEO of the victim’s parent company.

The victim, the CEO of an energy company, received a call that seemed to be from his boss. In the call, the chief executive asked for an ‘urgent’ transfer of £200,000 to a Hungarian provider, and told him he would be reimbursed. The victim was tricked into believing that the voice was his boss’s; it had a slight German accent, like his boss, which made the scam more believable.

Once the transaction had been confirmed, the scammers called back, asking for another transfer. By this time, the CEO had begun to grow suspicious, and refused to make the transfer.  The funds were reportedly sent from Hungary to Mexico, before being transferred to other locations.

Although so-called “voice fraud” is nothing new, this incident is the first of its kind using deepfake technology. In fact, between 2013 and 2017, vishing (voice phishing) incidents grew 350%. Cybersecurity experts fear that this incident could be the start of a new cybercriminal trend of using artificial intelligence in this way.

Cyber Scams: a growing threat
Cybercriminals’ efforts to scam companies have increased significantly. The amount of money lost in BEC scams doubled between 2017 and 2018, and we regularly see headlines related to this cybercriminal tactic. 
Artificial intelligence, for good and evil 

Although the example we have seen here demonstrates that artificial intelligence can be used to carry out cybercrimes, it can also be used to stop them. Deep learning and machine learning are important in detection of cyber threats that can endanger the IT systems of any organisation.

Cybercriminals will never stop innovating in their search for new techniques to get onto organisations’ networks, steal company data, and make money.

 Panda Security

You Might Also Read: 

Google Creates Video Tools To Fight Deepfakes

 


 

 

« Easy Cyber Knowledge Ch.5 : Robotics AI And BioTech
Reshaping The Future Of War With Malware »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

GuardKnox

GuardKnox

GuardKnox protects the users of connected vehicles against threats that can endanger their physical safety and the safety of their personal information.

ObjectSecurity

ObjectSecurity

ObjectSecurity is a leader in authorization policy automation. With OpenPMF, you can manage application security policies for access control and auditing.

Fyde

Fyde

Fyde helps companies with an increasingly distributed workforce mitigate breach risk by enabling secure access to critical enterprise resources.

KETS Quantum Security

KETS Quantum Security

KETS harnesses the properties of quantum mechanics to solve challenging problems in randomness generation and secure key distribution and enable ultra secure communications.

1Password

1Password

1Password combines industry-leading security with award-winning design to bring private, secure, and user-friendly password management to everyone.

GitProtect.io

GitProtect.io

​GitProtect is a fully manageable, professional GitHub and Bitbucket backup and recovery software that protects repositories and metadata from any event of failure.

TopSOC Information Security

TopSOC Information Security

TopSOC Information Security provide a wide range of security consultation, implementation and training services.

Terra Quantum

Terra Quantum

Terra Quantum is a deep tech pioneer, developing revolutionary quantum applications to shape the technology of the future.

Appurity

Appurity

Appurity specialises in mobile and application security, delivering comprehensive solutions across all verticals.

ExtraHop

ExtraHop

ExtraHop's dynamic cyber defense platform uses cloud-scale AI to help enterprises detect and respond to advanced threats - before they compromise your business.

Ermes

Ermes

Ermes – Intelligent Web Protection provides companies with a solution that effectively secures them against web threats.

Strata Information Group (SIG)

Strata Information Group (SIG)

Strata Information Group (SIG) is a trusted partner in IT solutions and consulting services.

TetherView

TetherView

TetherView provides leading virtual desktop and email security technology to help businesses stand up and manage digital workspaces.

vpnMentor

vpnMentor

We started vpnMentor to offer users a really honest, committed and helpful tool when navigating VPNs and web privacy.

CMIT Solutions

CMIT Solutions

CMIT Solutions is a recognized leader in Managed IT Services for businesses. We empower businesses like yours by providing innovative technology solutions, managed IT services and cybersecurity.

TrueBees

TrueBees

TrueBees is the first deepfakes detector able to detect AI-generated portraits shared on social media and to prevent their diffusion across the web.