Fraud And The Dark Side Of AI

Fake news is believed to have played an important role in such important electoral processes as the 2016 US presidential election and the 2016 Brexit referendum on the withdrawal of the United Kingdom from the European Union. Now there is another kind of fake that is causing concern when deep fake uses of artificial intelligence (AI) to create and edit seemingly real videos and audio recordings of people.

To do this, deepfakes use Generative Adversarial Networks (GAN), which are a kind of algorithm that can create new data from existing datasets. According to the experts at Panda Security, a GAN can analyse thousands of recordings of a person’s voice, and from this analysis, create a totally new audio file that sounds the same, and uses the same speech patterns.

The worries surrounding this technology lie in the possibility that it could be used to spread fake videos and recordings of politicians and other public figures. For example, a deepfake of a politician giving a racist speech could influence the outcome of an election, or even incite violence.

Deepfake Technology and Cybercrime
Although deepfakes are yet to cause any problems in the world of politics, we have now seen their first use in the world of cybercrime.In August this year, it was revealed that a cybercriminal had used deep fake to steal $220,000. The fraud began back in March 2019, when the scammer created a deepfake imitating the voice of the CEO of the victim’s parent company.

The victim, the CEO of an energy company, received a call that seemed to be from his boss. In the call, the chief executive asked for an ‘urgent’ transfer of £200,000 to a Hungarian provider, and told him he would be reimbursed. The victim was tricked into believing that the voice was his boss’s; it had a slight German accent, like his boss, which made the scam more believable.

Once the transaction had been confirmed, the scammers called back, asking for another transfer. By this time, the CEO had begun to grow suspicious, and refused to make the transfer.  The funds were reportedly sent from Hungary to Mexico, before being transferred to other locations.

Although so-called “voice fraud” is nothing new, this incident is the first of its kind using deepfake technology. In fact, between 2013 and 2017, vishing (voice phishing) incidents grew 350%. Cybersecurity experts fear that this incident could be the start of a new cybercriminal trend of using artificial intelligence in this way.

Cyber Scams: a growing threat
Cybercriminals’ efforts to scam companies have increased significantly. The amount of money lost in BEC scams doubled between 2017 and 2018, and we regularly see headlines related to this cybercriminal tactic. 
Artificial intelligence, for good and evil 

Although the example we have seen here demonstrates that artificial intelligence can be used to carry out cybercrimes, it can also be used to stop them. Deep learning and machine learning are important in detection of cyber threats that can endanger the IT systems of any organisation.

Cybercriminals will never stop innovating in their search for new techniques to get onto organisations’ networks, steal company data, and make money.

 Panda Security

You Might Also Read: 

Google Creates Video Tools To Fight Deepfakes

 


 

 

« Easy Cyber Knowledge Ch.5 : Robotics AI And BioTech
Reshaping The Future Of War With Malware »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Akin Gump Strauss Hauer & Feld

Akin Gump Strauss Hauer & Feld

Akin is a leading global law firm providing innovative legal services and business solutions to individuals and institutions. Practice areas include Cybersecurity, Privacy and Data Protection.

National Cyber Security Centre (NCSC) - United Kingdom

National Cyber Security Centre (NCSC) - United Kingdom

The NCSC acts as a bridge between industry and government, providing a unified source of advice, guidance and support on cyber security, including the management of cyber security incidents.

softScheck

softScheck

softScheck is an IT security consultancy. Services range from pentesting and compliance testing to security auditing of software and IT infrastructure.

National Information Security & Safety Authority (NISSA) - Libya

National Information Security & Safety Authority (NISSA) - Libya

NISSA is responsible for safeguarding the integrity, availability and resilienceof ICT infrastructure, resources, services and data in Libya.

National Cybersecurity and Communications Integration Center (NCCIC) - USA

National Cybersecurity and Communications Integration Center (NCCIC) - USA

NCCIC is a cyber situational awareness, incident response, and management center for the US Government, intelligence community, and law enforcement.

Entreda

Entreda

Entreda offers a unified platform to automate cybersecurity and compliance policy enforcement for your devices, users, networks, applications.

Inky Technology Corp

Inky Technology Corp

Inky® Phish Fence is an email protection gateway that uses sophisticated AI, machine learning and computer vision algorithms to block deep sea phishing attacks that get through every other system.

Egyptian Supreme Cybersecurity Council (ESCC)

Egyptian Supreme Cybersecurity Council (ESCC)

ESCC is responsible for developing a national strategy to face and respond to the cyber threats and attacks and to oversee its implementation and update.

Clym

Clym

Clym is the data privacy platform that helps organisations meet their data protection obligations. Cookies, Consent, Requests, Policies and more are all managed in a secure and adaptive application.

Collins Aerospace

Collins Aerospace

Collins Aerospace provides cybersecurity services and systems to protect critical infrastructure facilities and railroad operations.

Macquarie Telecom Group

Macquarie Telecom Group

Macquarie Telecom is Australia's datacentre, cloud, cyber security and telecom company for mid-large business and government customers.

Data Storage Corp (DSC)

Data Storage Corp (DSC)

Data Storage Corporation is a provider of data recovery and business continuity services that help organizations protect their data, minimize downtime and recover and restore data.

Mindmajix Technologies

Mindmajix Technologies

Mindmajix is a live and interactive e-learning platform that offers professional online IT training in areas including cyber security.

Guidepost Solutions

Guidepost Solutions

Guidepost Solutions are a diverse, global team of investigators, experienced security and technology consultants, and compliance and monitoring experts.

NetAlly

NetAlly

NetAlly network test solutions help engineers and technicians better deploy, manage, maintain, and secure today’s complex wired and wireless networks.

Mesh Security

Mesh Security

Mesh Security transforms security data, tools, and infra for enterprise-wide visibility and control.