The Rising Threat Of Deepfakes

AI is evolving rapidly, with ChatGPT highlighting yet another example of the technology's vast potential. 

Keeping a pulse on AI's advancement has never been more important for security professionals. In the words of the UK government, AI has the potential to "increase risks to safety and security by enhancing threat actor capabilities and increasing the effectiveness of attacks." 

We continue to see how financially motivated cyber-criminals and nation-state actors are working to exploit weaknesses in cybersecurity frameworks, refining their techniques to trick their targets into giving up sensitive information such as login credentials or financial details.

As AI advances, these efforts become increasingly sophisticated. Today, cyber attackers readily leverage novel tools to create highly realistic deepfake images, audio, and video, posing a growing threat.

During the UK general election campaign, we've seen high-profile politicians like Wes Streeting and Nigel Farage being targeted by deepfake attacks. However, these technologies aren't just being weaponised in a political context. Equally, they are also being used against businesses.

In 2020, one threat actor managed to steal $35 million by using AI to replicate a company director's voice and deceive a bank manager. Similarly, in January 2024, a finance employee at British engineering firm Arup fell victim to a $25 million scam after a video call with a 'deepfake chief financial officer'.

From the spread of misinformation to financially motivated attacks, deepfakes have become an increasingly prominent threat in bad actors' arsenals. In fact, one report indicates that there was a staggering 3000% increase in deepfake fraud attempts between 2022 and 2023. Prompted by this rising tide, ISMS.online conducted a survey to assess the current impact of deepfakes on UK organisations. 

Here, the 'State of Information Security' report reveals alarming trends. Critically, nearly a third (32%) of UK businesses reported experiencing a deepfake security incident in the past year, making it the country's second most common type of information security breach.

The statistics speak for themselves: deepfakes are no longer a theoretical threat but a present-day reality that enterprises must confront.

AI In Cyberattacks Must Be Met With AI In Cybersecurity

Currently, threat actors use deepfakes most commonly in business email compromise (BEC) style attacks, where AI-powered voice and video cloning technology deceives recipients into executing corporate fund transfers. Other potential uses include information or credential theft, causing reputational harm, or circumventing facial and voice recognition authentication.

Regardless of the specific technique or intended outcomes, the consequences for organisations can be severe, leading to substantial data loss, service disruptions, and significant financial and reputational harm.

Organisations must take proactive steps to mitigate the threat of deepfakes, strengthening their cybersecurity frameworks with cutting-edge technologies. 

It's essential to recognise that AI isn't exclusive to threat actors. Equally, organisations can and should leverage it to their own advantage, building more robust defences while unlocking efficiency gains, accuracy improvements, enhanced security insights, and several other benefits.

Encouragingly, companies clearly recognise the potential of advanced technologies in security applications. According to ISMS.online's State of Information Security report, 72% of UK respondents believe AI and machine learning are improving information security, with six in ten planning to increase investment in such applications in the next 12 months.

Of course, the challenge of turning intent into action remains a gap that must be bridged with thorough and effective guidance.

Typically, we advise that companies should seek to embrace critical standards. ISO 42001, for example, can be used as a central guiding principle given that it deals with AI and is specifically designed to help organisations leverage and use AI within their businesses safely and sustainably ensuring compliance with all necessary data security, information security and ethical requirements. 

Of course, this is easier said than done. For organisations struggling to know where to start, it may make sense to leverage software platforms that can provide essential guidance for implementing standards like ISO 42001, significantly accelerating secure adoption of AI, necessary information and data security improvements and transformations. 

Every organisation's unique skillset, context, and requirements will differ, yet the goal across all enterprises must be the same.

By proactively aligning with modern security guidance and embracing relevant technologies, firms can position themselves against evolving threats, providing assurances to partners, customers, and regulators whilst setting themselves up for future-proofed operations and financial success. 

Sam Peters Is Chief product officer at ISMS.online

Image: Zinkevych

You MIght Also Read: 

The Psychology Of GenAI Manipulation:

DIRECTORY OF SUPPLIERS - Deepfake & Disinformation Detection:

___________________________________________________________________________________________

If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« LockBit Claims It Hacked The US Federal Reserve
Cyber Aftermath From The Airstrike On Syria’s Iranian Consulate »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Redscan Cyber Security

Redscan Cyber Security

Redscan Cyber Security is a Managed Security Services Provider (MSSP) that enables businesses to effectively manage their information security risks.

Identity Automation

Identity Automation

Identity Automation is a leading provider of Identity and Access Management software.

Dubex

Dubex

Dubex is Denmark's leading business-oriented IT security specialist.

International Federation of Robotics (IFR)

International Federation of Robotics (IFR)

The International Federation of Robotics connects the world of robotics around the globe. Our members come from the robotics industry, industry associations and research & development institutes.

AppSec Labs

AppSec Labs

AppSec Labs specialise in application security. Our mission is to raise awareness in the software development world to the importance of integrating software security across the development lifecycle.

Rogue Wave Software

Rogue Wave Software

At Rogue Wave, our mission is to simplify your hardest problems, improve software quality and security, and shorten the time it takes to deliver value.

Austrian Institute of Technology (AIT)

Austrian Institute of Technology (AIT)

AIT is Austria's largest research and technology organisation and a specialist in the key infrastructure issues of the future including data science and cybersecurity.

Raqmiyat

Raqmiyat

Raqmiyat provides end-to-end IT Services and business solutions including consultancy, digital transformation, infrastructure and cybersecurity.

InfoLock

InfoLock

Infolock are experts in data governance, providing consulting and advisory services that help organizations effectively secure, manage, and optimize their data.

Red River

Red River

Red River is a technology transformation company, bringing 25 years of experience and mission-critical expertise in analytics, cloud, collaboration, mobility, networking and security solutions.

Vulcan Cyber

Vulcan Cyber

At Vulcan, we’re modernizing the way enterprises reduce their cyber risk. From detection to resolution, we automate and orchestrate the vulnerability remediation process dynamically and at scale.

Phakamo Tech

Phakamo Tech

Phakamo Tech offers a full set of governance, risk, compliance, cybersecurity and Microsoft Cloud services that include consulting, planning, implementation and cyber incident response.

ABCsolutions

ABCsolutions

ABCsolutions is dedicated to assisting businesses and professionals achieve compliance with federal anti-money laundering regulations in an intelligent and pragmatic way.

Cylab - Carnegie Mellon University

Cylab - Carnegie Mellon University

Carnegie Mellon University CyLab is the University's security and privacy research institute.

CommandK

CommandK

CommandK provides companies with infrastructure to protect their sensitive data. Built-in solutions to prevent data-leaks and simplify governance.

JustunSecure

JustunSecure

JustunSecure is dedicated to promoting information technology and cybersecurity in Africa.