One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Blog
Identifiant 2460962
Date de publication 2021-03-10 11:00:00 (vue: 2021-03-10 11:05:30)
Titre Deepfake cyberthreats – The next evolution
Texte This blog was written by an independent guest blogger. In 2019, we published an article about deepfakes and the technology behind them. At the time, the potential criminal applications of this technology were limited. Since then, research published in Crime Science has delved into the topic in-depth. The study identified several potential criminal applications for deepfakes. Among these categories, the following were deemed the highest risk: Audio/video impersonation Tailored phishing Blackmail Driverless vehicles being used as weapons Disrupting AI-based systems Fake news created by AI This list sparked the idea for this article. Considering that ransomware claims a new victim every 14 seconds, we decided to explore the topic of deepfake ransomware. Is that a real thing? You may never have heard the terms together before, but they’ll certainly play a large role in cybercrimes of the future. How are criminals leveraging this technology? Technically, they aren’t, but criminals are an innovative bunch. We had a taste of what they can do with deepfakes in 2019. A British CEO received a call from the company head, asking him to transfer $243,000. He did so but later became suspicious when he received a second call for another transfer. This is a modern take on email whaling attacks. In this case, however, the victim verified the caller’s identity because he knew the voice. Experts believe that AI made it possible to spoof the company head’s voice and intonations. While we may never know if the CEO was speaking to a bot or not, it shows that criminals can leverage AI-based technology.   How does ransomware come into the equation? Ransomware essentially holds your computer hostage. But how can the two seemingly deeply divergent technologies work together? To understand that, we might have to broaden our definition of ransomware. To do so effectively, we should consider some real-world examples. Imagine you received a video message from your CEO asking you to complete an online form. You know the CEO’s face and voice and can see it on the screen. The idea that the video is fake doesn’t enter your mind, so you click through to the link. Bam!, your computer is infected with ransomware. It might be a traditional form of this malicious threat or a more modern version. Say, for example, you’ve used your work computer to check your Facebook page or store photos. The malware is now able to sniff out pictures and videos of you. Thanks to facial recognition software, this process is automated and simple to complete. This isn’t just run-of-the-mill software, though. It’s a highly sophisticated program with AI built into it. It can not only detect images but use them to create content. It can also sniff out other personal details online and on your computer. It puts all of these together to create a video of you. The footage makes it look like you did something that would damage your reputation. You’re innocent, but the video seems convincing. If you don’t pay the ransom, it’ll be released. The ransom might be in the form of cash or information about your company or clients. Perhaps you don’t care about your reputation. What about that of your family? The idea of ransomware put to this use is a scary one but plausible. Automation makes these attacks more frightening Spearphishing, also known as whaling attacks, requires an intense amount of research. They&rs
Envoyé Oui
Condensat $243 “is 000 2019 able about accepting access accessible account accounts against all allowing almost along also among amount another any applications are aren’t article ask asking attackers attacks audio/video automated automation back bam based became because been before behind being believe best better big blackmail blog blogger bot british broaden built bunch but call caller’s can care careful case cash categories ceo ceo’s certainly changing check claims click clicking clients coding come common company complete complex computer concern consider considering contacts content control controlling convincing create created creation crime criminal criminals curious cyber cybercrimes cyberthreats damage decided deemed deepfake deepfakes deeply defense definition delved depth details detect did disrupting divergent does doesn’t don’t down driverless easy effectively else email encrypted enter equation essentially even every everything evolution example examples exercise experts explore extremely face facebook facial fake family files final finally following footage form found friend’s friends frightening from future goes google great group guest hack had has have havoc head head’s heard high highest highly him holds honing hostage how however idea identified identity images imagine immediately impersonation income incorporating independent infected information innocent innovative intelligent intense intonations investment isn’t it’ll it’s just knew know known large later learns leverage leveraging like limited limits link linked links list look looking loose lucrative made maintaining make makes malicious malware may media members message might mill mind minute modern more naturally never new news next not notes now okay one online only other out page passive pay perhaps person personal phishing photos pictures platforms plausible play players poses possible posting posts potential powerful primed privacy problematic process program programing programs protect protected publicly published put puts ransom ransomware real really received recognition released remove reputation require requires research resources risk: role run say scary science screen second seconds see seemingly seems select selfies send sends set sets several share shots should shows simple since site skill skills slightly sniff social software some someone something sophisticated sparked speak speaking spearphishing special spoof stage step stop store storing study sure suspicious systems tactic tailored take takes targets taste technically technologies technology terms thanks that’s them themselves then these they’ll they’re thing think though threat threats through time together topic traditional transfer two typically under understand untag use used value vehicles verified version victim video videos vigilance voice wary watch wave weapons well whaling what when which who work world worth would wreak written you’ll you’re you’ve your yourself
Tags Ransomware Malware Hack Threat
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: