Source |
Cyble |
Identifiant |
8656222 |
Date de publication |
2025-03-17 12:18:28 (vue: 2025-03-17 13:08:31) |
Titre |
Faux PDG, vraie fraude: les autorités de Singapour mettent en garde contre les escroqueries en affaires Deepfake Fake CEOs, Real Fraud: Singapore Authorities Warn of Deepfake Business Scams |
Texte |
Overview
The Singapore Police Force (SPF), the Monetary Authority of Singapore (MAS), and the Cyber Security Agency of Singapore (CSA) have jointly issued a public advisory warning about a new series of scams involving digital manipulation. These scams leverage Artificial Intelligence (AI) to create synthetic media, commonly known as deepfakes. This allows scammers to impersonate high-ranking executives and deceive employees into transferring funds from corporate accounts.
The Evolution of Digital Manipulation Scams
In this emerging scam variant, fraudsters exploit AI-driven technology to manipulate video and audio, convincingly mimicking the facial features, voice, and gestures of senior executives. The technique involves scammers contacting victims via unwanted WhatsApp messages, claiming to be executives from the victims\' own companies.
Victims are then invited to a live Zoom video call, during which they encounter fake visuals of their high-ranking executives, sometimes accompanied by individuals impersonating MAS officials or potential investors.
Step-by-Step Breakdown of the Scam
Initial Contact: Victims receive WhatsApp messages from scammers impersonating company executives.
|
Notes |
★★★
|
Envoyé |
Oui |
Condensat |
005 1024x512 1799 2025 20advisory 20digital 20involving 20manipulation 20on 20scams 24/7 300x150 4650 815a7db37390/joint 81ce about access accompanied accordingly accounts accurately action actions activity additionally adopting advanced advances advisories/advisories/ad advisory agency agreement ahead aid alert alerts align allowing allows also always amongst analysis analyze anomalies another any anyone appear approached are areas: around artificial assets associated attempt audio authentic authenticate authentication authorities authorities: authority authorization aware awareness b434 bank: banking become been before between block blogs blurring board bolster breakdown business businesses call calls calls: can capabilities caption= cautious ceos certain challenging channels: claiming clearly collaborating collective com/wp commonly communication communications: community companies company comprehensive compromise conclusion conduct conferencing confirm contact contact: contacting content content/uploads/2025/03/cyble controlled convincingly corporate corrective counsel create credentials critical crucial: csa culture cyber cybercriminals cybersecurity cyble data data: deceive deception dedicated deepfake deepfakes delays detect detection determine digital disclosure discover discrepancies discussions distortions: documentation: documents does driven duped during dynamic earliest educate effects effort emergence emerging employed employees employees: encounter engage engaging enhancing ensure ensures especially establish established evolution executive executives experts: exploit expressions expressions: extent external eyes facial factor fake fallen falling features fighting file file= financial financing flag follow following force forensic foster fraud fraud: fraudster fraudsters fraudulent from fund funds further future generated gestures gov growing guise harden has have help helpline high hold how https://cyble https://isomer https://www identify image immediate impersonate impersonating implement implementing improved incident incidents inconsistencies: indicative indicators individuals information initial initiate instruct intelligence internal introduce investigations investments investors invited involves involving issued jointly jpg justifications: key known lack lag large legal legitimate letter leverage lighting like limit lip live low maintain making manipulate manipulation manipulation: manipulations mas matters may measures media medium messages method mfa micro mimicking mismatched mitigate monetary monitoring mouth movements multi must natural never new non not notify number officials often ongoing opportunity organization organizations originating overly overview own part participants particularly pdf personal pixelation platforms police posed potential powered precautionary prevent prioritize processing project prompt protect protocols provide provided provides public purportedly quality ranking real realism realization receive records recovery recurrence references: regulatory reinforcement remain remaining replicate report represent reputation request requests requires responding responsibility restrict risks safeguard scam scam: scammers scams scamshield scanning scrutinize secondary secure security seemingly senior sensitive series setup: sg/36/248c2c73 sg/alerts shadows: shared should significantly signs singapore social solutions sometimes spf spoken stakeholders stakes stated stay step stiff strategies: streamed stresses stringent struggle subject substantial such suspected suspects suspicious swift sync synthetic tactics take teams technique technology technology: them then these those threats through time title= tool tools tools: trained training: transactions transfer transferring transfers uncontactable under unexpected unnatural unusual unwanted user using usually variant verification verify victim victims video videos vigilance: vigilant visuals voice warn warning well whatsapp when which who words workforce zoom |
Tags |
Tool
Threat
Legislation
|
Stories |
|
Move |
|