The FBI Said That Scammers Use Deepfakes to Get a Job

The Federal Bureau of Investigation (FBI) has warned that criminals are increasingly using stolen personal information and deepfakes to get remote job.

Attackers are especially interested in technical positions that involve access to confidential systems and information.

Let me remind you that we talked about that Mayors of Several European Cities Communicated with the Deepfake of Kyiv Mayor Vitali Klitschko, and also that Deepfakes with Elon Musk Are Used to Advertise the Fraudulent BitVex Platform.

Experts at the FBI’s Internet Fraud Complaint Center (IC3) say deepfake complaints are on the rise, and fakes used by hackers during online interviews include highly convincingly altered videos or images.

The telecommuting or work-from-home positions reported in the complaints were related to information technology and programming, databases and software. It is noteworthy that some of these positions implied access to personal data of clients, financial data, corporate IT databases and / or proprietary information.say IC3 experts.

While some deepfakes were quite convincing, others could be easily spotted due to various desynchronizations, most often related to the forgery of applicants’ votes.

Complaints talk about the use of voice fakes or perhaps voice deepfakes during online interviews. During such interviews, the actions and movements of the lips of the person in front of the camera are not completely consistent with the sound of his voice. Sometimes actions such as coughing, sneezing, and so on do not match what is presented visually.said clinic representatives

In addition, the FBI was reportedly contacted by several victims whose stolen identities were used to apply for remote work.

The FBI report and warning does not contain any information about who might be behind such attacks. However, the attackers’ motive is clear: if an attacker manages to get a job using someone else’s data and deepfakes, he will get a chance to steal data, penetrate the company’s network, deliver a ransomware or any other malware to the employer’s infrastructure.
User Review
0 (0 votes)
Comments Rating 0 (0 reviews)

Daniel Zimmermann

Daniel Zimmermann has been writing on security and malware subjects for many years and has been working in the security industry for over 10 years. Daniel was educated at the Saarland University in Saarbrücken, Germany and currently lives in New York.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *


This site uses Akismet to reduce spam. Learn how your comment data is processed.

Back to top button