untitled design

FBI: resourceful scammers began to programmatically fake their faces at remote interviews

The Federal Bureau of Investigation has issued an official warning about a growing number of complaints about cybercriminals who are using stolen personal information from US residents and deepfake technology to successfully apply for and interview for remote IT jobs. It is worth noting that previously deepfakes (digital content created using artificial intelligence or machine learning to replace a person’s face with the identity of another) were used to spread fake news or create so-called “revenge porn”, but now the scope of the technology is completely different.

The Federal Bureau of Investigation officials said that at the moment, attackers use deepfakes to confirm the identity when passing online interviews using realistic videos or ordinary images. At the same time, in most cases, hackers target high-tech remote workplaces that would allow cybercriminals to gain access to confidential information of a company or its customers.

“The telecommuting positions targeted by the hackers involve access to information technology, software, databases and other company sensitive information,” the FBI said.

For example, some positions for which the attackers tried (or passed) an interview give the employee full access to the personal data of the company’s customers, their financial data, corporate databases, and so on. However, sometimes hiring managers still recognized the cunning of cybercriminals – some company employees noted that during an online interview, the movements of a person’s lips and some of his actions did not coincide with the sound. Sometimes, for example, coughing, sneezing or other similar sounds completely disagreed with the picture on the screen, which visually betrayed the attacker.

Now that the information has been made public, HR managers will be more attentive to see online interviews, but it is likely that the number of cases of fraud in this direction will only increase. Some companies, for example, issue a corporate laptop or other expensive equipment to employees who work remotely, which an attacker can easily get through video and personal data spoofing.

Source: Trash Box

You may also like

Get the latest

Stay Informed: Get the Latest Updates and Insights

 

Most popular