“financial assistance. figure 1 : the creation process for a deepfake video using ai tools the scams above mostly use audio deepfakes, but there have been some incidents that have involved both audio and video deepfakes. these types of deepfakes allow threat actors to add some lev…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1598Phishing for Information
69%
“. in fact, the demo video below shows just how easy it was for us to create a deepfake involving huntress ’ own ceo. what ’ s truly concerning about deepfake scams? in our eyes, it ’ s the fact that these types of scams are turning existing verification processes upside down. thi…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1684.001Impersonation
65%
“recently been using. here, attackers use deepfakes to pretend to be legitimate it workers during job interviews. after securing a role, the workers infiltrate organizations in order to steal sensitive data. and in some cases, even extort the employers. many different companies, i…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1588.007Artificial Intelligence
58%
“truman kain, staff product researcher at huntress, talked about the good, the bad, and the ugly parts of ai. and how it ’ s helping ( and hurting ) both defenders and threat actors. how threat actors are using ai attackers are already using ai in various ways, including : - deepf…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1683.002Audio-Visual Content
46%
“truman kain, staff product researcher at huntress, talked about the good, the bad, and the ugly parts of ai. and how it ’ s helping ( and hurting ) both defenders and threat actors. how threat actors are using ai attackers are already using ai in various ways, including : - deepf…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1598.004Spearphishing Voice
41%
“recently been using. here, attackers use deepfakes to pretend to be legitimate it workers during job interviews. after securing a role, the workers infiltrate organizations in order to steal sensitive data. and in some cases, even extort the employers. many different companies, i…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1684.001Impersonation
33%
“. in fact, the demo video below shows just how easy it was for us to create a deepfake involving huntress ’ own ceo. what ’ s truly concerning about deepfake scams? in our eyes, it ’ s the fact that these types of scams are turning existing verification processes upside down. thi…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1566.004Spearphishing Voice
31%
“recently been using. here, attackers use deepfakes to pretend to be legitimate it workers during job interviews. after securing a role, the workers infiltrate organizations in order to steal sensitive data. and in some cases, even extort the employers. many different companies, i…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
Is AI in cybersecurity a tool for defenders or the attackers? Find out in our recap of Huntress’ June Tradecraft Tuesday, where we break it down.