Security through data

MAIN

  • Home
  • Alerts
  • Blog
  • Events
  • Incidents
  • Tutorials

FEATURED

  • AI
  • Privacy
  • Cryptocurrency
  • Blockchain
  • IoT
  • Deep Web
  • Threat Actors
  • Social Engineering
  • Phishing
  • Malware
  • E-Commerce
  • Deepfake
  • Quantum Computing

COMPANY

  • About us
  • Advertise
  • Legal & Policy
Cybermaterial
  • CATEGORIES
    • Cyber101
      • Definition
      • Quote
    • Document
      • Cheat Sheet
      • Paper
      • Report
    • Education
      • Certification
      • Course
    • Entertainment
      • Documentary
      • Game
      • Meme
      • Movie
      • TV Show
    • Learning
      • Book
      • Lexicon
      • Podcasts
      • Tutorials
    • Tool
      • Hardware
      • Software
No Result
View All Result
Contact Us
Cybermaterial
  • CATEGORIES
    • Cyber101
      • Definition
      • Quote
    • Document
      • Cheat Sheet
      • Paper
      • Report
    • Education
      • Certification
      • Course
    • Entertainment
      • Documentary
      • Game
      • Meme
      • Movie
      • TV Show
    • Learning
      • Book
      • Lexicon
      • Podcasts
      • Tutorials
    • Tool
      • Hardware
      • Software
No Result
View All Result
Contact Us
Cybermaterial
No Result
View All Result

CyberStory: Cyber criminals used AI to impersonate CEO’s voice

in CyberStory
1 min read

In 2019, cyber criminals used deepfake to impersonate the voice of the CEO of a German company. and demand a fraudulent transfer of €220,000 ($243,000).

They tricked the CEO of a U.K.-based energy firm, into urgently wiring said funds to a Hungarian supplier in an hour. Later that day, the criminals made another call, again impersonating the German CEO, and asked for a second payment. He became suspicious and immediately called the authorities.

Unfortunately, the money that was transferred to the Hungarian bank account was already moved to a bank account in Mexico and distributed to other locations.

Making it harder for the authorities to trace. Several officials said that this was the first cybercrime using a voice-spoofing attack in Europe. Authorities are yet to determine the culprits behind the cybercrime operation.

Luckily, the firm was insured by Euler Hermes Group, which covered the entire cost of the payment. AI-based impersonation attacks are just the beginning of what could be major headaches for businesses and organizations in the future.

Tags: AICybermaterialCyberstoryDeepfakedeepfake cyberstory
14
VIEWS

More CyberDecoded

CyberDecoded: AI vs Cybersecurity
CyberDecoded

CyberDecoded: AI vs Cybersecurity

March 29, 2021

Artificial intelligence is a constellation of many different technologies. It includes algorithms, data, hardware, software

CyberDecoded: Malware – Why you should care
CyberDecoded

CyberDecoded: Malware – Why you should care

January 29, 2021

Malware, why you should care? A malware is a malicious software designed to steal, damage or deny access to data...

CyberDecoded: Quantum Computing vs Cybersecurity
CyberDecoded

CyberDecoded: Quantum Computing vs Cybersecurity

January 4, 2021

Quantum computing is a new kind of computing. Unlike classical computers which use bits that can be either 1s or...

MORE

Entertainment

Watch_dogs

November 27, 2020
Book

BOOK: IoT and Edge Computing for Architects

February 15, 2021
Book

7 Books about Deepfake

April 12, 2021
Quote

“To advance ethical AI requires conversations not only between technologists, governments…”

January 8, 2021
ADVERTISEMENT

Tags

Books Cybersecurity Hackers Malware Memes Movies Quantum Computing Report Software Word of the day

© 2021 | CyberMaterial | All rights reserved.

SECURITY THROUGH DATA

No Result
View All Result
  • Home
  • Alerts
  • Cyber Incidents
  • Blog
  • Events
  • Tutorials
  • Featured
    • AI
    • Privacy
    • Cryptocurrency
    • Blockchain
    • IoT
    • Deep Web
    • Threat Actors
    • Social Engineering
    • Deepfake
    • E-Commerce
    • Malware
    • Phishing
    • Quantum Computing

© 2020 CyberMaterial - Cyber Decoded.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.