2 min read

Deepfakes Used to Apply for Remote Work Jobs

Filip TRUȚĂ

June 29, 2022

Ad One product to protect all your devices, without slowing them down.
Free 90-day trial
Deepfakes Used to Apply for Remote Work Jobs

Cybercrooks are using deepfake technology and stolen data to apply for remote work positions in a bid to compromise unsuspecting employers, the FBI has announced.

The FBI’s cyber division has issued a public service announcement warning that it has recorded an increase in complaints about deepfake job applicants using stolen data to apply for various positions.

“The FBI Internet Crime Complaint Center (IC3) warns of an increase in complaints reporting the use of deepfakes and stolen Personally Identifiable Information (PII) to apply for a variety of remote work and work-at-home positions,” reads the memo.

The visual content is said to be “convincingly altered and manipulated to misrepresent someone as doing or saying something that was not actually done or said.”

The crooks are said to be applying for positions in information technology and computer programming, database, and software.

Some positions include access to customer PII, financial data, corporate IT databases and/or proprietary information, meaning the attackers aim to exfiltrate data and likely hack the victim company and hold their data for ransom.

Reports received by the IC3 mention the use of voice spoofing, or potential voice deepfakes. The recordings are not all that convincing, though, according to the Bureau.

“In these interviews, the actions and lip movement of the person seen interviewed on-camera do not completely coordinate with the audio of the person speaking,” the FBI notes. “At times, actions such as coughing, sneezing, or other auditory actions are not aligned with what is presented visually.”

Complaints also depict the use of stolen PII. Victims have said their identities were used without their knowledge. Background checks found some applicants indeed used PII from other people to increase their chances of landing the job.

People who encounter this type of activity are instructed to report it to the IC3 at www.ic3.gov.

Deepfake technology has garnered widespread attention for its use in creating celebrity pornographic videos, revenge porn, fake news, hoaxes, bullying and financial fraud.

While some deepfake recordings are more convincing than others, the technology is still not advanced enough to pass for 100% legit.

A trained eye can spot telltale glitches and graphical artifacts that give away the nature of the recording. However, deepfakes can still dupe a trained eye at first glance, especially if there is no apparent reason or context to raise suspicion.

tags


Author



Right now

Top posts

What is medical identity theft and how to protect against it

What is medical identity theft and how to protect against it

July 27, 2022

2 min read
Curious about Omegle? Here’s how the roulette-style chat platform can threaten your online privacy and security

Curious about Omegle? Here’s how the roulette-style chat platform can threaten your online privacy and security

July 07, 2022

5 min read
Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

June 28, 2022

2 min read
Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

June 28, 2022

3 min read
Bitdefender Reveals the Top Cyber Threats Faced by Consumers in 2021

Bitdefender Reveals the Top Cyber Threats Faced by Consumers in 2021

June 22, 2022

1 min read
Scam alert: Cybercrooks use shady investment domain to scam keen investors out of money and data

Scam alert: Cybercrooks use shady investment domain to scam keen investors out of money and data

May 24, 2022

3 min read

FOLLOW US ON

SOCIAL MEDIA


You might also like

US State Department Offers $10 Million Bounty for Tips on Conti Ransomware Members US State Department Offers $10 Million Bounty for Tips on Conti Ransomware Members
Alina BÎZGĂ

August 12, 2022

2 min read
Years after claiming DogWalk wasn't a vulnerability, Microsoft confirms flaw is being exploited and issues patch Years after claiming DogWalk wasn't a vulnerability, Microsoft confirms flaw is being exploited and issues patch
Graham CLULEY

August 11, 2022

1 min read
Creative scammers send their senior victim an Uber to take her to the bank Creative scammers send their senior victim an Uber to take her to the bank
Alina BÎZGĂ

August 11, 2022

2 min read