AI and deepfakes fuel phishing scams, making detection harder

Share:

AI impersonation is now the hardest vector for cybersecurity professionals to protect companies against, according to Teleport.

The study, which surveyed 250 senior US and UK decision-makers, shows that social engineering remains one of the top tactics cybercriminals use to install malware and steal sensitive data, with the advancement of AI and deepfakes further fueling the effectiveness of phishing scams.

Advanced phishing tactics on the rise

When asked to rank the difficulty of each attack vector, AI impersonation was most commonly cited by 52% of respondents as a difficult vector. The findings indicate the changing landscape of social engineering, with threat actors employing more advanced phishing tactics that focus on credentials as a target. Criminals have recently created infamous tools like WormGPT – the hackabot-as-a-service – to design more convincing phishing campaigns or deepfake impersonations.

“The reason AI impersonation from cyber criminals is so difficult to defend against is that it is getting better and better at mimicking legitimate user behavior with high accuracy, making it challenging to distinguish between genuine and malicious access attempts,” says Ev Kontsevoy, CEO at Teleport.

“AI and deepfake tools aren’t just creating phishing campaigns, but significantly lowering the time and cost to launch the campaigns as well to near-zero. They’re so easy today that a kid in Nebraska could sit in his Mom’s basement and launch hundreds of these per day,” added Kontsevoy.

To fight this wave of AI impersonation and other security threats, 68% are already using AI-infused tools to make safeguards more accurate and effective. Industry debate continues to take place on the effectiveness of fighting AI with AI.

The findings here suggest a risk of overconfidence in AI’s ability to protect organizations against social engineering. Using AI to combat this threat is like suggesting that an adversary targets the missiles on a fighter jet, rather than the fighter jet itself,” says Kontsevoy. “The right conversation is, ‘how do we stop employees and enterprises from making their credentials a threat vector?’ As it stands, credentials are pretty much littered across the many disparate layers of the technology stack – Kubernetes, servers, cloud APIs, specialized dashboards and databases, and more.”

Identity-based attacks threaten infrastructure security

The rise in identity-based attacks was cited by 87% of respondents as an ‘important’ factor that is contributing to making infrastructure access security more challenging over time. Almost 40% of companies, however, still haven’t implemented the use of cryptographically authenticated identities for users.

These factors combined likely help explain why social engineering attacks like phishing and smishing still represent the second hardest attack vector to defend against (48%), with compromised privileged credentials and secrets (47%) in third place.

On the opposite end of the difficulty curve, ‘weak’ passwords’ are now the easiest attack vector to defend against according to respondents: only 36% struggle to protect against this vector, and 45% even say it’s ‘easy’ to do so.

“I think what this shows is that the cybersecurity industry is becoming better at plugging the most obvious gaps and weak points. There has certainly been some regulation, such as in the UK, to clamp down on weak passwords. But passwords are just one of many vectors, and credentials exist in many forms like API keys and browser cookies. There are also standing privileges to worry about, which can lead to breach-and-pivot attacks.”

“Regardless of whether social engineering attacks use AI or not, the solution is always going to be the same: eliminate human error. That means the modern-day security paradigm has to be first and foremost about eliminating secrets and enforcing cryptographic identity, least privileged access, and robust policy and identity governance. Human behaviour exposing infrastructure to data leaks is what we need to learn to defend against, and enforcing these steps are the key to preventing criminals from wreaking more havoc,” concluded Kontsevoy.

Help Net Security

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
3:41 pm, Apr 21, 2025
weather icon 15°C
L: 13° | H: 16°
moderate rain
Humidity: 70 %
Pressure: 1010 mb
Wind: 7 mph W
Wind Gust: 0 mph
UV Index: 0
Precipitation: 1.72 mm
Clouds: 40%
Rain Chance: 0%
Visibility: 10 km
Sunrise: 5:51 am
Sunset: 8:06 pm
DailyHourly
Daily ForecastHourly Forecast
Today 10:00 pm
weather icon
13° | 16°°C 1 mm 100% 8 mph 86 % 1012 mb 0 mm/h
Tomorrow 10:00 pm
weather icon
8° | 17°°C 0 mm 0% 11 mph 93 % 1017 mb 0 mm/h
Wed Apr 23 10:00 pm
weather icon
9° | 16°°C 1 mm 100% 15 mph 93 % 1016 mb 0 mm/h
Thu Apr 24 10:00 pm
weather icon
9° | 13°°C 0.2 mm 20% 4 mph 82 % 1022 mb 0 mm/h
Fri Apr 25 10:00 pm
weather icon
8° | 16°°C 0 mm 0% 8 mph 89 % 1022 mb 0 mm/h
Today 4:00 pm
weather icon
14° | 15°°C 1 mm 100% 8 mph 70 % 1010 mb 0 mm/h
Today 7:00 pm
weather icon
14° | 15°°C 1 mm 100% 4 mph 75 % 1010 mb 0 mm/h
Today 10:00 pm
weather icon
12° | 13°°C 0 mm 0% 6 mph 86 % 1012 mb 0 mm/h
Tomorrow 1:00 am
weather icon
10° | 10°°C 0 mm 0% 6 mph 92 % 1014 mb 0 mm/h
Tomorrow 4:00 am
weather icon
8° | 8°°C 0 mm 0% 5 mph 93 % 1015 mb 0 mm/h
Tomorrow 7:00 am
weather icon
9° | 9°°C 0 mm 0% 4 mph 89 % 1016 mb 0 mm/h
Tomorrow 10:00 am
weather icon
11° | 11°°C 0 mm 0% 7 mph 67 % 1017 mb 0 mm/h
Tomorrow 1:00 pm
weather icon
16° | 16°°C 0 mm 0% 8 mph 44 % 1017 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€76,532.21
4.28%
Ethereum(ETH)
€1,418.74
3.46%
Tether(USDT)
€0.87
0.02%
XRP(XRP)
€1.85
3.60%
Solana(SOL)
€120.95
1.40%
USDC(USDC)
€0.87
0.00%
Dogecoin(DOGE)
€0.140690
4.78%
Shiba Inu(SHIB)
€0.000011
2.56%
Pepe(PEPE)
€0.000007
7.97%
Scroll to Top