Deepfake in video calls It's a real threat. It uses artificial intelligence to create very accurate copies of faces and voices. This makes complicated scams possible, such as fraud through... voice cloningMany companies and individuals have already lost money because of this.
Well-known banks such as Bradesco, Itaú, and Nubank reported more cases of voice cloningEven the Civil Police are warning about the increase in these scams. When they tamper with the image and sound, the security of our video calls is at risk.
Advertisements
The goal of this alert is clear: we want more people in Brazil to know how to recognize deepfakes. We will show how to spot these scams. We will also teach you what to do to protect yourself quickly and how to reduce the risks.
Scam Alert: How to identify “Deepfakes” in video calls
Video calls have become essential in both work and personal life. They simplify how we communicate, but they have also opened up opportunities for fraud. Knowing how to recognize deepfakes is crucial to avoid losses.
What does deepfake mean in video calls?
Deepfake is a technology that combines image analysis and sound synthesis. It creates copies of someone's face and voice using data from short videos. This data can come from stories, YouTube videos, or TikTok videos.
Its goal is to mimic a person's voice, intonation, and movements. This technique relies on advanced algorithms. They produce very realistic results.
Why deepfakes pose a risk in video calls and phone calls.
Cloning voices and faces renders simple verifications ineffective. We cannot rely solely on what we see or hear to identify someone.
Easy access to these tools increases the number of scams. This puts individuals and businesses at greater risk.
Scammers take advantage of how quickly we react to emergencies. They use authority and emotion to deceive us.
The main objectives of the scammers: financial fraud, extortion, and data theft.
Financial fraud is the main target. Criminals request immediate transfers, ransoms, or authorization for transactions, deceiving their victims.
Extortion occurs when threats are made to harm the victim or their family members in exchange for money. Data theft is carried out by capturing private information such as passwords and bank details.
Companies have already suffered enormous losses due to transfers made to fake executives. Video call scams They are also used to spread misinformation or impersonate public figures in large-scale attacks.
How deepfake video call scams are carried out.
Scammers use advanced technology and deception techniques to create calls that appear genuine. Knowing how deepfakes work helps identify dangers, allowing you to act quickly if you receive a suspicious call.
The scams involve technical elements and methods of operation.
Technology behind deepfakes: AI, neural networks, and voice models.
To create a deepfake, neural networks are used that learn from many images and sounds. Companies like ElevenLabs and Descript create voices that sound almost like real ones.
Open-source projects allow for the creation of voice copies at low cost. With special tools, deepfakes can be produced that deceive both sight and hearing.
Phases of the attack: collection of material, voice/video generation, contact and pressure.
The scam follows very specific steps. Knowing them helps you avoid falling into the trap.
- When gathering material, videos and audio clips are collected from social media. Short audio clips may be sufficient for training.
- In the generation phase, the model is trained quickly, and a fake voice and face are created.
- Contact is made via phone call or video call, using fake material.
- Under duress, tactics are used to force the victim to pay money or give information.
Accessible tools and illicit markets that facilitate the practice.
There are services that do voice cloning Available at various prices and easy to use, these technologies, while useful for legitimate creators, can also be used in scams.
In the illegal market, packages and services are sold at varying prices. Online tutorials make it easy for even beginners to attempt scams.
Understanding how voice cloning works and where these services are sold helps us stay alert. This way, we can protect our communications in our personal and professional lives.
Visual and auditory signs that indicate a deepfake call.
Understanding counterfeits requires you to pay attention to visual and auditory details, as well as behavior. Knowing how to recognize them is essential. signs of deepfake Protect your money and personal information from surprise calls.
Image anomalies
Check if the lighting in the place seems off. Shadows and reflections that don't match are important clues.
Look at the edges of the face and hair. If they appear blurry or move in the wrong way, be careful.
Check if the voice matches the mouth movements. Discrepancies, even small ones, are warning signs of forgery.
Pay attention to abrupt pauses in the video. Sudden cuts can be excuses for non-existent technical glitches.
Signals in the audio
Strange sounds or excessive clarity may indicate editing. Machine-like noises in voices are clues.
Observe if there is a discrepancy between what is said and the expressions used. Abnormal ways of speaking suggest problems.
Be wary of responses that sound robotic or emotionless. If the voice sounds too similar, it could be a deepfake.
Interlocutor's behavior
Be wary if someone pressures you to act quickly without verifying information. Scammers try to prevent you from confirming your details.
Ask specific questions to test the answers. Changes in the story or vague explanations are warning signs.
Notice if they frequently interrupt the conversation or avoid other means of contact. Wanting to keep the call going goes against common practices, indicating possible fraud.
Immediate practical checks during a suspicious call.
If a video call seems suspicious, be cautious and follow simple steps. Use procedures familiar to family or colleagues to avoid hasty decisions. Performing these checks quickly reduces risk and helps confirm identities.
How to use a pre-arranged security word or code.
Choose a security word or code that you share with family and colleagues. During the call, ask for this word and only continue if the answer is correct. Employing a validation process similar to that used by companies like Itaú and Bradesco in family or work environments is effective.
Procedure to disconnect and contact via another verified channel.
If you are unsure who is on the other end, hang up and call back using a trusted contact. Check contact libraries, bank statements, or credit cards for secure numbers. Avoid making bank transfers based solely on incoming calls.
How to quickly check bank accounts, numbers, and identity correspondence.
- Verify ownership before making transfers: compare the name on file with the person requesting the transfer.
- Requesting real-time visual proof, such as a video of a gesture being made, can prevent deepfake fraud.
- Note down details of the call such as the time, the number that appears, and the requests made for future verification.
Establish a security policy that prevents the sharing of OTPs, CVVs, or passwords over the phone. Verify the authenticity of calls requesting money or account information. Being quick and methodical minimizes the risk of falling victim to scams.
Personal and corporate preventive measures to reduce risk.
To protect yourself, follow simple and useful rules. Having clear rules at home and at work helps prevent deepfake call attacks.
Family and personal rules
Create a secret password to use in emergencies. Teach your family how to use it. Decide how else to contact them before sending money.
Teach relatives not to trust urgent requests. Conduct training sessions so they know how to act and increase security at home.
Corporate controls
Use rules to separate tasks and require multiple permissions for large transfers. Verify through two different means, such as company email and phone.
Establish clear rules and utilize electronic signatures and approval processes. Prepare finance teams against deepfakes. Conduct audits and tests to prevent fraud.
Good digital practices
Don't share too much audio or video online. Always review your privacy settings on Instagram, TikTok, YouTube, and WhatsApp to keep your data safe.
Avoid posting videos or audio online that reveal how you speak. Keep your devices and apps updated. Use identity verification and watch out for unusual activity on your accounts.
- Use protection and backup tools to preserve evidence.
- Educate employees and family members about deepfake prevention e online privacy.
- Adopt corporate controls that make fraud economically unviable for attackers.
What to do if you are a victim or receive a suspicious request.
If you notice anything strange during a video call, stay calm. Do not transfer money or provide personal information. Ending the call immediately is a good decision.
Record details of the incident such as the time and the name or number that appeared. Also note the platform used and what was requested. If possible, save recordings and messages. They are important for future investigations.
To organize your actions, follow this simple guide:
- Keep copies of screenshots, recordings, and suspicious emails.
- Do not delete messages or call history; it is important for the investigation.
- Keep transfer receipts and bank statements in case of any suspicious activity.
Inform your bank and phone company immediately. Use official channels and request that suspicious transfers be blocked. Remember: reputable banks never ask for your password over the phone.
Inform your phone company about the suspicious number and ask them to investigate. Filing a police report greatly helps the investigation. If you lost money, also report it to the Federal Police.
If the fraud was significant, report it to the regulatory bodies. Inform the Central Bank and the Securities and Exchange Commission. If there was a breach of personal data, the consumer protection agency (Procon) can help.
In your investigation report, include as many details as possible. Record times, transactions, and evidence. This helps the bank and authorities to take action. Preserving evidence is crucial to solving the case.
Conclusion
Deepfakes in video and voice calls are a real and growing threat. It happens in Brazil and around the world. Technology makes it easy to create convincing images and voices. Illegal markets help scammers commit financial fraud and extortion.
To protect ourselves, we need to be practical. Using known security codes, verifying information through other means, and having good controls in place at companies helps a lot. It's also good to limit what we share in terms of audio and video online. This reduces what scammers can use against us.
If you suspect something, be skeptical. Keep proof of the call and notify banks and authorities immediately. Staying safe on video calls requires constant vigilance. This includes training people and improving rules. Thus, we understand that image and voice no longer prove someone's identity.
Content created with Artificial Intelligence Assistance
