Social engineering (SE) is a form of deception that aims to trick people into giving access to data, information, networks and even money. For decades SE has been a key method for attackers to gain access to an organization, virtually skipping all lines of defense. Attackers also regularly use SE to scam innocent people by making threatening phone calls which impersonate an authority or by sending infected emails which look like they have been sent from a loved one. SE attacks will likely remain a top attack vector for criminals because humans are the weakest link in cyber security. Unfortunately, the threat will only get worse now that a new technology called deepfakes as arrived. A deepfake is believable media (e.g., videos) created by an AI. Although the technology has mostly been used to swap the faces of celebrities, it can also be used to `puppet' different personas. Recently, researchers have shown how this technology can be deployed in real-time to clone someone's voice in a phone call or reenact a face in a video call. Given that any novice user can download this technology to use it, it is no surprise that criminals have already begun to monetize it to perpetrate their SE attacks. In this paper, we propose a lightweight application which can protect organizations and individuals from deepfake SE attacks. Through a challenge and response approach, we leverage the technical and theoretical limitations of deepfake technologies to expose the attacker. Existing defence solutions are too heavy as an end-point solution and can be evaded by a dynamic attacker. In contrast, our approach is lightweight and breaks the reactive arms race, putting the attacker at a disadvantage.
翻译:社会工程(SE)是一种欺骗形式,目的是欺骗人们获取数据、信息、网络甚至金钱。 几十年来SE一直是袭击者进入一个组织的关键方法,几乎跳过所有防御线。 攻击者还经常使用SE来欺骗无辜者, 使用威胁电话来代替一个权威, 或发送看上去像是被爱人发送的受感染的电子邮件。 SE攻击可能仍然是罪犯的顶级攻击矢量, 因为人类是网络安全中最薄弱的环节。 不幸的是, 威胁现在只会变得更加严重, 新的技术被称为“ 深假” 。 由AI 创建的深假媒体( 视频) 是令人难以置信的。 虽然这些技术大多用来交换名人的脸, 也可以用来“ 玩偶” 。 最近, 研究人员已经展示了这种技术如何在实时时间里将某人的声音复制到手机或网络上。 任何用户可以下载这种技术来达到的“ 深底部”, 激烈的相对性攻击可以让我们从“ 深度攻击 ” 开始一个“ ” 快速的“ ” 和“ 威胁 ” 。