View: 514|Reply: 2

How do attackers use deepfake?

[Copy link]

61

threads

174

posts

615

credits

Senior member

Rank: 4

credits
615
Published in 2025-3-30 20:01:25 | Show all floors |Read mode
What technologies, including deepfake, can attackers use for blackmail? We live in the digital age, and I believe the risks of cybercrime are only growing. I've read that fraudsters can use artificial intelligence, fake video and audio, fake correspondence, and account hacking and data leaks to manipulate. This is especially troubling because such technologies are becoming more and more accessible. What are the most common modern ways to get scammed now?

35

threads

179

posts

625

credits

Senior member

Rank: 4

credits
625
Published in 2025-3-30 21:04:08 | Show all floors
In addition to deepfake, criminals actively use fake voice recordings that mimic the speech of a real person. This is especially dangerous when fraudsters call the victim's relatives or company employees pretending to be their superiors. Another popular technique is phishing, when attackers masquerade as official services and trick out logins and passwords. In addition, blackmailers can use leaked data sold on the darknet to appear more convincing. If you want to understand this topic in more detail, I recommend reading the article https://www.myvipon.com/post/1490502/join-as-seller.php, which deals with online extortion mechanisms and ways to protect yourself.

61

threads

174

posts

615

credits

Senior member

Rank: 4

credits
615
 Author| Published in 2025-3-30 21:24:11 | Show all floors
It's really scary, because technology is developing faster than the laws governing its use. On the other hand, if you don't share unnecessary personal information online and keep your accounts secure, the risk of becoming a victim of blackmail is greatly reduced. It is important to be careful not to believe everything you see online!
You need to log in before you can reply login | Register

Points Rule

Quick reply Top Return list