{"id":55271,"date":"2024-02-07T00:00:00","date_gmt":"2024-02-07T00:00:00","guid":{"rendered":"urn:uuid:a01da4ac-984e-760e-4e30-459d24ce6f02"},"modified":"2024-02-07T00:00:00","modified_gmt":"2024-02-07T00:00:00","slug":"a-deepfake-scammed-a-bank-out-of-25m-now-what","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/a-deepfake-scammed-a-bank-out-of-25m-now-what\/","title":{"rendered":"A Deepfake Scammed a Bank out of $25M \u2014 Now What?"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/deepfake-video-calls-tn:Large?qlt=80\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/thumbnails\/24\/deepfake-video-calls-tn.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p><span class=\"body-subhead-title\"><span>What happened?<\/span><\/span><\/p>\n<p><a href=\"https:\/\/www.cnn.com\/2024\/02\/04\/asia\/deepfake-cfo-scam-hong-kong-intl-hnk\/index.html\" target=\"_blank\" rel=\"noopener\">Over the weekend<\/a>&nbsp;a Hong Kong firm claimed a $25 million loss to fraudsters using deepfake technology to allegedly impersonate the company&#8217;s chief financial officer via video conferencing.<\/p>\n<p>This AI-driven incident reads more like the plot from a science fiction movie than a real-world event \u2014 but it\u2019s not just theory. If true, it\u2019s a watershed moment testing our collective ability to respond to the next evolution of social engineering and deception attacks.<\/p>\n<p>The potential for this novel attack was not entirely unforseen. At <a href=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/24\/b\/what-generative-ai-means-for-cybersecurity-in-2024\/aws-reinvent-2023-generative-ai-cyber-resiliency-risk.mp4\" target=\"_self\" title=\"AWS re:Invent 2023 - Generative AI: Cyber resiliency and risk (AIM202)\" rel=\"noopener\">AWS re:Invent in No<span class=\"bs-modal\"><\/span>vember<\/a>, Trend Micro detailed a similar business impact scenario, advising global business leaders on how to prepare and adjust internal processes and policy against the backdrop of rapidly advancing deepfake technology.<\/p>\n<p><span class=\"body-subhead-title\"><span>Why are deepfake scams on the rise?<\/span><\/span><\/p>\n<p>AI-powered fraud uplevels existing attacker tactics and techniques to be more effective. This style of attack became inevitable with high accessibility to deepfake technology and tools as open-source software (generative adversarial networks or GANs), and as avatar-builder SaaS applications.<b><\/b><\/p>\n<p>AI tools like HeyGen make it easy for anyone to create a deepfake where an AI model is trained from a real video of the speaker, then generate scripted deepfake videos with turnaround time measured in minutes. The results are impressive and have long-range implications outside of this scenario for mass misinformation spread via social networking sites.<\/p>\n<p>In the context of the Hong Kong incident, attackers wouldn&#8217;t likely be able to power a real-time video call with ad-hoc conversation given that today\u2019s typical tools require 30 minutes of processing to generate a few sentences of video. We predict the technology will reach real-time ability soon, with recent reports suggesting text-to-video advancements are an evolution we could see sooner than later. While investigation is ongoing to fully understand the development and execution of the deepfake videos used in this scenario, it\u2019s likely the adversary pre-generated a set of content clips to play in real-time during the call.<\/p>\n<p><span class=\"body-subhead-title\"><span>The evolution of AI-driven attacks<\/span><\/span><\/p>\n<p>AI is influencing three main categories of cybercrime: social engineering and fraud, jailbroken GPT services, and hijacking and model poisoning. Between these three categories, fraud is leading the way.<\/p>\n<p>This scenario marks a sharp escalation in the effectiveness of business email compromise (BEC) techniques \u2014 AI is steadily making BEC and phishing more compelling and effective \u2014 and makes it urgent for organizations to ensure their funds transfer processes are fraud-resistant. In this news story, an employee claims they received authorization on a live video call, which gave them confidence to proceed without additional process.<\/p>\n<p><span class=\"body-subhead-title\"><span>How organizations can improve preparedness<\/span><\/span><\/p>\n<p>Defending against deception attacks is not solely a technological battle; it is equally a human challenge, necessitating a combination of adjustments across people, process, and technology to secure financial transactions, data transfers, and contracts against emerging threats.<\/p>\n<p><span class=\"body-subhead-title\"><span>Strengthening process, collaboration, and awareness<\/span><\/span><\/p>\n<p>Despite the ongoing investigation surrounding this case, it&#8217;s a wake-up call for organizations to scrutinize and enhance their verification processes for funds transfers. Process questions for cybersecurity and risk leaders to consider:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">Is there a clearly defined verification process, no matter who is requesting the transfer?<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Do the verification steps include strong authentication processes that are out-of-band from the current interaction with a potential attacker? (i.e.\/ Don&#8217;t trust a phone number provided in the email instructions, don&#8217;t trust a video call invite provided by the requestor)<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Is there a predetermined safe list of contacts and contact information?<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Is there a predetermined and understood language (i.e. verification word or statement) and process to verify transactions?<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Are staff empowered to raise concern about a request that appears to come from the CEO? Is there a defined process for verifying voice or video instructions?<\/span><\/li>\n<\/ul>\n<p>According to cyber-insurer <a href=\"https:\/\/info.coalitioninc.com\/download-2023-cyber-claims-report-mid-year-update.html\" target=\"_blank\" rel=\"noopener\">Coalition&#8217;s 2023 mid-year Cyber Claims Report<\/a>, there were 63% more funds transfer fraud claim incidents than ransomware incidents. Security teams need to work with their colleagues in finance to ensure current and future fraud techniques won&#8217;t be successful.<\/p>\n<p><span class=\"body-subhead-title\"><span>Defense technology best practices and the role of AI-driven protection<\/span><\/span><\/p>\n<p>From a defense perspective, security teams have a renewed opportunity to align with Zero Trust frameworks, rethink approaches to social engineering and identity-based attacks and take advantage of AI driven detection. &nbsp;<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\"><b>Zero Trust Alignment<\/b>: Limiting access and adopting a \u2018never trust, always verify\u2019 approach ensures only necessary individuals have access to sensitive information or processes using conditional and dynamic risk-based rules.<br \/><\/span><\/li>\n<li><span class=\"rte-red-bullet\"><b>AI-Driven Security:<\/b> Monitoring internal traffic, investing in identity threat detection, and modernizing email defense tooling (i.e. integration into email systems using APIs, leveraging AI\/ML and computer vision to assess writing style, intent, and fake log-in pages) are all necessary advancements to combat growing BEC and phishing effectiveness \u2014 which are frequently the first step adversaries will take to launch the full scale of a sophisticated attack.<\/span><\/li>\n<\/ul>\n<p> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/24\/b\/deepfake-video-calls.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A finance worker in Hong Kong was tricked by a deepfake video conference. The future of defending against deepfakes is as much as human challenge as a technological one. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":55272,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9510,9534,9531,9535],"class_list":["post-55271","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-research-articles-news-reports","tag-trend-micro-research-latest-news","tag-trend-micro-research-social-media","tag-trend-micro-research-web"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>A Deepfake Scammed a Bank out of $25M \u2014 Now What? 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/a-deepfake-scammed-a-bank-out-of-25m-now-what\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Deepfake Scammed a Bank out of $25M \u2014 Now What? 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/a-deepfake-scammed-a-bank-out-of-25m-now-what\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-07T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/deepfake-video-calls-tn:Large?qlt=80\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-deepfake-scammed-a-bank-out-of-25m-now-what\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-deepfake-scammed-a-bank-out-of-25m-now-what\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"A Deepfake Scammed a Bank out of $25M \u2014 Now What?\",\"datePublished\":\"2024-02-07T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-deepfake-scammed-a-bank-out-of-25m-now-what\\\/\"},\"wordCount\":812,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-deepfake-scammed-a-bank-out-of-25m-now-what\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/a-deepfake-scammed-a-bank-out-of-25m-now-what.jpg\",\"keywords\":[\"Trend Micro Research : Articles, News, Reports\",\"Trend Micro Research : Latest News\",\"Trend Micro Research : Social Media\",\"Trend Micro Research : Web\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-deepfake-scammed-a-bank-out-of-25m-now-what\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-deepfake-scammed-a-bank-out-of-25m-now-what\\\/\",\"name\":\"A Deepfake Scammed a Bank out of $25M \u2014 Now What? 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-deepfake-scammed-a-bank-out-of-25m-now-what\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-deepfake-scammed-a-bank-out-of-25m-now-what\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/a-deepfake-scammed-a-bank-out-of-25m-now-what.jpg\",\"datePublished\":\"2024-02-07T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-deepfake-scammed-a-bank-out-of-25m-now-what\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-deepfake-scammed-a-bank-out-of-25m-now-what\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-deepfake-scammed-a-bank-out-of-25m-now-what\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/a-deepfake-scammed-a-bank-out-of-25m-now-what.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/a-deepfake-scammed-a-bank-out-of-25m-now-what.jpg\",\"width\":976,\"height\":533},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-deepfake-scammed-a-bank-out-of-25m-now-what\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro Research : Articles, News, Reports\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/trend-micro-research-articles-news-reports\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"A Deepfake Scammed a Bank out of $25M \u2014 Now What?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A Deepfake Scammed a Bank out of $25M \u2014 Now What? 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/a-deepfake-scammed-a-bank-out-of-25m-now-what\/","og_locale":"en_US","og_type":"article","og_title":"A Deepfake Scammed a Bank out of $25M \u2014 Now What? 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/a-deepfake-scammed-a-bank-out-of-25m-now-what\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-02-07T00:00:00+00:00","og_image":[{"url":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/deepfake-video-calls-tn:Large?qlt=80","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/a-deepfake-scammed-a-bank-out-of-25m-now-what\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/a-deepfake-scammed-a-bank-out-of-25m-now-what\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"A Deepfake Scammed a Bank out of $25M \u2014 Now What?","datePublished":"2024-02-07T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/a-deepfake-scammed-a-bank-out-of-25m-now-what\/"},"wordCount":812,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/a-deepfake-scammed-a-bank-out-of-25m-now-what\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/02\/a-deepfake-scammed-a-bank-out-of-25m-now-what.jpg","keywords":["Trend Micro Research : Articles, News, Reports","Trend Micro Research : Latest News","Trend Micro Research : Social Media","Trend Micro Research : Web"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/a-deepfake-scammed-a-bank-out-of-25m-now-what\/","url":"https:\/\/www.threatshub.org\/blog\/a-deepfake-scammed-a-bank-out-of-25m-now-what\/","name":"A Deepfake Scammed a Bank out of $25M \u2014 Now What? 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/a-deepfake-scammed-a-bank-out-of-25m-now-what\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/a-deepfake-scammed-a-bank-out-of-25m-now-what\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/02\/a-deepfake-scammed-a-bank-out-of-25m-now-what.jpg","datePublished":"2024-02-07T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/a-deepfake-scammed-a-bank-out-of-25m-now-what\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/a-deepfake-scammed-a-bank-out-of-25m-now-what\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/a-deepfake-scammed-a-bank-out-of-25m-now-what\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/02\/a-deepfake-scammed-a-bank-out-of-25m-now-what.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/02\/a-deepfake-scammed-a-bank-out-of-25m-now-what.jpg","width":976,"height":533},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/a-deepfake-scammed-a-bank-out-of-25m-now-what\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro Research : Articles, News, Reports","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-research-articles-news-reports\/"},{"@type":"ListItem","position":3,"name":"A Deepfake Scammed a Bank out of $25M \u2014 Now What?"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55271","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=55271"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55271\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/55272"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=55271"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=55271"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=55271"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}