In this chapter we will be looking at how deep fakes are being utilized by cybercriminals for malicious purpose. We will also be looking at some real world use cases so as to drive emphasis on the criticality of this attack
Link to case scenario 1: https://edition.cnn.com/2024/02/04/asia/deepfake-cfo-scam-hong-kong-intl-hnk/index.html
Link to case scenario 2: https://www.theguardian.com/technology/article/2024/may/10/ceo-wpp-deepfake-scam
Link to case scenario 3: https://youtu.be/pJZYd_65xs4?si=1AZrSNdJOL0RpIDq
Link to case scenario 4: https://youtu.be/V6_jCGzR020?si=0oxKtykMpvElt6TsĀ