Hackers use deepfakes to get you a remote job that’s why they need it

(ORDO NEWS) — Until recently, neural network face replacement was a technology that only existed in the lab. Now this is a terrible reality, where deception can be at every turn.

No, hackers don’t want the money from this job at all – they just want to beautify personal data or break company systems from the inside.

The FBI has discovered that hackers began stealing and using personal information to apply for remote jobs and pass interviews through deepfakes.

“Remote work or work from home identified in these reports includes positions related to information technology and programming, databases and software,” the FBI said in a statement.

“Notably, some of the posted positions include access to customer personal data, financial data, corporate IT databases, and sensitive information.”

Why do hackers put people to work?

Personally identifiable information may include any information used to identify you, such as your passport number, your driver’s license, and even your health insurance information.

Once cybercriminals have your personal details, they can apply for remote work using your name and address along with a fake resume.

The most impressive thing happens after hackers pretending to be applicants are invited to a remote interview.

Scammers will use fake videos to pretend they are you during an online video conference. They may also use voice modifiers for telephone interviews.

Deepfake technology uses artificial intelligence and machine learning to carefully match the subject’s facial expressions to the actual video.

This requires only one photo, for example, from a driver’s license, and it can produce an impressively realistic video.

Experts have been warning about the growing prevalence of forgeries in cybercrime for several years, and Europol has even published a report that deepfakes are being used to impersonate top company executives.

Getting the right position, hackers can paint the personal data of the company’s customers or arrange internal attacks on their servers.


Contact us: [email protected]

Our Standards, Terms of Use: Standard Terms And Conditions.