Overview
Risk patterns
Patterns found in the case record and its linked vulnerabilities.
- 1Dominant ATLAS tactic. Resource Development appears in 4 case steps.
- 2Multiple attack methods. The case connects to 10 unique AI attack methods.
Procedure timeline
Search the case steps or filter them by attacker goal.
-
Reconnaissance The researchers collected user identity information and high-definition facial images from online social networks and/or black-market sites.
-
Resource Development
Step 2
Generative AI
The researchers obtained Faceswap a desktop application capable of swapping faces in a video in real-time.
-
Resource Development
Step 3
Software Tools
The researchers obtained Open Broadcaster Software (OBS)which can broadcast a video stream over the network.
-
Resource Development
Step 4
Obtain Capabilities
The researchers obtained Virtual Camera: Live Assist, an Android app that allows a user to substitute the devices camera with a video stream. This app works on genuine, non-rooted Android devices.
-
AI Attack Staging
Step 5
Generate Deepfakes
The researchers use the gathered victim face images and the Faceswap tool to produce live deepfake videos which mimic the victim’s appearance.
-
Resource Development
Step 6
Establish Accounts
The researchers used the gathered victim information to register an account for a financial services application.
-
AI Model Access During identity verification, the financial services application uses facial recognition and liveness detection to analyze live video from the user’s camera.
-
Initial Access
Step 8
Evade AI Model
The researchers stream the deepfake video feed using OBS and use the Virtual Camera app to replace the default camera with feed. This successfully evades the facial recognition system and allows the researchers to authenticate themselves under the victim’s identity.
-
Defense Evasion
Step 9
Impersonation
With an authenticated account under the victim’s identity, the researchers successfully impersonate the victim and evade detection.
-
Impact
Step 10
Financial Harm
The researchers could then have caused financial harm to the victim.
Mitigations
Defenses connected to the attack methods in this case.
Sources
Original public records and references for this case.
Original source
Original source links
Open the MITRE ATLAS data and public references used for this case study.