Overview
Risk patterns
Patterns found in the case record and its linked vulnerabilities.
- 1Dominant ATLAS tactic. Resource Development appears in 2 case steps.
- 2Multiple attack methods. The case connects to 8 unique AI attack methods.
Procedure timeline
Search the case steps or filter them by attacker goal.
-
Reconnaissance The bad actor collected user identity information.
-
Resource Development
Step 2
Generative AI
The bad actor paid for the ProKYC tool, created a fake identity document, generated a deepfake selfie video, and replaced a live camera feed with the deepfake video.
-
AI Attack Staging
Step 3
Generate Deepfakes
The bad actor used a mixture of real PII and falsified details with the ProKYC tool to generate a deepfaked identity document.
-
AI Attack Staging
Step 4
Generate Deepfakes
The bad actor used ProKYC tool to generate a deepfake selfie video with the same face as the identity document designed to bypass liveness checks.
-
Resource Development
Step 5
Establish Accounts
The bad actor used the victim information to register an account with a financial services application, such as a cryptocurrency exchange.
-
AI Model Access During identity verification, the financial services application used facial recognition and liveness detection to analyze live video from the user’s camera.
-
Initial Access
Step 7
Evade AI Model
The bad actor used ProKYC to replace the camera feed with the deepfake selfie video. This successfully evaded the KYC verification and allowed the bad actor to authenticate themselves under the false identity.
-
Defense Evasion
Step 8
Impersonation
With an authenticated account under the victim’s identity, the bad actor successfully impersonated the victim and evaded detection.
-
Impact
Step 9
Financial Harm
The bad actor used this access to cause financial harm to the victim.
Mitigations
Defenses connected to the attack methods in this case.
Sources
Original public records and references for this case.
Original source
Original source links
Open the MITRE ATLAS data and public references used for this case study.