Skip to content

Playbook: Deepfake Social Engineering Response

ID: PB-48 Severity: Critical | Category: Social Engineering / Fraud MITRE ATT&CK: T1598 (Phishing for Information), T1204.001 (Malicious Link) Trigger: Employee report (suspicious video/voice call from "executive"), unusual wire transfer request via video call, AI-generated voice message requesting credentials

⚠️ CRITICAL: Deepfake technology can clone voices with 3 seconds of audio and generate convincing video in real-time. Executive impersonation via deepfake has caused multi-million dollar fraud losses.

Deepfake Attack Taxonomy

graph TD
    DF["🎭 Deepfake Attacks"] --> Voice["Voice Deepfake\nClone exec voice"]
    DF --> Video["Video Deepfake\nFake video call"]
    DF --> Text["AI Text Generation\nWriting style mimicry"]

    Voice --> VoiceBEC["CEO calls CFO\nwire $25M"]
    Voice --> VoiceVish["Fake IT support\n'reset your password'"]

    Video --> VideoBEC["Live video call\n'approve this transfer'"]
    Video --> VideoID["Fake identity\nbypass KYC"]

    Text --> TextBEC["Executive email\nperfect style match"]
    Text --> TextPhish["Personalized phishing\nAI-crafted lures"]

    style DF fill:#660000,color:#fff
    style VoiceBEC fill:#cc0000,color:#fff
    style VideoBEC fill:#cc0000,color:#fff

Real-World Deepfake Cases

graph TD
    subgraph "Notable Cases"
        C1["Arup Engineering 2024\n$25M deepfake video call\nMultiple fake executives"]
        C2["UAE Bank 2021\n$35M voice deepfake\nFake director call"]
        C3["UK Energy Co 2019\n$243K voice deepfake\nFake CEO phone call"]
    end
    style C1 fill:#cc0000,color:#fff
    style C2 fill:#cc0000,color:#fff
    style C3 fill:#ff6600,color:#fff

Decision Flow

graph TD
    Alert["🚨 Suspected Deepfake"] --> Type{"Communication type?"}
    Type -->|"Video call"| Video["Video call with 'executive'\nRequesting unusual action"]
    Type -->|"Voice call"| Voice["Phone call sounding\nlike known person"]
    Type -->|"Voice message"| VM["Voice message from\n'executive' with request"]
    Video --> Verify["🔴 STOP — Do NOT comply\nVerify via separate channel"]
    Voice --> Verify
    VM --> Verify
    Verify --> Method{"Verification method"}
    Method --> CallBack["📞 Call back on known number"]
    Method --> InPerson["👤 Walk to their office"]
    Method --> Slack["💬 Message on verified platform"]
    CallBack --> Result{"Confirmed real?"}
    InPerson --> Result
    Slack --> Result
    Result -->|"No — Deepfake!"| IR["🔴 Report to IR immediately"]
    Result -->|"Yes — Legitimate"| Proceed["Proceed with standard approval"]
    style Alert fill:#ff6600,color:#fff
    style IR fill:#cc0000,color:#fff

Deepfake Detection Indicators

graph TD
    subgraph "🔴 Video Deepfake Tells"
        V1["Lip sync slightly off"]
        V2["Unnatural blinking"]
        V3["Lighting inconsistencies"]
        V4["Edge artifacts around face"]
        V5["Unable to turn head sideways"]
        V6["Request to NOT record call"]
    end
    subgraph "🔴 Audio Deepfake Tells"
        A1["Slight robotic quality"]
        A2["Unusual pauses/cadence"]
        A3["Background noise inconsistency"]
        A4["Cannot handle interruptions"]
        A5["Avoids side conversations"]
    end
    style V1 fill:#ff6600,color:#fff
    style V6 fill:#cc0000,color:#fff
    style A4 fill:#cc0000,color:#fff

Verification Protocol

sequenceDiagram
    participant Attacker as Deepfake Call
    participant Employee
    participant SOC
    participant Executive as Real Executive
    participant Finance

    Attacker->>Employee: 🎭 "This is [CEO]. Wire $2M immediately"
    Employee->>Employee: ⚠️ Unusual request — trigger protocol
    Employee->>Executive: 📞 Call CEO on verified number
    Executive->>Employee: "I never made that call!"
    Employee->>SOC: 🚨 Report deepfake attempt
    SOC->>Finance: HOLD all pending wire transfers
    SOC->>SOC: Preserve call recording/logs
    SOC->>SOC: Investigation — source of voice sample

Financial Impact Assessment

graph TD
    Impact["Deepfake Impact Assessment"] --> Detected{"Detected before action?"}
    Detected -->|"Yes — Blocked"| Low["🟢 No Financial Loss\nAwareness training trigger"]
    Detected -->|"No — Action taken"| Action{"What was done?"}
    Action -->|"Wire sent"| Wire["🔴 Contact bank IMMEDIATELY\nRecall wire within 24h"]
    Action -->|"Credentials shared"| Creds["🟠 Reset creds + audit\nCheck for access"]
    Action -->|"Data disclosed"| Data["🟡 Assess data sensitivity\nPDPA notification?"]
    Wire --> Recovery{"Within recall window?"}
    Recovery -->|"Yes ≤ 24h"| Recall["Bank recall possible"]
    Recovery -->|"No > 24h"| Lost["💀 Funds likely unrecoverable"]
    style Lost fill:#660000,color:#fff
    style Wire fill:#cc0000,color:#fff

Response Timeline

gantt
    title Deepfake Social Engineering Response
    dateFormat HH:mm
    axisFormat %H:%M
    section Detection
        Employee reports        :a1, 00:00, 5min
        Verify with real person :a2, after a1, 10min
    section Containment
        Hold pending actions    :a3, after a2, 5min
        Alert all departments   :a4, after a3, 15min
    section Investigation
        Preserve evidence       :a5, after a4, 30min
        Source analysis         :a6, after a5, 60min
    section Response
        Financial recovery      :a7, after a6, 120min
        Org-wide awareness      :a8, after a7, 60min

1. Immediate Actions (First 10 Minutes)

# Action Owner
1 STOP — do NOT comply with any request Employee
2 Verify identity via separate, known channel Employee
3 If deepfake confirmed — report to SOC immediately Employee
4 Hold ALL pending financial transactions Finance
5 Preserve call logs, recordings, chat history SOC
6 Alert leadership about ongoing deepfake campaign SOC Manager

2. Investigation Checklist

Communication Analysis

  • What platform was the call/message received on?
  • Is there a recording of the deepfake call?
  • What specific requests were made?
  • Were any links or files shared?
  • Was the caller's number spoofed?

Damage Assessment

  • Were any financial transactions approved?
  • Were credentials or sensitive data shared?
  • Were any systems accessed as a result?
  • Were other employees targeted simultaneously?

Source Investigation

  • Where could the attacker have obtained voice/video samples?
  • Public speeches, interviews, social media?
  • Previous recorded meetings or webinars?
  • Is this part of a broader campaign?

3. Containment

Scope Action
Financial Freeze all pending transactions
Communications Warn all employees of active campaign
Credentials Reset if any were shared
Platform Report deepfake to platform provider

4. Post-Incident

Question Answer
Was the deepfake detected before action? [Yes/No]
What was the financial impact? [$Amount]
Were dual authorization controls in place? [Status]
Is employee deepfake awareness training in place? [Status]

6. Detection Rules

Note: Deepfake detection is primarily procedural — verify via separate channels for any unusual requests.

title: Unusual Wire Transfer Request After Video Call
logsource:
    product: email
detection:
    selection:
        subject|contains:
            - 'wire transfer'
            - 'urgent payment'
            - 'confidential transaction'
        sender_domain|external: true
    condition: selection
    level: high

References