Navigating Cyber Threats and Extortion Groups (2025)

The term ‘deepfake’ was coined in 2017. When I saw the first examples, such as videos where a celebrity's face was seamlessly superimposed onto someone else's body, I felt both awe and fear of this new computing capability. These deepfakes were so convincingly done that it was hard to distinguish them from real footage, highlighting both the potential and the risks of this advanced technology. Fast forward seven years and deepfakes are all grown up, and it's not looking pretty for companies. Deepfakes have the ability to cause an awful lot of harm to the business world—in fact, they’re currently being used for extortion, targeting senior executives. Victims are conned into transferring money and IP straight to the threat actor, believing they are acting legitimately under instruction from leaders.

I have been around computers since floppy disks. Back then, security was introduced to stop data from being stolen or locked (ransomware) or entire systems taken down (zero day). But as technologies evolved, so have the security risks. I've never encountered threats as complex and sophisticated as deepfakes. Following my conversations with numerous seasoned experts who help companies respond and recover from these types of attacks, one clear consensus emerges:

Deepfake extortion, involving the use of manipulated videos or calls that appear to feature company executives, presents a unique challenge: while the security systems and data continue to function, the company's money and/or intellectual property can leave the company.

Trust me, these deepfakes are so good your employees will not be able to discern that this is not who they think they are communicating with. Therefore, we must rely on human factors, protocols and duty separation to help keep businesses and people safe.

How deepfakes are redefining cybersecurity

Deepfakes, crafted using the latest generative AI technologies, create a new breed of deception. By leveraging artificial intelligence, they produce hyper-realistic videos, audio, and texts that can fool even the most discerning eyes, potentially resulting in multimillion-dollar losses for businesses. Their capabilities are only going to become more advanced. According to Accenture’s Cyber Intelligence (ACI) researchers, threat actors are willing to spend more for higher-quality deepfakes, with prices reaching up to $20,000 per minute for high quality videos. What is more, researchers have observed a 223% increase from Q1 2023 compared to Q1 2024 in the purchasing and selling of deepfake-related tools in major dark web forums1.

The implications for corporate leaders are profound. Deepfakes can be weaponized to create disturbances not only within organizations, but within entire markets and even governments. Mitigating human vulnerabilities has long been a critical aspect of cybersecurity. Yet, the focus has often been scattered, with warnings to guard against various threats.

Now, with the emergence of deepfakes, there's an added layer of uncertainty. It's becoming increasingly difficult to discern whether communications are genuine—be it a call from a supervisor, text message from a colleague or a scam attempt.

For example, Hong Kong Bank reportedly suffered a $25 million loss due to a sophisticated deepfake scam. The scammers digitally recreated the company’s chief technology officer, along with other employees, on a conference call instructing colleagues to transfer money, which they did.2 As technologies become more sophisticated, distinguishing between authentic and falsified identities will become more challenging, complicating security protocols. The ACI team expects a rise in AI-driven cyberattacks, highlighting that organizations must adopt advanced AI-based cybersecurity measures that detect, respond to, predict and prevent threats in real-time. We are going to see all sorts of new solutions like infrared and various scanning technologies popping up.

But the key takeaway is that people, especially those at the board level, need to understand that they are now being targeted.

How can leaders navigate the mirage?

Investing in proactive cybersecurity measures is not only a strategic move but also a cost-effective one. The financial burden associated with rebuilding an organization's reputation and regaining customer trust after a deepfake attack significantly surpasses the expenses of implementing robust cybersecurity protocols ahead of time.You might be wondering, "What steps should I take to ensure the appropriate level of protection?" Here is my suggestion. You need to act swiftly to strengthen your organization’s defenses. It is essential to integrate advanced security features, stringent controls and comprehensive employee training and awareness.

What are the key elements you should consider initially?

  • Educate and align leadership team immediately and ensure they understand the individual threat that they all face.
  • Enhance policies, procedures and governance to secure the digital core against AI-enhanced risks.
  • Conduct tabletop exercises, pen testing and crisis management procedures for leadership and finance.

This appears to be an ambitious strategy, however partnering with a trusted partner will ensure comprehensive advisory and advanced technology designed to mitigate the escalating risks associated with deepfakes.

Don’t wait for the first crisis to occur, the time to act is now!

The threat of deepfakes extends beyond individual harm, posing significant risks to the integrity and stability of corporate enterprises and global markets. As leaders, we must be at the forefront of adopting innovative solutions and advocating for stronger protections to safeguard our businesses from this emerging form of cybercrime.

It is up to us as an industry to stop the cat and mouse game between attackers and organizations to ensure that this threat of deepfakes does not become pervasive.

For more information see how we're helping our clients with Deepfakes.

References

1Accenture Cyber Threat Intelligence Research

2Deepfake scammer walks off with $25 million in first-of-its-kind AI heist

Navigating Cyber Threats and Extortion Groups (2025)

FAQs

What are the methods of cyber extortion? ›

It is an attempt to exhaust the resources of an application, website, or network by sending a flood of junk network traffic from a variety of sources such that, legitimate or actual users cannot have any access to that service. They may demand payment or ransom to remove that 'traffic'.

What are the 5 most common types of cyber security threats? ›

What are the 12 most common types of cyberattacks?
  • Malware.
  • Denial-of-Service (DoS) Attacks.
  • Phishing.
  • Spoofing.
  • Identity-Based Attacks.
  • Code Injection Attacks.
  • Supply Chain Attacks.
  • Social Engineering Attacks.
May 14, 2024

What is the number 1 method used by cyber attackers? ›

Phishing remains the leading infection vector, identified in 41% of incidents, followed by exploitation of public-facing applications at 26%. There were twice as many thread hijacking attempts per month in 2022, compared to 2021 data. Ransomware's share of incidents declined from 21% in 2021 to 17% in 2022.

What are the most important fundamentals to remember when responding to cyber attacks? ›

A strong incident response plan is built on four fundamentals:
  • Identify the essential assets.
  • Include the basics in your plan.
  • Ensure alignment.
  • Consistently test your response plan.
Jun 27, 2024

What is the best way to deal with extortion? ›

Specifically, you can:
  1. Refuse to pay the extortion demand;
  2. Serve the extorter with a cease and desist;
  3. File a police report against the extorter;
  4. Pursue legal action against the extorter.

What is a real life example of cyber extortion? ›

A common example of cyber extortion is ransomware. During a ransomware attack, a hacker hijacks an element of your network and demands that you pay them money—typically in cryptocurrency—before they allow you to access your digital assets again.

What are the 5 C's of cyber security? ›

From small businesses to large enterprises, understanding the 5 Cs of cybersecurity—Change, Compliance, Cost, Continuity, and Coverage—is pivotal. These five components provide a robust framework, guiding businesses in safeguarding their digital assets.

What is the number 1 cybersecurity threat? ›

Phishing: Criminals send messages through email, text, or social media, pretending to be a reputable source with the goal of getting individuals to reveal sensitive information and data such as bank account info, social security numbers, and passwords.

What is the number one cause of cyber attacks? ›

Key takeaways. Social engineering, involving tricks or manipulation, is used in 98% of cyberattacks. According to Verizon's 2023 report, 10% of security incidents and 17% of data breaches were caused by social engineering. The average organization is targeted by more than 700 social engineering attacks annually.

What is the most common hack? ›

The 15 most common hacking techniques
  1. Phishing. Phishing is a type of cyberattack typically launched via email, although other types exist. ...
  2. Keylogger. ...
  3. DDoS Attacks. ...
  4. Cookie theft. ...
  5. Fake WAP. ...
  6. Troyanos. ...
  7. ClickJacking Attacks. ...
  8. Bait and switch.

What is the most basic cyber defense tool? ›

Packet filter: This is the original and most basic type of firewall that cyber security professionals deploy. It inspects packets transferred between computers and permits or denies access based on an access control list.

What do cybercriminals use the most? ›

Common Tactics Used by Cybercriminals

Phishing campaigns involve sending malicious links through various channels, such as email, voice calls (vishing), SMS (smishing), or even through personalized spear phishing, to trick individuals into revealing sensitive information.

What are the 3 C's of cyber security? ›

The 3 Cs of Enterprise Security: Communicate, Coordinate and Collaborate. As technology continues to evolve and become more interconnected, the line between cyber and physical security is increasingly blurred.

What is the first step you can take for cyber security? ›

1 – Good Passwords. Adopting complex passwords is one of the key initial steps in good cybersecurity practices. Yes, it's a hassle to remember multiple ones, but understand malicious third-parties use methods like bot attacks to cycle through generic login phrases.

What is the first thing to learn in cyber security? ›

1. Networking and System Administration. An in-depth understanding of networking is required to start a career in cybersecurity. Learning networking will help you understand data transmission's technical aspects, which will help you secure your data.

What is the common form of cyber extortion? ›

Cyber extortion uses a variety of methods such as doxxing, DDoS attacks and ransomware. Ransomware is a type of malware and a common method of cyber extortion. It is often installed on a user's device via phishing attacks or exploit kits.

What are the 5 best methods used for cyber security? ›

For more information about each of these steps, see our downloadable documents section at the bottom of this page.
  • Protect your data. Strong passwords and additional account security measures are an effective way. ...
  • Prevent Malware. ...
  • Avoid Phishing Attacks. ...
  • Backup your data. ...
  • Keep your devices safe.

How many types of extortion are there? ›

California Penal Code §518 describes the basic version of Extortion, but in §§522 and 523 there are two similar forms, “Extortion Of Signature” and “Extortion By Threatening Letter.” The Attempted Extortion statute is §524.

What are the method of cyber attacks? ›

What Are the Most Common Cyberattacks?
  • Malware. Malware is a term used to describe malicious software, including spyware, ransomware, viruses, and worms. ...
  • Phishing. ...
  • Man-in-the-middle attack. ...
  • Denial-of-service attack. ...
  • SQL injection. ...
  • Zero-day exploit. ...
  • DNS Tunneling.

Top Articles
Latest Posts
Recommended Articles
Article information

Author: Lakeisha Bayer VM

Last Updated:

Views: 6403

Rating: 4.9 / 5 (69 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Lakeisha Bayer VM

Birthday: 1997-10-17

Address: Suite 835 34136 Adrian Mountains, Floydton, UT 81036

Phone: +3571527672278

Job: Manufacturing Agent

Hobby: Skimboarding, Photography, Roller skating, Knife making, Paintball, Embroidery, Gunsmithing

Introduction: My name is Lakeisha Bayer VM, I am a brainy, kind, enchanting, healthy, lovely, clean, witty person who loves writing and wants to share my knowledge and understanding with you.