The use of synthetic media to transmit deceptive information intended to obtain money or other things of value from the victim.
Content created to serve an information or psychological operation purpose.
Tendency to comply with authority figures (usually legal or expert authorities). Exploitable by assuming the persona or impersonating an authority figure.
Technique that attempts to implant a false memory in the target through suggestion.
A form of motivated reasoning, this is both a cognitive and social response, in which individuals, consciously or unconsciously, allow emotion-loaded motivational biases affect how new information is perceived. In particular, information is often interpreted to correspond with hope/wants/wishes and information to the contrary is ignored.
Both humans and automation may be targeted by synthetic media attacks. This criteria references whether the target of the attack was human or automation. The highlighted icon represents the intended target of this submitted media.
A measure of if the attack was constructed by a human or by artificial intelligence. The highlighted icon represents the method of control of this submitted media.
The medium is the format of the content submitted. Highlighted items represent all of the various formats contained in the submitted content.
Text
Image
Video
Audio
Technical complexity of the atttack.
How damaging the attack was intended to be.
The deepfake persona narrative is to convince target audience members of investing in financial markets being recommended by the deepfake persona.
Drive and intention to accumulate large sums of money or other financial resources
The synthetic media was created as a method of persuading and gaining compliance from susceptible audiences that the person appearing in the video is authentic, and what they are conveying is authentic and credible. The path the audience is being led down is to invest in high-dividend EFTS, based upon the purported experience and authority of the deepfake narrator
Motivation is the underlying activator, purpose or sustained reasons for why the deepfake threat actor wants to create nefarious synthetic media.
The content was created to cause the target audience to invest in high-dividend EFTs and other investments being suggested by the deepfake persona.
Targeting is the threat actor’s intentional selection of a target audience, or the group or individual whom he is interested in impacting with his deepfake campaign.
The target audience is Chinese speaking and likely native Chinese.
Research & Reconnaissance occurs when the threat actor is effortfully gathering information about the target audience, the optimal channels to conduct their campaign on, the relevant narratives for the attack, and type of content that will have the desired impact on the target audience.
No case specific insights generated.
Preparation & Planning are the steps and processes that the threat actor takes to acquire the tools and content needed to create the deepfake media for their campaign and their deliberation for the execution of the campaign.
Effort was taken to gather information relevant to the market, definitions and context to sound legitimate. Similarly, a backstory of purported experience was provided by the deepfake persona to exude authority to the target audience.
Production is the threat actor’s use of tools and content for the creation and development of deepfake media for their attack campaign.
The audio production value was not high-quality and sounded very high in treble and modulation.
Narrative Testing. A narrative is a story, or an account of related events or experiences. A good narrative will have story coherence, such that both the story being told and its relationship to the real world are cohesive and clear. In deepfake campaigns, threat actors consider and evaluate the possible narratives—particularly in relation to events and context—to support the campaign in an effort to maximize the believability and efficacy of the attack.
No case specific insights generated.
Deployment is the threat actor’s intentional transmission of deepfake content to the target audience through selected online channels.
No case specific insights generated.
Amplification is the threat actor’s intentional efforts to maximize the visibility, virality and target audience exposure to their deepfake content.
No case specific insights generated.
Post-Campaign is the period after the target audience has received and been exposed to the deepfake content.
No case specific insights generated.
As with many financial scams and investment schemes, independent research is needed before taking action. in this video, the source of the message makes many experiential claims of success, but gives little citation to sources or statistics to support her stories. Investments should not be done through being swayed by self-proclaimed experts and scant facts, but rather, market research, market comparison, historical margins, and if possible, consultation with a financial expert.