AI Security Case Study: Deepfake Results in the Theft of $77 Million

Deepfake results in the theft of $77 million

Case Study Number, AISec-0001/24

Summary

This case study provides an example of where an AI Security vulnerability was exploited at a cost of $77 million to a government organisation.

Threat Capability Level, Productionised and Deployed: TRL9

Primary Threat Vector, Deepfake / Camera Hijack

Date, 2020

Reporter, Ant Group AISec Team

Actor, Two individuals (unknown)

Target, Shanghai government tax office's facial recognition service

Incident Detail

This form of camera hijack assault is capable of circumventing the conventional live facial recognition authentication system, thus granting entry to high-security systems and facilitating identity fraud.

A pair of individuals in China leveraged this method to infiltrate the local government's taxation system. They established a spurious shell company and dispatched invoices through the tax system to ostensible clients. Commencing this fraud in 2018, the duo successfully amassed $77 million through deceitful means.

Tactics, Techniques, and Procedures

The attackers used a camera hijack technique, injecting a pre-recorded video of a legitimate user's face into the camera feed used by the facial recognition system. This technique bypasses liveness detection by substituting a static or pre-recorded image for the live camera input, effectively spoofing the AI authentication system.

The attack exploited the gap between the AI system's facial matching capability and its inability to reliably detect synthetic or replayed video inputs, a known vulnerability in first-generation facial recognition deployments.

Mitigations

  • Undertake an AI security assessment.
  • Catalogue your AI infrastructure assets (hardware and software).
  • Employ a Secure by Design methodology for the development of your AI products and services.
  • Gain a comprehensive understanding of your supply chain and construct your AI Bill of Materials (AIBOM).
  • Maintain an Open Source Intelligence (OSINT) feed to stay abreast of emerging AI threat vectors.
  • Autonomously track, prioritise, and document your vulnerabilities, there are too many for humans to do manually.
  • Utilise a quantitative risk management strategy that justifies investment returns of your control measures.

Final Note

Leadership is the fundamental solution to Cybersecurity, become a cyber leader, not a cyber manager.

References

  • The Wall Street Journal, Camera Hijack Attack on Facial Recognition System
  • The Register, Deepfake attacks can easily trick live facial recognition systems