code = 2039481010, 3238094132, 6317732536, 18883692408, 6162140305, 7066074599, 9566829219, 4844522185, 5167319000, 6094368902, 3525581395, 7279671302, 5742595888, 3193177008, 3612459073, 5028615127, 6147210854, 8324261448, 2157142516, 6196433443, 2185010385, 3237633355, 5614340111, 2107872674, 7089782755, 2505814253, 8444966499, 2262140291, 6786855180, 2059836129, 2199474151, 5634454220, 5716216254, shearchel, 5713708690, 8338388330, 6029558800, 6147636366, 2065747881, 3212182713, 18334934020, 7028431691, 18332147629, 8443328652, 3307757328, 18554309246, 18337693124, 2029496897, 8646260515, 9172423844, 7206792207, 8337382402, 8018556033, 7573234879, articoolo, 7184142017, 4694096902, 5715704136, 7252799543, articoolo, 3054000750, 2564143214, 6107986211, 2543181422, 3363013981, 6477666298, 18886912224, 5134577234, 4408567823, 5036626023, 5673152506, 18004553869, 18009206188, 9164315240, 3107546969, 3523060075, 6162725068, 4047262953, 2136472862, 3392036535, 2672935009, 4087694839, foozleifap, 8008545695, 4195740038, 8173966461, 4174992514, 9512562841, 9848101177, 5202263623, 2623324009, 8563691096, 8447891750, 3375414115, 9042640770, 7252204624, 7345633258, 9726455887, articoolo, 8186726442, 4694890551, 602.926.0091, 6402201353, 8177362718, 5403907253, 5703179533, 7809664570, 4055408686, 6189446426, 2487855500, 4014140477, 18005496514, 3035783310, 3612233029, 4709753339, 3093200054, 5129791053, 6292588750, 2082681330, 5804173664, 2085223380, 7579830000, 4582161912, 9168975088, 9735247836, articoolo, 6782572121, 9097877176, 3126039300, 8777640833, 8442314209, 5635516601, 4106279010, 6613686626, 8338702240, 7137999975, 8552168343, 3029242506, 6474270299, 4433803883, 6027675274, 5042058910, 4173749989, 7084590048, 4023164651, 7605208100, 6506189519, 8475651443, 3475353347, 4018686200, 2177491008, 7273872774, 8443116083, 2816720764, 8669145906, 2106401949, 8104745049, 5126311481, 8443765274, 5417666200, 3148962604, 9202823875, 8446850049, 4167790381, 8662783536, 2174510021, 3465377499, 2512930806, 4023964223, 3373456363, 3474108149, 4028155060, 18667478132, 18448302149, 8125655025, 18003471170, 4045513774, 3464268887, articoolo, 7342342010, 8886195735, 2245096119, 5416448102, 2812053796, 3233319510, phyreassmeche, articoolo, 9043002212, 4166169082, 2814084487, 9043807465, 3618257777, 3104153191, 9085214110, 7193535043, 16304875143, 7606403194, 3176149593, 3522650104, 9296285983, 7158988038, 4235463005, 5018218349, 5107474557, 5403084012, 3606265635, 18778688018, 6474536361, 2703186259, 6314823824, 3139607914, 2565103542, 8887449202, 8432127679, 5146994182, 3049746737, 6472019812, 18774951126, 7166572886, jmolnaeve, 9029123279, 9197910840, 4056944440, 5854601092, 8635004028, 5735253056, 2677872565, 6042960214, 9704882919, 5133970850, 5623839165, 8652692100, 8447560789, 8333620402, 2692313137, 3477499797, 8775120911, 4252952037, 18552099549, 8883860050, 18005271339, 3257164820, 8323256490, 4186595264, 18003386507, radxalyssa, 866.914.5806, 5193190512, 14075830183, watchedsweb, 18664188154, 8332678836, 2602051586, 9037167079, 8015260950, articoolo, articoolo, 6476602908, 8668623404, 8326267152, hqpotnet, 5703752113, 2073769794, 3463261143, articoolo, 8554416129, 5124107883, 6136913242, 8332990168, articoolo, 18882776481, 7158584968, 18004637843, 8443876564, 4376375187, 18666992794, 18665258622, 9592998000, 8558437199, 8667507489, ckdvorscak, 2897801267, 9035937800, 3364997447, 6304757000, 12x12x12x12x12x12x12x12x12x12, 7203995339, 5303227024, 3616023841, 4237049484, 18008994047, articoolo, 8335121234, 2125355350, 8632676841, 2103010293, 2142862172, 5104269731, 2567447500, 6194332755, 8177866703, 7806661470, 7022393813, 8559901009, 18774014903, 5878808470, 18008637500, 9057690551, 5092558502, 8324817859, 8884961481, 18559564924, 9512228662, 18773788728, 18003234459, 9104442796, 7145165275, 3322207121, nataliebieberr, 9193550417, 6036075554, nnevelpappermanndev, 4373707460, 262675594, articoolo, 8339870385, 8666240555, 6022563003, 18002485174, 3852617144, 18007822200, 5615034870, 8013256228, 2153094327, 2107754223, 4847880110, 6158821971, 9565897007, 7707642763, qwertyuioplkjhgfdsazxcvbnmmnbvcxzlkjhgfdsapoiuytrewq, 8323360114, 9047307343, 18664487098, 18445063219, 18667956410, 18886367606, articoolo, 2097985335, 4154813687, 6084534403, 8442568097, 18664062767, 9412022411, 18002045785, 2123475308, 7043131615, 8038665110, 8553960691, 5145562422, 8339124265, 8134373061, articoolo, 4049960554, 18335421564, 7208455305, 8656228965, 8009430692, 18002762301, 8192436140, 7162676025, determinethequantityofin, 6025298923, 5678873715, 18555124204, 7869190192, 2132711444, 18778939893, 2052240982, articoolo, 8006271406, 6126721631, 4314515641, 8884135452, 18002319631, 8663767601, 7183320600, 6038026679, 5034614677, 8457898014, 8727010185, 2197031374, 7068215456, 2406183584, 7572090392, 800.319.2482, 5123252261, 8322398560, 8605121046, 8773277311, 8502703853, 9375304801, 8555422416, 3852617107, 8339582234, 2678656550, 12502981102, 2896191896, 8449922196, 9096871219, 2482578183, 7652046509, 4163488028, 8172074129, 2532451246, 5868177988, 8155179338, 8664368150, 5209006660, 8446149087, 4125577457, 8334393074, 4078915461, 8557390856, 8644321381, 8008365938, 5183636075, 18774286004, 8557074599, 9377599723, jbad219, 8003966861, 18882575945, 5592059351, 9142211647, 4197016020, 3175504434, 2152533137, 7035746171, 9187940810, 8772526631, 8555784253, 6263779675, 5137076994, 8775787567, 3302952123, 18003563477, 8336651745, 2254686013, 9294633452, 8035858073, 2676271705, 9097124497, hectrequautmvvl, 8336020603, 5702812467, 2145068793, articoolo, 8659469900, 8152703126, 7753840563, alekskseny, 5312019943, 4108875912, 2173264646, 6125242696, 5412621272, 2092152027, 8663107549, 8333280521, 8447272648, gomezbarajas999, 6064085347, 4244106031, 8774113582, 4164827698, 8556178776, 5125213038, 8595594907, 18552225919, 8703013107, 8772027974, 3606265624, zvjdeo, 6176266800, 8005267145, 8006695701, 2138080508, 2566296248, 949.994.1015, bdm8668, babemashek, 18558722243, 9044508120, 7063584044, 8159895771, 4085397900, 9715013475, 8664138114, leahgelickk, 8339014153, 8142470862, 8442206741, 3652100082, 8668446972, 18664315025, 4503231179, 8009064766, 3042444778, 18882220227, 8662717730, 5619674118, 8778707625, 4806973040, 9106628300, 6182062806, 6098082244, 7623831436, 8333952298, 8004836205, 18776887664, 8337892678, 5135723375, sjudpsk, 8336852203, 7208035549, 6042276283, 8163028200, hqpotnet, 2294313120, 5185879300, 8705586864, 8557606191, 9209064600, alekskseny, 6047065017, acutromon, 7174070775, 18006783228, adulsearc, 5109849896, agathauwuart, 9133120984, 18007666786, 4149053073, articoolo, 9787756227, 2106998326, 4805352355, 7047026509, 8338950045, 2167773523, 3055239932, 9187010132, 18669516592, 3335565838, 6076999031, 4024838576, 8663211171, 9152255480, marcelasatnam, 8055072161, 9563134739, 7732952285, 6173402729, 2105415300, 9102740982, 4076050575, 9155328823, 2013684200, 6232368507, 855.730.1564, 3106184773, 4232670466, 18443018724, 3059073704, efgebvg, 8135194325, 5612279208, 18666293686, 3109971521, 2818018066, faiiryquadmother, qglobal, inlyfans, 789win, 789bet, belindanohemy, quotdle, 1a4050300018511000137943, bumpdots.com, 365bet, gsaauctions, ilearnnyc, weatherforyou, royal9999, sbiffies, win777, blooket1games, www.usainmate, realmeye, www.currently.att, edjulastic, nylottery.org, lookmovieto.2, nyoubooru, bwt365, www.nylottery.org, coolmathgmes, wuillbot, cunyblack, fetkife, firekiren, www.nearpod.join, instanavagation, rentmasseur.com, pimpandhost, thumbnet.net, ehaulpass, kgimkit, yentiming, gimkitr, quordlw, mozbarlogin, mcpss.clever, sportsruge, wniffies, northwell.edu.billpay, cars4bids, lookmovie2.tp, ucimychart, www.kahoot.kit, wheresmyrefund.us, lblooket, glance.intuit.c0m, mycastlebranch, vanessavipx, denalidaisy, imgsrcru, ucmychart, 77bet, edpuzzle.hs.vs, aniwaych, edpuzl, indeed.cim, poutyalisha, doublelidt, redfifs, mycitrix.chs, curalesf, doubellist, mariannacruzz, autotrqder, pick3nc, streameast.iu, chat.openai.comhat, myueiedu, mandtonlinebanking, gtt.telusinternational, justthegaus, g4swap, scentbitd, usps.comscheduler, thesarusu, mymvpapps, weedmals, naughtygirlkeke, footmodel96, netflix.comtv2, sniifies, freesearchpeople, mycsuci, olemiss247, joinmyquiz.come, kepritogel, myjentai, slickdeala, creperase.com, trackerestling, basketballbros.io, streameaet, purplepilldebate, dounlelist, bluexhew, reddit.comed, instanavigstion, orleanshub.com, dubblelist, noredinl, ausehub, mykchart, naviancr, 1v1.lolme, wwwterminxcom, www.mcgift.giftcard, www.labcorp.billing, mail.yahoo.comil, edgulastic, nhemtia, mathqay, onlyjans2023, f12bet, zilloew, juliabeng1, myreadingmqnga, exzpass, watchigstories, 52.376552.5.98305, snjffies, kilat77, myattprepaid, rapidenty, overlefa, buffsteeams, coomonlit, myboomerplace, protectadvantage.com.att, monkettype, coolmaht, apclassrom, miakayden, abkingdom, ameritasinsgr, novanthealth.org, xboxeos, wallfreens, crackedsteams, sportsuege, buffstrems, hexonaut.io, coomerparty.su, flingsrer, joingimkit, sso.thementornetwork.com, lavahmoon, freeomes, kaisermyhr, sybolmath, instanavogation, chatfpr, classkcik, maps.google.comps, coolmathgamse, pgbet, crackedatreams, methsteeams, mydidiwork, ebay.combay, webmictest, syngrades, sicknunk, xxbrits.con, curaleag, tcss.powerschool, tmobilelogin, att.comfastpay, myfamilyaccess, gingerpeach94vip, rachelglvn, www.myfirstdigitalcard, tgtube.con, hcpshub, mokneytype, roadtestresults.ny, socialmediagitls, sportssuge, ruggavle, myhenrai, www.juwa.777, bet7k, aberdeenairportparking, crackstrean, www.famousfootware, scentburd, sd251.schoology, mrderpfake, coolmathgamea, wscort, privateselights, idiglearning, crackstresm, billpay.baptisthealth.net, coolmatgh, caculatir, croomer.su, sportsurgr, trimet.trinet, sniffjes, coollmath, landwarch, picuki.com, www.playbattlesquare.com, ar15gd, sniffiies, linkapple.com, microsoft.comlink, exchange.microsoft.admin, listcwarler, wwwequibase, streameast.iso, 888bet.ag, instastoryanon, pick3va, vianney.instructure, jdbratcherp, communitybanktv, limitincreaseup.com, gimtkit, puttshaxk, playmobi.gd, coolmathagems, xxbabyari, stresmesst, mycollectivehealth, monkeytyope, fwtlofe, drudgereport.comr, myfasfa, ebonygalorw, viperxpov, academydigest.com, join.heytutor.com, increasecard.in, seatgeej, coolmaath, pick3nj ‬‬
World

Understanding Whaling Attacks in the Age of Deepfake Technology

Cybercriminals are becoming more advanced in the modern online world and one of the most popular types of attacks is the whaling attack. They are very specific like whaling attacks, unlike phishing ones with a broad net which tries to gain access to low and mid-range executives. The goal? To fool them into providing some secret information or investing huge amounts of money.

Due to the emergence of deepfake technology, whaling attacks have been made even more persuasive and threatening. In this article, we are going to know more about whaling attack, some of the real life examples of whaling attack and how whaling attacks can be claimed through deep fake detection parameters and other advance tools.

What is Whaling Attack?

Whaling scam An attack on a high-profile target manager or executive, also classified as a spear-phishing campaign, includes all elements of spear-phishing, but may also include personal or sensitive information about the target and is often used to coerce the target to transfer money or share other sensitive data. All these attacks are well-prepared with references to public information (e.g. LinkedIn or websites of companies) to make emails, video or even telephone calls look real.

The term, whaling, is based on the premise that the hackers are targeting the big fish, the people who have great influence and can provide key resources of a company.

The Whaling Attacks Process Whaling attacks work in a similar way to phishing attacks in that they both use a combination of social engineering and technical means to commit the act of access and swindle.

Any whaling raid may resemble the following sort:

A CEO opens an email that seems to be sent by a familiar business partner or (another) business executive.

The message can contain a fake invoice or some justification to make a bank transfer.

In more sophisticated instances, hackers resort to an AI-generated voice or video, known as deepfakes, to impersonate an executive.

These attacks are based on trust, haste and impersonation. The ultimate targets are normally people in positions who can change the decisions that are made, hence, an effective whaling assault can disastrously hurt an entity financially and reputationally.

Examples of Real-World Whaling Attack

Path Films Case (2018): Two managers in the Dutch part of the Path Films Company followed the instructions and sent more than 20 million dollars to the criminal indeed, presenting as a company CEO, using an email spoofing technique. The assailants made the executives believe that the transfer was over an acquisition that was confidential.

Scoular Company Incident (2014): The agricultural company lost 17.2 million dollars on a whaling assault. The CFO got emails resembling those of the CEO, asking him to send funds in a secret acquisition deal in China.

Deepfake CEO Voice Case (2019): That was one of the first publicly reported examples of deepfake technology being used to commit a crime, as in this case criminals used AI to replicate the voice of a CEO and tricked an employee to send them 243,000 dollars.

These are only a few examples of whaling attacks, proving the effectiveness and the cost of such scams, which can use synthetic media.

How Deepfake Technology was used in the Whaling Attacks of Today

The even more dangerous new layer of cyberattacks involved deepfake technology to create believable audio-video simulations of real individuals with the help of AI. Now, the cybercriminals can use the technology to make video calls or voice messages that would appear and sound like genuine executives.

This implies that even an experienced employee might have troubles identifying fraud when the request apparently implies a familiar voice or face.

Whaling attacks along with deepfake technology have led to a metamorphosis of phishing frauds and it is no longer a crude correspondence similar to text but is a multimedia-based pseudo identification.

The Benefits of Deepfake Detection How Deepfake Detection Can Help

On the positive side, threats keep mutating and so do the defenses. Detection tools to check deepfake are also gaining relevance to block AI-related whaling fraudsters. These technologies make use of AI to interpret facial micro-expressions and audio discrepancy, data disparities in real-time video and audio feeds.

Other systems provide deepfake online detection capabilities that enable companies to scan the content received with online monitors or instruments (videos, voice messages, or even live video calls) in search of signs of manipulation. It is important to incorporate such tools into your security framework so as to authenticate identities and curb fraud via identity impersonation.

Whaling Attack Protection: Ways to Keep Your Business Safe

To ensure that your organization is not attacked by whalers you should employ a multi-level security mechanism. These are some of the important strategies:

1. Employee Training

Train everyone, particularly the top leadership on the indicators of whaling attacks.

Undertake simulated phishing tests on a regular basis.

Train your staff not to believe unreceived monetary demands, even if these requests seem one of the company.

2. Two-Factor Authentication (2FA)

Check requests sensitive in nature using an alternative channel of communication such as a phone call or physical meeting.

3. Integration of Deepfake Detection Deepfake

Find deepfake software on the internet to scan video calls and emails and detect AI-generated content.

Install the AI tools that will set flags on abnormal voice pitch, facial expression or digital footprint.

4. Email Authentication

Avail of anti-spoofing protocols such as SPF, DKIM and DMARC.

5. Access Controls

Make less important people have less access to sensitive information and financial systems.

Make sure that financial transactions need authorization by many people.

Conclusion

The risk of whaling attacks is on the increase especially with the emergence of deepfake technology. These attacks depend on human confidences and business hierarchal set up to carry out frauds that may run into millions of dollars. The good news? Awareness, training, and the target technologies, such as deepfake detection and online deepfake detection toolkits, will help you determine your risk largely.

This is because AI-driven fraud is an ever-evolving phenomenon; therefore, the only focus that can ensure one remains one step ahead is to be aware and active. You protect your business will empower your employee and do not allow the whales to become the prey.

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button