Deepfake scam targets password manager LastPass


The password manager giant with over 25 million users has been targeted by a deepfake call impersonating the company’s CEO.

In a blog post, LastPass admitted that it experienced an attempted deepfake attack. One of the company’s employees received a series of calls, texts, and at least one voicemail featuring an audio deepfake from a threat actor impersonating the company’s CEO, Karim Toubba, on WhatsApp.

WhatsApp wasn’t a commonly used communication channel, so it aroused suspicion. The employee reported the incident to the security team, which said that it had no impact on the company’s overall security.

ADVERTISEMENT

LastPass has previously reported a couple of other security incidents. In 2022, the password manager admitted to being hacked. An attacker exfiltrated portions of the company’s internal data that were later used to gain access to customer data.

LastPass deepfake call
Deepfake call attempts. Source: LastPass

Deepfakes are a rising concern globally. The technology uses generative AI to augment audio and/or visual samples of an individual to create fabricated videos or audio. A study by University College London showed that humans’ ability to spot these hoaxes is currently limited, posing huge security risks.

In February, fraudsters used deepfake technology to arrange a bogus video conference call and elaborately trick a finance worker at a multinational firm into paying out $25 million.

While deepfakes are often circulating on social media platforms, big tech companies acknowledge the threat that the technology poses. At least 20 big tech companies, including Google, Meta Platforms, Microsoft, and OpenAI, have signed on to a new ‘tech accord’ aimed at preventing the distribution of deceptive AI content during the 2024 global election cycle.