Fraud
Facilitating fraud, cheating, forgery, and impersonation scams
ENTITY
1 - Human
INTENT
1 - Intentional
TIMING
2 - Post-deployment
Risk ID
mit271
Domain lineage
4. Malicious Actors & Misuse
4.3 > Fraud, scams, and targeted manipulation
Mitigation strategy
1. Mandate Independent Verification and Dual-Control Protocols: Establish a strict, non-waivable policy requiring independent, out-of-band verification (e.g., via a pre-established, trusted channel or a known internal directory number) for all requests involving financial transfers, sensitive data disclosure, or critical account modifications. This must be complemented by the implementation of dual-control mechanisms, such as mandatory secondary approval or segregation of duties, for all high-risk transactions to mitigate the threat of single-point social engineering failure. 2. Deploy Comprehensive, Phishing-Centric Awareness Training: Institute a mandatory, recurrent training program focused on enhancing human detection capabilities against advanced social engineering attacks, specifically AI voice deepfakes (vishing) and urgency-based pressure tactics. Training content must be continuously updated to cover recognition of red flags (e.g., robotic artifacts, unnatural pauses, unfamiliar communication channels) and reinforce the organizational culture of professional skepticism and immediate incident reporting. 3. Implement Strong, Adaptive Identity and Access Management Controls: Standardize the deployment of phishing-resistant Multi-Factor Authentication (MFA), such as FIDO2 security keys or certificate-based authentication, across all privileged and high-value accounts. This should be integrated within a Zero Trust architecture, supported by continuous threat monitoring and specialized anti-deepfake or identity-assurance tools that analyze acoustic features, login anomalies, and device metadata to detect synthetic or compromised identities in real-time.
ADDITIONAL EVIDENCE
Example: Impersonating a trusted individual’s voice to scam them (e.g. providing bank details) (Verma, 2023)*; (Krishnan, 2023)*