Back to Case Studies
Prevented Company Video Deepfake

WPP Narrowly Avoids Deepfake CEO Scam on Microsoft Teams Call

Incident Date January 2024
Victim Type Company
Attack Type Video Deepfake
Financial Impact prevented

Summary

Global advertising giant WPP narrowly avoided a sophisticated deepfake CEO scam when fraudsters created a fake WhatsApp account posing as CEO Mark Read and organized a Microsoft Teams meeting with deepfake video and audio. The attack aimed to solicit confidential information and authorize financial transfers.

Key Takeaways

  • WPP successfully prevented financial losses from a sophisticated deepfake CEO scam that used AI-generated video and audio impersonation on Microsoft Teams
  • The attack began with fraudsters creating a fake WhatsApp account impersonating WPP CEO Mark Read before escalating to a deepfake video call
  • The deepfake technology was sophisticated enough to create realistic visual and audio impersonations that could have fooled employees into authorizing financial transfers
  • The incident forced WPP to invest in enhanced security measures and employee training to address AI-powered fraud attempts
  • The AI Defense Suite's combination of Agent Safe phishing protection, Location Ledger verification, and Proof of Life authentication could have immediately exposed the multi-platform deception

Timeline

The Setup Early January 2024

Fraudsters created a convincing fake WhatsApp account impersonating WPP CEO Mark Read. This initial impersonation established credibility and provided a trusted communication channel to arrange a subsequent video call.

The Attack January 2024

The criminals organized a Microsoft Teams meeting using sophisticated deepfake technology to create realistic video and audio impersonations of Mark Read. During the call, the fake CEO attempted to extract confidential company information and authorize financial transfers.

The Impact Same day

WPP employees were initially deceived by the convincing deepfake impersonation during the Teams call. The sophisticated technology created a realistic audio-visual representation that could have compromised sensitive corporate data and finances.

The Discovery During the call

WPP staff identified inconsistencies or suspicious elements in the deepfake CEO's behavior or requests during the Microsoft Teams meeting. The company's vigilance and verification protocols helped expose the fraudulent impersonation attempt.

The Fallout Days later

The incident highlighted the evolving threat landscape where criminals combine traditional CEO fraud with cutting-edge AI technology. WPP likely implemented enhanced verification procedures for executive communications and financial authorization requests.

Attack Details

The attack began with fraudsters creating a convincing fake WhatsApp account that appeared to belong to WPP CEO Mark Read. This initial impersonation established credibility and provided a communication channel to arrange the subsequent video call.

The criminals then organized a Microsoft Teams meeting, where they deployed sophisticated deepfake technology to create both realistic video and audio impersonations of the CEO. The deepfake was convincing enough to visually and audibly resemble Mark Read, demonstrating the advanced nature of the synthetic media technology used.

During the Teams call, the fake CEO attempted to extract confidential company information and authorize financial transfers. The request for sensitive data and money movement represented the core objective of the fraud, following a pattern common in business email compromise (BEC) attacks but elevated with deepfake technology.

The sophistication of this attack highlights how criminals are adapting traditional CEO fraud schemes by incorporating cutting-edge AI technology. By combining familiar platforms like WhatsApp and Teams with deepfake impersonation, the attackers created a multi-layered deception designed to exploit trust in both technology and executive authority.

Damage Assessment

While WPP successfully prevented financial losses by detecting the fraud attempt, the incident exposed significant vulnerabilities in the company's verification processes for virtual meetings. The attack demonstrated how easily criminals can now impersonate executives using readily available deepfake technology, potentially putting any organization at risk.

The reputational impact, while minimal due to the prevented nature of the attack, still required WPP to address security concerns and implement new verification protocols. The incident highlighted the growing threat that deepfake technology poses to corporate communications and decision-making processes.

Beyond immediate concerns, the attack forced WPP to invest resources in enhanced security measures and employee training to prevent similar attempts in the future. The company's response indicates the substantial operational changes required to address the evolving landscape of AI-powered fraud attempts.

How The AI Defense Suite Tools Could Have Helped

The AI Defense Suite's multi-layered approach could have immediately exposed this sophisticated attack. Agent Safe's 9-tool MCP security suite would have detected the initial WhatsApp impersonation attempt and flagged the suspicious Teams meeting request as a potential BEC attack, protecting employees from social engineering across messaging platforms. Location Ledger's blockchain-anchored GPS recording would have provided definitive proof that CEO Mark Read was not participating in the fraudulent Teams call, automatically capturing his actual whereabouts every 15 minutes with immutable timestamps. Proof of Life's biometric-verified "Proofies" could have enabled the real CEO to instantly prove his identity and location through Face ID or Touch ID authenticated selfies, creating blockchain-timestamped evidence that he was elsewhere during the attack. The combination of Agent Safe's phishing detection, Location Ledger's location verification, and Proof of Life's human authentication would have created multiple layers of protection against this deepfake impersonation scheme.

Key Lessons

  • Implement mandatory identity verification protocols for virtual meetings involving confidential information or financial decisions
  • Train employees to recognize deepfake technology and remain skeptical of unusual requests, even from apparent executives
  • Establish out-of-band verification procedures requiring confirmation through separate communication channels
  • Deploy comprehensive AI defense tools including phishing detection, location verification, and biometric authentication to counter sophisticated impersonation attacks

Frequently Asked Questions

How did the WPP deepfake scam work?

Fraudsters created a fake WhatsApp account impersonating WPP CEO Mark Read, then organized a Microsoft Teams meeting using sophisticated deepfake technology to create realistic video and audio impersonation. The fake CEO attempted to extract confidential information and authorize financial transfers during the call.

What damage did WPP suffer from the deepfake CEO fraud?

WPP successfully prevented financial losses by detecting the fraud attempt before any money was transferred. However, the company had to invest in enhanced security measures, employee training, and new verification protocols to prevent similar attacks in the future.

How can companies prevent deepfake CEO scams like the WPP incident?

Companies should implement comprehensive AI defense measures including Agent Safe for phishing detection across messaging platforms, Location Ledger for blockchain-verified location proof, and Proof of Life for biometric authentication. These tools work together to detect impersonation attempts, verify executive whereabouts, and prove human identity during critical communications.

What platforms did the WPP deepfake scammers use?

The scammers used WhatsApp to initially impersonate the CEO and establish credibility, then organized the actual deepfake video call through Microsoft Teams. This multi-platform approach created a layered deception that appeared more legitimate to potential victims.

Sources

deep fakesvideo deepfakeexecutive fraudcorporate scamai defense suiteagent securityproof of lifephishing bec