spot_img

Date:

Share:

Kaspersky: Deepfake services now 400 times cheaper

Kaspersky’s Global Research and Analysis Team (GReAT) have uncovered adverts on the darknet offering real-time video and audio deepfake services. Prices reportedly start at $50 for fake videos and $30 for fabricated voice messages, with costs rising based on the complexity and duration of the content. These findings were made after analysing multiple Russian- and English-language platforms.

Previously, Kaspersky had identified deepfake creation services on darknet platforms which ranged from $300 to $20,000 per minute. Unlike these previous services, the current offerings allow threat actors to generate fake audio and video content in real-time at a fraction of the price. The adverts feature several options, including real-time face swapping during video calls on videoconference platforms or messengers, face replacement for verification, and camera feed replacement on devices.

The authors of the posts claim that they can provide software that syncs a person’s facial expressions in a video with text, even in foreign languages, along with tools for voice cloning and for adjusting tone and timbre to convey specific emotions. However, it is quite likely that many of these adverts are scams intended to defraud interested buyers.

“We are not only seeing ads offering ‘deepfake-as-a-service,’ but also a clear demand for these tools. Malicious actors are actively experimenting with AI and incorporating it into their operations. Some platforms feature more sophisticated capabilities: for instance, malicious LLMs created entirely from scratch, independent of publicly available models, which run locally. While these technologies do not introduce fundamentally new cyber threats, they can significantly enhance cyber attackers’ capabilities. In this context, cybersecurity experts must work hard to counter these threats. One of the most promising ways to meet this challenge is to leverage AI to boost both the productivity of security professionals and the effectiveness of defensive measures,” comments Dmitry Galov, head of the Kaspersky Global Research and Analysis Team in Russia and CIS.

To stay safe, Kaspersky recommends:

  • Ensuring your company has effective cybersecurity measures in place, not just protective solutions, but also skilled IT specialists. Use Kaspersky Threat Intelligence to identify threats that could impact your business.
  • Making sure employees understand deepfakes and why they are a serious threat and provide regular training on how to spot them. The Kaspersky Automated Security Awareness Platform can help boost digital literacy.
  • Teaching staff to recognise key signs of deepfakes: jerky movements, inconsistent lighting between frames, unnatural skin tones, unusual or missing blinking, image distortions, and videos intentionally shot in low quality or poor lighting. 
spot_img
spot_img

━ More like this

AI Has Turned Biometric Security Into a Fraud Target, New Data Shows

New data shows nearly 9 in 10 failed identity checks in Southern Africa are linked to AI-driven impersonation.  The systems designed to verify identity and...

Online scam exposure remains widespread despite high levels of self-assurance, Kaspersky reports

A recent Kaspersky survey highlights a considerable gap between consumers’ confidence in identifying online scams and their actual exposure to cyber threats. According to...

Identity under siege: The new order of security in 2026

The threat model has changed as artificial intelligence lowers the barrier to entry for cybercrime. Attack velocity and threat veracity have increased exponentially. Impersonation...

High-severity incidents at a minimum: Kaspersky experts reveal a steady decline over the years

According to the ‘Anatomy of a Cyber World: Global Report by Kaspersky Security Services’, there has been a noticeable decline in the percentage of high-severity incidents...

Kaspersky discovers new SparkCat variant bypassing App Store and Google Play security

 Kaspersky has identified a new variant of the SparkCat Trojan in the App Store and in Google Play — a year after the crypto-stealing...
spot_img