Reported Audio Deepfake Impersonating CEO Karim Toubba Targets LastPass Employee via WhatsApp
April 10, 2024
A LastPass employee was reportedly targeted by an audio deepfake impersonating CEO Karim Toubba via WhatsApp. The message used voice-cloning AI in a social engineering attempt to create urgency and bypass security protocols. The employee recognized red flags, reported the incident, and no breach occurred. LastPass shared the incident publicly to raise awareness about deepfake-driven fraud campaigns targeting executives and companies.
- Alleged deployer
- unknown-scammers, unknown-scammer-impersonating-karim-toubba
- Alleged developer
- unknown-deepfake-technology-developers, unknown-voice-cloning-technology-developers
- Alleged harmed parties
- karim-toubba, lastpass-employee, employees-of-lastpass, general-public
Source
Data from the AI Incident Database (AIID). Cite this incident: https://incidentdatabase.ai/cite/1100
Data source
Incident data is from the AI Incident Database (AIID).
When citing the database as a whole, please use:
McGregor, S. (2021) Preventing Repeated Real World AI Failures by Cataloging Incidents: The AI Incident Database. In Proceedings of the Thirty-Third Annual Conference on Innovative Applications of Artificial Intelligence (IAAI-21). Virtual Conference.
Pre-print on arXiv · Database snapshots & citation guide
We use weekly snapshots of the AIID for stable reference. For the official suggested citation of a specific incident, use the “Cite this incident” link on each incident page.