Criminal Group Uses AI Deepfake Technology to Steal Personal Data in Hangzhou, Zhejiang

September 13, 2024

A criminal group in China leveraged deepfake AI technology to bypass face recognition systems, breach accounts, and steal personal data, reportedly earning 200,000 yuan. The Group generated convincing video simulations from static photos. After an investigation by the Hangzhou Public Security Bureau, four suspects were arrested across Anhui, Guizhou, and Zhejiang provinces.

This incident highlights the need for responsible AI governance and trustworthy AI practices to prevent harm. By joining Project Cerebellum, you can help us establish guardrails for AI and contribute to a safe and secure AI ecosystem. Map this incident with HISPI Project Cerebellum TAIM (Measure function) to enhance our understanding of such threats and collaborate in finding solutions.
JOIN US

Matched TAIM controls

Suggested mapping from embedding similarity (not a formal assessment). Browse all TAIM controls

Alleged deployer
hu-mouyun, hu-mouliang, zhang-mouguo, wu-mouhao
Alleged developer
unknown-deepfake-detection-technology-developers
Alleged harmed parties
chinese-citizens, zhejiang-citizens, anhui-citizens, guizhou-citizens

Source

Data from the AI Incident Database (AIID). Cite this incident: https://incidentdatabase.ai/cite/806

Data source

Incident data is from the AI Incident Database (AIID).

When citing the database as a whole, please use:

McGregor, S. (2021) Preventing Repeated Real World AI Failures by Cataloging Incidents: The AI Incident Database. In Proceedings of the Thirty-Third Annual Conference on Innovative Applications of Artificial Intelligence (IAAI-21). Virtual Conference.

Pre-print on arXiv · Database snapshots & citation guide

We use weekly snapshots of the AIID for stable reference. For the official suggested citation of a specific incident, use the “Cite this incident” link on each incident page.