Deepfake

Powers: Hardware Manipulation, Social Engineering
Spying and Intelligence Gathering

A master of deception and technology, Deepfake utilizes social engineering, compromised hardware and insider infiltration to attack any vulnerabilities she can exploit in your company or its systems.

Powers:

Hardware Manipulation:

Once she gains access to your company’s physical hardware, she is able to deploy her infected
media and other hacking devices.

Social Engineering:

Deepfake is a master at getting employees to reveal sensitive information, and then using that
information to find weaknesses and loopholes, of which she can then use to steal your data and
gain unrestricted access to your entire network.

Spying and Intelligence Gathering:

Once she is inside your system, Deepfake will sell your company’s sensitive data and client
information to the highest bidder, or release your sensitive company information to the Dark
Web.

History:

In 2016, a hacker known as “Deepfake” targeted Gemini Industries with spear phishing emails masquerading as official communications from trusted sources. Deepfake tricked Gemini employees into disclosing their login credentials, providing her a means to access Gemini’s systems. Once inside, she remained undetected for years, during which she installed listening devices, and a backdoor, while deploying a cutting-edge wiper tool to remove all traces of her infiltration. Gemini claims she was able to steal large amounts of sensitive data, including confidential business documents, financial data, and private correspondence between board members.