Cyber Intelligence

Linkedin
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map
Reading: From deepfakes to in-person fraudsters
Share
Cyber IntelligenceCyber Intelligence
Aa
  • News
  • Analysis
  • Expert Opinions
  • Resources
Search
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map

Cyber Intelligence

Linkedin
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map
Reading: From deepfakes to in-person fraudsters
Share
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
AerospaceExpert OpinionsCybersecurity Executives

From deepfakes to in-person fraudsters

Tony Glover
March 17, 2025 at 10:56 AM
By Tony Glover Tony Glover
Share
Sean Murphy, CISO at BECU
SHARE
Sean Murphy, CISO or BECU
Sean Murphy, CISO of the Boeing Employees’ Credit Union (BECU)

Boeing Employees’ Credit Union (BECU) is a not-for-profit credit union based in Washington, dedicated to improving the financial well-being of its members and communities. It has grown beyond serving Boeing’s employees to more than 1.5 million members and $29 billion in assets. In an exclusive interview, Sean Murphy, Chief Information Security Officer (CISO) at BECU, explains the changing cyber-threats now facing consumers.

Cyber Intelligence: Can you outline the current cybersecurity challenge for BECU and its members?

Sean Murphy: The cybersecurity challenges faced by all consumers have escalated with the growth of artificial intelligence (AI). We have witnessed the growing use of botnets, and AI is at such a stage that it can be used to attempt to gain access to accounts on an individual level. The use of virtual private networks (VPNs) simplifies this process and makes it difficult to track. Remember – while organizations are constantly monitoring for threats and attacks, the cybercriminals only have to get it right one time to cause a highly damaging breach. Advanced persistent threats (APTs) have now become a major ongoing threat. Financial institution employees are the first line of defense against cyber attackers and play a key role in protecting consumers. As such, a robust cybersecurity team and the regular training of employees is crucial.

Cyber Intelligence: What form do these threats take?

Sean Murphy: Persistent attacks are now being executed not only online but also physically. BECU has experienced attempts at fraud where the fraudster has actually come into our credit union locations in person with a set of fake credentials in order to scam us. Our neighborhood locations have now become part of the security frontline.

Cyber Intelligence: Does this physical element represent a new trend?

Sean Murphy: I think what we are seeing is an increasing overlap between cybersecurity and physical security. Criminals have always incorporated new technologies into existing crimes. A century ago, they started using telephones to assist in carrying out financial fraud and began performing more sophisticated robberies. Today they use the internet to help perpetrate these crimes.

Cyber Intelligence: And how about plain old-fashioned cybercrime?

Sean Murphy: New online fraud techniques are now evolving at a staggering pace. Deepfake voice calls are just one example. Organizations and individuals are being called by what sounds like a trusted colleague, friend, or family member and asked to transfer funds urgently. Cybercriminals are now also moving towards deepfake video calls, which are increasingly difficult to identify – even for experts. The growth of artificial intelligence has made it easier for criminals to clone voices to create almost perfect requests that sound just like people the victim may know. As much as you can, look for signs of the use of AI including typos in written communication or an inconsistent tone or cadence in a conversation, and trust your gut if something feels “off.”

Cyber Intelligence: How serious a threat have deepfake voice scams become?

Sean Murphy: They are a very serious threat indeed. In 2023 alone, the US lost $2.7 billion to imposter scams. These included scammers pretending to be the government, a bank’s fraud department, a technical support expert, or a distressed friend or relative. Fraudsters get hold of examples of a person’s real voice and use widely available off-the-shelf AI tools to use those voice patterns to create synthetic conversations, copying and manipulating the victim’s voice. Even a small number of recorded words from a voice recording is enough for AI tools to successfully imitate a person’s voice. Short audio clips can be pulled from content posted online on social networks such as TikTok or Instagram. All the fraudster has to do is type words for the Darknet-acquired tool to repeat in the cloned voice.

Cyber Intelligence: How do you make your members aware of the growing threats?

Sean Murphy: We always try to give timely and topical advice to our 1.5 million members in the US. For example, we always tell them to be aware of emails or calls that purport to be urgent. We advise them to step back and take a pause—BECU will never call them asking for confidential information or payment. We also have a dedicated Fraud & Cybersecurity Center as a learning resource for members on fraud and scam-related topics.

Cyber Intelligence: Can you give an example of a current new threat now facing your members in 2025?

Sean Murphy: We are in the midst of tax season, which is a window of opportunity for online fraudsters and we are advising our members on what to look out for in the form of scattergun and targeted cyber-attacks. We give a clear list of things they should do if they believe they are engaging with fraudsters and cybercriminals. If needed, they can also directly contact an individual BECU representative to get advice.

Cyber Intelligence: Thank you.

TAGGED: deepfake, ciso, financial fraud, advanced persistent threats, cybercrime, physical cybersecurity, phishing, sean murphy, fraud, Chief Information Security Officer, artificial intelligence, scattergun, brand impersonation, cybersecurity insights
Share This Article
Twitter LinkedIn Email Copy Link Print
Previous Article uk defense ministry lost mobile phones UK defence ministry ‘loses’ 269 phones
Next Article california cryobank cyber breach Sperm Bank Heist
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Editor's Pick

You Might Also Like

SpywareNews

Spyware poses a growing threat

“Lurking in the murky depths of the global marketplace for offensive cyber capabilities sits a particularly dangerous capability—spyware,” warns the Atlantic Council, a Washington, DC-based organization that promotes transatlantic cooperation and global economic prosperity. The number of US-based entities investing in the spyware market is three times greater than in the next three-highest countries with the most investors, according to a report published by the Atlantic Council on September 10: Mythical Beasts: Diving into the depths of the global spyware market.

September 12, 2025
CybergangsNews

Teenage hackers take down JLR

Carmaker Jaguar Land Rover (JLR) has shut down its systems after suffering a cyber-attack. The group claiming responsibility for the attack, The Com, also referred to as Scattered Spider, is a loosely affiliated online community of predominantly teenage English-speaking hackers based in the UK and the US.

September 5, 2025
Cyber EspionageGovernmentGeopoliticsNews

Over half of cyber-attacks are state-sponsored

Over half of cyber-attacks exploiting known vulnerabilities are the work of state-sponsored groups from abroad, mainly from China. According to cybersecurity company Recorded Future’s research arm, Insikt Group, 53 percent of observed exploitation activity in the first half of this year was driven by state-sponsored and suspected state-sponsored actors and conducted for espionage, surveillance, or other geopolitical objectives.

September 2, 2025
ChinaCyber EspionageSurveillanceSpywareNews

China is now spying on you

The Chinese government now has a vast storehouse of confidential information belonging to key industries and individuals in the US and UK and many other countries. According to an urgent joint cybersecurity advisory issued by the US National Security Agency (NSA) and other U.S. and foreign organizations, threat actors sponsored by the Chinese government, notably Salt Typhoon, have been consistently targeting telecommunications, government, transportation, lodging, and military infrastructure networks globally.

August 29, 2025

Cyber Intelligence

We provide in-depth analysis, breaking news, and interviews with some of the leading minds in cybersecurity and distill critical insights that matter to our readers. Daily.

Linkedin

Category

  • Cybercrime
  • News

Quick Links

  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map

© 2023 Cyberintel.media

Welcome Back!

Sign in to your account

Lost your password?