Deepfakes

When deception becomes reality

Authors

DOI:

https://doi.org/10.64059/eiu.v4i4.89

Keywords:

Deepfakes, Social Engineering, Cybersecurity, Synthetic Media, Voice Cloning, Hybrid Defense

Abstract

The cybersecurity landscape is undergoing a radical transformation with the emergence of "Social Engineering 2.0.". Attacks no longer rely solely on text manipulation but have expanded to employ generative artificial intelligence techniques, specifically "deepfakes," to create hyper-realistic audio-visual media. This research paper aims to analyze the risks arising from the integration of deepfakes in social engineering attacks, focusing on the current shortcomings of traditional defense mechanisms that fail to detect deepfakes in compressed environments and live communication channels. Through a critical review of recent literature and the proposal of a hybrid defense framework, the study discusses the importance of combining automated technical analysis with human behavioral verification. The findings conclude that technical solutions alone are insufficient in light of the development of competitive generative networks (GANs), recommending the adoption of "zero trust" strategies and out-of-band verification as essential for protecting institutional and societal assets in the age of artificial media.

References

Abdulazeez, A., & George, T. (2025). Partial Fake Speech Attacks in the Real World Using Deepfake Audio. Journal of Cybersecurity and Privacy, 5(1), 6. https://doi.org/10.3390/jcp5010006

Federal Bureau of, I. (2021). Malicious Actors Almost Certainly Will Leverage Synthetic Content for Cyber Operations

FBI Private Industry Notification.

Grillo, G. (2025). Deepfake and Generative AI: Legal Challenges and Technical Strategies for Detection and Prevention Politecnico di Torino].

Ian, G., Jean, P.-A., Mehdi, M., Bing, X., David, W.-F., Sherjil, O., Aaron, C., & Yoshua, B. (2014). Generative Adversarial Nets.

Kristoffer Torngaard, P., Lauritz, P., Tobias, S., Maria, P., Gaurav, C., & Nicola, D. (2025). Deepfake-Driven Social Engineering: Threats, Detection Techniques, and Defensive Strategies in Corporate Environments. Journal of Cybersecurity and Privacy, 5(2), 18. https://doi.org/10.3390/jcp5020018

Mika, W. (2019). The Emergence of Deepfake Technology: A Review. Technology Innovation Management Review, 9(11), 39-52. https://doi.org/10.22215/timreview/1282

Samer Hussain, A.-k., Hassan Hadi, S., Adil Ibrahim, K., & Israa Adnan, M. (2023). Impact of Deepfake Technology on Social Media: Detection, Misinformation and Societal Implications. The Eurasia Proceedings of Science, Technology, Engineering & Mathematics (EPSTEM), 23, 429-441. https://doi.org/10.55549/epstem.1371792

Shruti, A., Hany, F., Yuming, G., Mingming, H., Koki, N., & Hao, L. (2019). Protecting World Leaders Against Deep Fakes.

Sinisa, M. (2025, January 7). How AI and deepfakes are redefining social engineering threats. https://www.helpnetsecurity.com/2025/01/07/ai-deepfakes-social-engineering-threats/

Siva Krishna, J. (2025). Social Engineering 2.0 Deepfake and Deep Learning-Based Cyber-Attacks (Phishing). International Journal For Multidisciplinary Research (IJFMR), 7(1). https://doi.org/10.36948/ijfmr.2025.v07i01.35527

Yisroel, M., & Wenke, L. (2021). The Creation and Detection of Deepfakes: A Survey. ACM Computing Surveys (CSUR), 54(1), 1-41. https://doi.org/10.1145/3425780

معروف, م. غ. (2022a). أثر تقنيات التزييف العميق على الأمن السيبراني: دراسة تحليلية للتهديدات وآليات المواجهة. مجلة الدراسات التقنية.

معروف, م. غ. (2022b). تحديات كشف التزييف العميق في الفيديوهات المضغوطة: دراسة تجريبية. الرياض، السعودية.

Unknown Author. (2022). The Impact of Deepfake Technologies on Cybersecurity: An Analytical Study of Threats and Countermeasures. Journal of Technical Studies.

Unknown Author. (2022). Challenges of Detecting Deepfakes in Compressed Videos: An Experimental Study. Riyadh, Saudi Arabia.

Downloads

Published

2025-12-31

How to Cite

Algabri, M. ., Faqya, M. I. ., Almofari, N. H. ., & Mohamadi, R. . (2025). Deepfakes: When deception becomes reality. Emirates International University Journal, 4(4), 189-207. https://doi.org/10.64059/eiu.v4i4.89