-
Featured services
Think beyond the robots
The successful integration of AI and IoT in manufacturing will depend on effective change management, upskilling and rethinking business models.
Read the blog -
Services
Leverage our capabilities to accelerate your business transformation.
-
Services
Network Services
Popular Products
-
Services
Cloud
Popular Products
-
Cloud Architecture and Modernization
Discover how to achieve your business goals through cloud modernization practices, that deliver improved agility, reusability and scalability.
-
Cloud Optimization
Discover how to maximize operational excellence, business continuity and financial sustainability through our cloud-advanced optimization services.
-
-
Services
Consulting
-
-
Services
Data and Artificial intelligence
-
Services
Technology Solutions
Client stories
-
Services
Global Data Centers
-
Services
CX and Design
-
Services
Application Services
-
Services
Sustainability Services
-
Services
Digital Workplace
-
Services
Business Process Services
Master your GenAI destiny
We’ll help you navigate the complexities and opportunities of GenAI.
Explore GenAI -
-
-
Insights
Recent Insights
-
The Future of Networking in 2025 and Beyond
-
Using the cloud to cut costs needs the right approach
When organizations focus on transformation, a move to the cloud can deliver cost savings – but they often need expert advice to help them along their journey
-
Make zero trust security work for your organization
Make zero trust security work for your organization across hybrid work environments.
-
-
Master your GenAI destiny
We’ll help you navigate the complexities and opportunities of GenAI.
Explore GenAI -
-
Master your GenAI destiny
We’ll help you navigate the complexities and opportunities of GenAI.
Explore GenAI -
Discover how we accelerate your business transformation
-
About us
CLIENT STORIES
-
Liantis
Over time, Liantis – an established HR company in Belgium – had built up data islands and isolated solutions as part of their legacy system.
-
Randstad
We ensured that Randstad’s migration to Genesys Cloud CX had no impact on availability, ensuring an exceptional user experience for clients and talent.
-
-
CLIENT STORIES
-
Liantis
Over time, Liantis – an established HR company in Belgium – had built up data islands and isolated solutions as part of their legacy system.
-
Randstad
We ensured that Randstad’s migration to Genesys Cloud CX had no impact on availability, ensuring an exceptional user experience for clients and talent.
-
-
Sponsorships
CLIENT STORIES
-
Liantis
Over time, Liantis – an established HR company in Belgium – had built up data islands and isolated solutions as part of their legacy system.
-
Randstad
We ensured that Randstad’s migration to Genesys Cloud CX had no impact on availability, ensuring an exceptional user experience for clients and talent.
-
Everest Group PEAK Matrix® Assessment
NTT DATA is a Leader and Star Performer in the Everest Group Sustainability Enablement Technology Services PEAK Matrix® Assessment 2024.
Get the Everest report -
- Careers
The real danger of deepfakes
13 November 2019

Topics in this article
In the future, deepfakes will bring cyberattack scenarios to a whole new dimension. Since there are no mature technical defense mechanisms currently available, organizations must be extremely cautious and recognize the potential risks.
Deepfake videos first appeared on a large scale in 2017, with fake videos of Hollywood stars like Scarlett Johansson, Emma Watson and Nicolas Cage spreading online quickly. And even politicians were not spared by deepfakes, such as Angela Merkel who suddenly takes on the features of Donald Trump in a speech.
Deepfakes, derived from the terms deep learning and fake, refer to manipulated media content such as images, videos or audio files. The technologies behind it, such as artificial intelligence and machine-learning algorithms, have developed rapidly in recent times, make it almost impossible to distinguish between original and counterfeit content.
What’s concerning is that deepfakes are getting better, and it's getting harder and harder to recognize them. It won’t be long before we see their impact on businesses. The potential attack scenario ranges from taking on identities to blackmailing companies.
The following three deepfake-based attack methods are likely:
- C-Level fraud: It's the most prominent method. As a result, fraudsters no longer seek to persuade an organization’s employee with a fake email to transfer money, but a call that makes the caller sound the same as the CFO or CEO.
- Extorting companies or individuals: With deepfake technology, faces and voices can be transferred to media files that show people making fake statements. For example, a video could be produced with a CEO announcing that a company has lost all customer information or that the company is about to go bankrupt. With the threat of sending the video to press agencies or posting it on social networks, an attacker could blackmail a company.
- Manipulation of authentication methods: Likewise, deepfake technology can be used to circumvent camera-based authentication mechanisms, such as legitimacy checks through tools such as Postident.
In principle, however, all attacks based on an attacker posing as someone else virtually – for example, on the phone, email, or video message – can be enhanced by deepfake technology and become much harder to see. Thus, it is quite conceivable that deepfakes are also used for attacks on private individuals.
The danger that deepfakes bring will become much more significant in the future – at the latest in 2019 – as the machine learning methods used will be further optimized and the realization of deep fakes will no longer be a time and cost consuming challenge.
For example, video deepfakes can be created using tools freely available on the internet. All you need is a webcam for around EUR 80, a green screen for around EUR 90 and a graphics card for around EUR 1,000.
Even an audio deepfake is now easy to realize. In the past, a model had to be created using voice data of at least five hours in length. Today, there are publicly available tools that allow you to synthesize new voices based on an existing model with just one minute of audio.
So how can companies prepare for the rise in deepfake attacks?
Most companies do not yet know about the deepfake attack risks because it's a whole new type of attack under radar. One can only create awareness in the company that such attacks are possible. It also means saying goodbye to familiar truths – for example, the voice on the phone at the other end of the line might not also be the person that owns that voice.
Although there are currently no technical defense mechanisms available, programs to detect deepfakes are being worked on. In some cases, they are even just about ready for the market. Furthermore, NTT Ltd. is looking to develop capabilities with manufacturers of such applications in this area.
In the meantime, however, we are already working closely with organizations to support them through extensive security awareness training and interactive training courses. These address the importance topics around cybercrime risk, including CEO fraud, management hacks and, last but not least, deepfake threats.