Summary
In March 2025, a finance director at an unnamed multinational corporation (MNC) headquartered in Singapore was defrauded of US$499,000 (approximately SG$670,000) through a meticulously orchestrated deepfake video conference attack. Cybercriminals used artificial intelligence(AI) to generate real-time synthetic personas of the company's CFO and other senior executives, then hosted a live Zoom call with the finance director, convincing them to authorize a large wire transfer.
This case is one of the first of its scale in Southeast Asia and marks a turning point in corporate fraud. It did not involve a phishing email or a suspicious phone call, but a multi-participant live deepfake video conference that bypassed the traditional “seeing is believing” safeguard. Importantly, authorities in Singapore and Hong Kong responded swiftly and recovered the transferred funds before the fraud was fully completed.
⚠ WHY THIS MATTERS TO EVERY CFO
Traditional verification protocols, including video calls are no longer sufficient. By the time fraudsters ask for a second transfer of US$1.4 million, the first payment may already have been sent. This case shows clearly that deepfakes are no longer just a future risk they are a real and present danger for businesses today.
The targeted organisation is an unidentified multinational corporation with operations in Singapore and cross-border financial activities extending to Hong Kong. The company's name has not been publicly disclosed by Singapore authorities (consistent with privacy protections for corporate victims). Its finance function involved regular large-value intercompany and project-related wire transfers, a profile that made it an attractive target.
Fact | Details |
|---|---|
Target Organisation | Unnamed multinational corporation (MNC) |
Location | Singapore (with accounts in Hong Kong) |
Victim | Finance Director (role confirmed by Singapore Police Force |
Industry | Not publicly disclosed |
Nature of Fraud | AI-generated deepfake video conference-executive impersonation |
Reported By | Singapore Police Force (SPF), MAS, CSA -Joint Advisory, 12 March 2025 |
Attack Timeline & Methodology
Step-by-Step Reconstruction
The attack was multi-stage, psychologically sophisticated, and leveraged multiple channels to build trust before extracting funds. The following timeline is reconstructed from the Singapore Police Force advisory and corroborated by independent reporting from HRD Asia, Cyber Security Asia, and Reality Defender.
DATE | EVENT | DETAIL |
Early March | Reconnaissance & Preparation | Criminals harvest publicly available video footage of the company's CFO and executives from earnings calls, webinars, LinkedIn interviews, and press conferences to build deepfake training data. |
24 March 2025 | Initial Contact via WhatsApp | Finance director receives a WhatsApp message from an individual impersonating the company's CFO (UK-based). The message requests participation in an urgent, confidential Zoom video conference about a supposed regional business restructuring. |
25 March 2025 | Pre-Meeting Priming | Additional messages and a fabricated Non-Disclosure Agreement (NDA) and Board Letter are shared, signed by a scammer posing as the company's legal counsel, designed to legitimise the upcoming request. |
26 March 2025 | Live Deepfake Zoom Call | Finance director joins the Zoom call. Multiple participant: CFO, other senior executives appear on screen. Faces, voices, and body language are AI-generated in real-time from scraped public media. No technical anomalies are noticed. |
26 March 2025 | Fund Transfer Authorised | Under instruction from the fake executives, the finance director authorises a wire transfer of US$499,000 to a local Singapore corporate bank account. Funds are quickly routed to Hong Kong mule accounts. |
Shortly After | Second Transfer Demanded | Fraudsters escalate, demanding an additional transfer of approximately US$1.4 million (SG$1.9 million). The unusually large second request triggers suspicion in the finance director. |
Late March 2025 | Incident Reported | Finance director contacts the Anti-Scam Centre (ASC) in Singapore and the Hong Kong Police Force's Anti-Deception Coordination Centre (ADCC). Authorities act swiftly. |
Late March 2025 | Funds Frozen & Recovered | Singapore's ASC and Hong Kong's ADCC cooperate to trace and freeze the full US$499,000 in Hong Kong bank accounts before it could be further dispersed. Full recovery achieved. |
12 March 2025* | Joint Advisory Issued | SPF, MAS, and CSA issue a public Joint Advisory warning businesses of deepfake video call scams. (*Note: Advisory predates this incident's public disclosure, suggesting earlier cases triggered the warning.) |
The Deepfake Technology Used
The attackers used generative AI and deepfake video technology sourced from publicly available footage. Key technical characteristics of the attack included:
Real-time face and voice synthesis: The deepfakes ran live during the Zoom call, not as pre-recorded footage, a significant technological leap.
Multi-persona orchestration: Multiple deepfake identities participated simultaneously, CFO, other executives, and even a fake lawyer, creating a boardroom-level illusion.
Voice cloning accuracy: Each simulated executive's voice matched known speech patterns derived from public recordings.
Contextual scripting: Scammers used insider-sounding business language (restructuring, M&A, confidential acquisition) to reinforce authenticity.
Supporting documentation: Fake legal documents (NDA, Board Letter) were shared to reinforce the deception's paper trail.
🔍 HOW THEY BUILT THE DEEPFAKES
Every earnings call, investor day recording, LinkedIn video, and media interview your executives appear in becomes raw training data for attackers. The Singapore attackers needed only publicly available footage , no insider access required. 3 seconds of audio is sufficient for voice cloning using current commercial tools.
Financial Impact Analysis
Cost Category | Amount |
Initial Transfer Made | US$499,000 (~SG$670,000) |
Second Transfer Demanded | US$1,400,000 (~SG$1,900,000) |
Total Attempted Fraud | ~US$1,900,000 (~SG$2,570,000) |
Funds Recovered | US$499,000 (100% of transferred amount) |
Net Financial Loss | US$0 (full recovery- operationally rare outcome) |
Investigation & Response Costs | Not publicly disclosed |
Reputational/Insurance Impact | Not publicly disclosed |
While the full US$499,000 was recovered, this outcome is exceptional. The recovery was only possible because the finance director's suspicion was triggered by the second request and because Singapore-Hong Kong law enforcement cooperation moved within hours. In the majority of comparable global incidents, funds are dispersed and irrecoverable within 24–48 hours.
Control Failure Analysis
What Failed And Why?
This incident is instructive precisely because the finance director followed what were, until recently, best-practice verification steps. The failure was not negligence, it was that the threat evolved beyond existing control frameworks.
1. Video Verification as Final Check- Now Compromised
The widely taught counter-measure to Business Email Compromise (BEC) attacks is 'escalate to a video call to verify the requester.' This incident shows that video calls can no longer serve as a final verification step. The attackers aware that finance professionals had been trained to request video verification, proactively suggested the Zoom call themselves, weaponising the verification step.
2. Single-Channel Authentication
The finance director received the initial request via WhatsApp, was briefed via documents, and then confirmed via Zoom, all channels controlled by the attackers. There was no step that required the finance director to initiate contact with the real CFO through an independently verified number or email on file.
3. Absence of Out-of-Band Dual Authorisation
A second independent authoriser, physically present, or contacted via a pre-registered separate channel was not required. For a wire transfer of US$499,000, many financial governance frameworks would mandate dual sign-off, but this control either did not exist or was bypassed within the deepfake's false authority structure.
4. No Deepfake Detection Capability
Neither the Zoom platform nor the company's internal systems flagged the video call as containing AI-generated content. Commercial real-time deepfake detection tools existed at the time but were not deployed in this organisation's workflow.
🚨 CRITICAL INSIGHT
The most dangerous element of this scam was not the technology, it was the psychological engineering. Scammers knew that finance professionals had been warned about BEC emails and voice calls. They pre-empted verification by offering video confirmation themselves. The 'willingness to verify' created false confidence that exploited the very security culture meant to protect the victim.
Red Flags & Warning Signs
Indicators That Should Have Triggered Escalation
In retrospect, multiple warning signs were present. Awareness of these signals should form part of every finance team's ongoing training.
Red Flag | Why It Matters |
Unsolicited WhatsApp from 'CFO' | Senior executives rarely initiate large financial requests via personal messaging apps. WhatsApp is not a standard corporate communication channel for sensitive financial transactions. |
Urgency framing | The request was framed around a 'confidential restructuring' requiring rapid action, a classic pressure technique to reduce scrutiny time. |
Confidentiality demand | Requests to keep the transaction secret from other colleagues or processes are a hallmark of social engineering. |
New or unusual bank account | The transfer destination was a local Singapore corporate account not a known company account. New payees should always trigger enhanced verification. |
Legal documentation pre-shared by scammers | Legitimate legal agreements are generated through internal counsel, not arrived pre-packaged from an external party initiating a call. |
Multi-party Zoom call initiated by requester | The scammers proactively offered a video call, reversing the expected flow where the finance team would initiate verification independently. |
Second escalating request | The demand for a further US$1.4 million, significantly larger, is characteristic of scam escalation once an initial transfer is secured. |
Cross-border routing of funds | Post-transfer, funds moved rapidly to Hong Kong accounts, a pattern consistent with money mule networks. |
Lessons Learned & Root Cause
Root Cause Analysis
The root cause is the intersection of two converging factors:
(1) the commoditisation of real-time deepfake technology that has made multi-person video impersonation accessible to criminal networks, and
(2) the absence of control frameworks that account for compromised video verification. Security postures built for Business Email Compromise and voice-only fraud are structurally inadequate against live video deepfake attacks.
Key Lessons for Finance and Treasury Teams
Video verification is not enough: A video call confirming an executive's identity can no longer serve as a standalone authorisation step for large transfers.
Pre-shared materials are not authentication: Receiving a legally formatted NDA or board resolution via email or messaging does not constitute verification that the request is genuine.
Urgency and confidentiality are manipulation tools: Any request that discourages normal process compliance should increase not decrease scrutiny.
Attackers study your defences: Scammers in 2025 are aware of BEC training materials. They are engineering attacks that defeat trained responses. Training must evolve continuously.
Recovery is the exception: The US$499,000 was recovered because of exceptional cross-border law enforcement speed. Assume funds are unrecoverable once transferred.
Public media creates attack material: Every executive video appearance generates deepfake training data. Digital presence management is now a security consideration.
Cost-Benefit Analysis of Controls
Control | Estimated Cost |
Callback verification protocol | Low (policy + training, <SG$5,000) |
Dual authorisation upgrade | Low-Medium (process redesign, <SG$20,000) |
Finance team deepfake training | Low (SG$5,000–15,000/year) |
Real-time deepfake detection software | Medium (SG$30,000–100,000/year) |
Payment fraud cyber insurance rider | Variable (premium-dependent) |
Annual red team simulation | Medium (SG$20,000–50,000) |
A full control stack addressing deepfake threats can be implemented for under SG$200,000 annually, a fraction of the SG$670,000 targeted in this incident, and negligible against the potential US$1.9 million total exposure had the scam fully succeeded.

