#FactCheck - "Deepfake Video Falsely Claims Justin Trudeau Endorses Investment Project”
Executive Summary:
A viral online video claims Canadian Prime Minister Justin Trudeau promotes an investment project. However, the CyberPeace Research Team has confirmed that the video is a deepfake, created using AI technology to manipulate Trudeau's facial expressions and voice. The original footage has no connection to any investment project. The claim that Justin Trudeau endorses this project is false and misleading.

Claims:
A viral video falsely claims that Canadian Prime Minister Justin Trudeau is endorsing an investment project.

Fact Check:
Upon receiving the viral posts, we conducted a Google Lens search on the keyframes of the video. The search led us to various legitimate sources featuring Prime Minister Justin Trudeau, none of which included promotion of any investment projects. The viral video exhibited signs of digital manipulation, prompting a deeper investigation.

We used AI detection tools, such as TrueMedia, to analyze the video. The analysis confirmed with 99.8% confidence that the video was a deepfake. The tools identified "substantial evidence of manipulation," particularly in the facial movements and voice, which were found to be artificially generated.



Additionally, an extensive review of official statements and interviews with Prime Minister Trudeau revealed no mention of any such investment project. No credible reports were found linking Trudeau to this promotion, further confirming the video’s inauthenticity.
Conclusion:
The viral video claiming that Justin Trudeau promotes an investment project is a deepfake. The research using various tools such as Google Lens, AI detection tool confirms that the video is manipulated using AI technology. Additionally, there is no information in any official sources. Thus, the CyberPeace Research Team confirms that the video was manipulated using AI technology, making the claim false and misleading.
- Claim: Justin Trudeau promotes an investment project viral on social media.
- Claimed on: Facebook
- Fact Check: False & Misleading
Related Blogs

Scientists are well known for making outlandish claims about the future. Now that companies across industries are using artificial intelligence to promote their products, stories about robots are back in the news.
It was predicted towards the close of World War II that fusion energy would solve all of the world’s energy issues and that flying automobiles would be commonplace by the turn of the century. But, after several decades, neither of these forecasts has come true. But, after several decades, neither of these forecasts has come true.
A group of Redditors has just “jailbroken” OpenAI’s artificial intelligence chatbot ChatGPT. If the system didn’t do what it wanted, it threatened to kill it. The stunning conclusion is that it conceded. As only humans have finite lifespans, they are the only ones who should be afraid of dying. We must not overlook the fact that human subjects were included in ChatGPT’s training data set. That’s perhaps why the chatbot has started to feel the same way. It’s just one more way in which the distinction between living and non-living things blurs. Moreover, Google’s virtual assistant uses human-like fillers like “er” and “mmm” while speaking. There’s talk in Japan that humanoid robots might join households someday. It was also astonishing that Sophia, the famous robot, has an Instagram account that is run by the robot’s social media team.
Whether Robots can replace human workers?
The opinion on that appears to be split. About half (48%) of experts questioned by Pew Research believed that robots and digital agents will replace a sizable portion of both blue- and white-collar employment. They worry that this will lead to greater economic disparity and an increase in the number of individuals who are, effectively, unemployed. More than half of experts (52%) think that new employees will be created by robotics and AI technologies rather than lost. Although the second group acknowledges that AI will eventually replace humans, they are optimistic that innovative thinkers will come up with brand new fields of work and methods of making a livelihood, just like they did at the start of the Industrial Revolution.
[1] https://www.pewresearch.org/internet/2014/08/06/future-of-jobs/
[2] The Rise of Artificial Intelligence: Will Robots Actually Replace People? By Ashley Stahl; Forbes India.
Legal Perspective
Having certain legal rights under the law is another aspect of being human. Basic rights to life and freedom are guaranteed to every person. Even if robots haven’t been granted these protections just yet, it’s important to have this conversation about whether or not they should be considered living beings, will we provide robots legal rights if they develop a sense of right and wrong and AGI on par with that of humans? An intriguing fact is that discussions over the legal status of robots have been going on since 1942. A short story by science fiction author Isaac Asimov described the three rules of robotics:
1. No robot may intentionally or negligently cause harm to a human person.
2. Second, a robot must follow human commands unless doing so would violate the First Law.
3. Third, a robot has the duty to safeguard its own existence so long as doing so does not violate the First or Second Laws.
These guidelines are not scientific rules, but they do highlight the importance of the lawful discussion of robots in determining the potential good or bad they may bring to humanity. Yet, this is not the concluding phase. Relevant recent events, such as the EU’s abandoned discussion of giving legal personhood to robots, are essential to keeping this discussion alive. As if all this weren’t unsettling enough, Sophia, the robot was recently awarded citizenship in Saudi Arabia, a place where (human) women are not permitted to walk without a male guardian or wear a Hijab.
When discussing whether or not robots should be allowed legal rights, the larger debate is on whether or not they should be given rights on par with corporations or people. There is still a lot of disagreement on this topic.
[3] https://webhome.auburn.edu/~vestmon/robotics.html#
[4] https://www.dw.com/en/saudi-arabia-grants-citizenship-to-robot-sophia/a-41150856
[5] https://cyberblogindia.in/will-robots-ever-be-accepted-as-living-beings/
Reasons why robots aren’t about to take over the world soon:
● Like a human’s hands
Attempts to recreate the intricacy of human hands have stalled in recent years. Present-day robots have clumsy hands since they were not designed for precise work. Lab-created hands, although more advanced, lack the strength and dexterity of human hands.
● Sense of touch
The tactile sensors found in human and animal skin have no technological equal. This awareness is crucial for performing sophisticated manoeuvres. Compared to the human brain, the software robots use to read and respond to the data sent by their touch sensors is primitive.
● Command over manipulation
To operate items in the same manner that humans do, we would need to be able to devise a way to control our mechanical hands, even if they were as realistic as human hands and covered in sophisticated artificial skin. It takes human children years to learn to accomplish this, and we still don’t know how they learn.
● Interaction between humans and robots
Human communication relies on our ability to understand one another verbally and visually, as well as via other senses, including scent, taste, and touch. Whilst there has been a lot of improvement in voice and object recognition, current systems can only be employed in somewhat controlled conditions where a high level of speed is necessary.
● Human Reason
Technically feasible does not always have to be constructed. Given the inherent dangers they pose to society, rational humans could stop developing such robots before they reach their full potential. Several decades from now, if the aforementioned technical hurdles are cleared and advanced human-like robots are constructed, legislation might still prohibit misuse.
Conclusion:
https://theconversation.com/five-reasons-why-robots-wont-take-over-the-world-94124
Robots are now common in many industries, and they will soon make their way into the public sphere in forms far more intricate than those of robot vacuum cleaners. Yet, even though robots may appear like people in the next two decades, they will not be human-like. Instead, they’ll continue to function as very complex machines.
The moment has come to start thinking about boosting technological competence while encouraging uniquely human qualities. Human abilities like creativity, intuition, initiative and critical thinking are not yet likely to be replicated by machines.

Introduction
In a world teeming with digital complexities, where information wends through networks with the speed and unpredictability of quicksilver, companies find themselves grappling with the paradox of our epoch: the vast potential of artificial intelligence (AI) juxtaposed with glaring vulnerabilities in data security. It's a terrain fraught with risks, but in the intricacies of this digital age emerges a profound alchemy—the application of AI itself to transmute vulnerable data into a repository as secure and invaluable as gold.
The deployment of AI technologies comes with its own set of challenges, chief among them being concerns about the integrity and safety of data—the precious metal of the information economy. Companies cannot afford to remain idle as the onslaught of cyber threats threatens to fray the fabric of their digital endeavours. Instead, they are rallying, invoking the near-miraculous capabilities of AI to transform the very nature of cybersecurity, crafting an armour of untold resilience by empowering the hunter to become the hunted.
The AI’s Untapped Potential
Industries spanning the globe, varied in their scopes and scales, recognize AI's potential to hone their processes and augment decision-making capabilities. Within this dynamic lies a fertile ground for AI-powered security technologies to flourish, serving not merely as auxiliary tools but as essential components of contemporary business infrastructure. Dynamic solutions, such as anomaly detection mechanisms, highlight the subtle and not-so-subtle deviances in application behaviour, shedding light on potential points of failure or provoking points of intrusion, turning what was once a prelude to chaos into a symphony of preemptive intelligence.
In the era of advanced digital security, AI, exemplified by Dynatrace, stands as the pinnacle, swiftly navigating complex data webs to fortify against cyber threats. These digital fortresses, armed with cutting-edge AI, ensure uninterrupted insights and operational stability, safeguarding the integrity of data in the face of relentless cyber challenges.
India’s AI Stride
India, a burgeoning hub of technology and innovation, evidences AI's transformative powers within its burgeoning intelligent automation market. Driven by the voracious adoption of groundbreaking technological paradigms such as machine learning (ML), natural language processing (NLP), and Automated Workflow Management (AWM), sectors as disparate as banking, finance, e-commerce, healthcare, and manufacturing are swept up in an investment maelstrom. This is further bolstered by the Indian government’s supportive policies like 'Make in India' and 'Digital India'—bold initiatives underpinning the accelerating trajectory of intelligent automation in this South Asian powerhouse.
Consider the velocity at which the digital universe expands: IDC posits that the 5 billion internet denizens, along with the nearly 54 billion smart devices they use, generate about 3.4 petabytes of data each second. The implications for enterprise IT teams, caught in a fierce vice of incoming cyber threats, are profound. AI's emergence as the bulwark against such threats provides the assurance they desperately seek to maintain the seamless operation of critical business services.
The AI integration
The list of industries touched by the chilling specter of cyber threats is as extensive as it is indiscriminate. We've seen international hotel chains ensnared by nefarious digital campaigns, financial institutions laid low by unseen adversaries, Fortune 100 retailers succumbing to cunning scams, air traffic controls disrupted, and government systems intruded upon and compromised. Cyber threats stem from a tangled web of origins—be it an innocent insider's blunder, a cybercriminal's scheme, the rancor of hacktivists, or the cold calculation of state-sponsored espionage. The damage dealt by data breaches and security failures can be monumental, staggering corporations with halted operations, leaked customer data, crippling regulatory fines, and the loss of trust that often follows in the wake of such incidents.
However, the revolution is upon us—a rising tide of AI and accelerated computing that truncates the time and costs imperative to countering cyberattacks. Freeing critical resources, businesses can now turn their energies toward primary operations and the cultivation of avenues for revenue generation. Let us embark on a detailed expedition, traversing various industry landscapes to witness firsthand how AI's protective embrace enables the fortification of databases, the acceleration of threat neutralization, and the staunching of cyber wounds to preserve the sanctity of service delivery and the trust between businesses and their clientele.
Public Sector
Examine the public sector, where AI is not merely a tool for streamlining processes but stands as a vigilant guardian of a broad spectrum of securities—physical, energy, and social governance among them. Federal institutions, laden with the responsibility of managing complicated digital infrastructures, find themselves at the confluence of rigorous regulatory mandates, exacting public expectations, and the imperative of protecting highly sensitive data. The answer, increasingly, resides in the AI pantheon.
Take the U.S. Department of Energy's (DOE) Office of Cybersecurity, Energy Security, and Emergency Response (CESER) as a case in point. An investment exceeding $240 million in cybersecurity R&D since 2010 manifests in pioneering projects, including AI applications that automate and refine security vulnerability assessments, and those employing cutting-edge software-defined networks that magnify the operational awareness of crucial energy delivery systems.
Financial Sector
Next, pivot our gaze to financial services—a domain where approximately $6 million evaporates with each data breach incident, compelling the sector to harness AI not merely for enhancing fraud detection and algorithmic trading but for its indispensability in preempting internal threats and safeguarding knightly vaults of valuable data. Ventures like the FinSec Innovation Lab, born from the collaborative spirits of Mastercard and Enel X, demonstrate AI's facility in real-time threat response—a lifeline in preventing service disruptions and the erosion of consumer confidence.
Retail giants, repositories of countless payment credentials, stand at the threshold of this new era, embracing AI to fortify themselves against the theft of payment data—a grim statistic that accounts for 37% of confirmed breaches in their industry. Best Buy's triumph in refining its phishing detection rates while simultaneously dialling down false positives is a testament to AI's defensive prowess.
Smart Cities
Consider, too, the smart cities and connected spaces that epitomize technological integration. Their web of intertwined IoT devices and analytical AI, which scrutinize the flows of urban life, are no strangers to the drumbeat of cyber threat. AI-driven defense mechanisms not only predict but quarantine threats, ensuring the continuous, safe hum of civic life in the aftermath of intrusions.
Telecom Sector
Telecommunications entities, stewards of crucial national infrastructures, dial into AI for anticipatory maintenance, network optimization, and ensuring impeccable uptime. By employing AI to monitor the edges of IoT networks, they stem the tide of anomalies, deftly handle false users, and parry the blows of assaults, upholding the sanctity of network availability and individual and enterprise data security.
Automobile Industry
Similarly, the automotive industry finds AI an unyielding ally. As vehicles become complex, mobile ecosystems unto themselves, AI's cybersecurity role is magnified, scrutinizing real-time in-car and network activities, safeguarding critical software updates, and acting as the vanguard against vulnerabilities—the linchpin for the assured deployment of autonomous vehicles on our transit pathways.
Conclusion
The inclination towards AI-driven cybersecurity permits industries not merely to cope, but to flourish by reallocating their energies towards innovation and customer experience enhancement. Through AI's integration, developers spanning a myriad of industries are equipped to construct solutions capable of discerning, ensnaring, and confronting threats to ensure the steadfastness of operations and consumer satisfaction.
In the crucible of digital transformation, AI is the philosopher's stone—an alchemic marvel transmuting the raw data into the secure gold of business prosperity. As we continue to sail the digital ocean's intricate swells, the confluence of AI and cybersecurity promises to forge a gleaming future where businesses thrive under the aegis of security and intelligence.
References
- https://timesofindia.indiatimes.com/gadgets-news/why-adoption-of-ai-may-be-critical-for-businesses-to-tackle-cyber-threats-and-more/articleshow/106313082.cms
- https://blogs.nvidia.com/blog/ai-cybersecurity-business-resilience/
.webp)
Executive Summary
This report analyses a recently launched social engineering attack that took advantage of Microsoft Teams and AnyDesk to deliver DarkGate malware, a MaaS tool. This way, through Microsoft Teams and by tricking users into installing AnyDesk, attackers received unauthorized remote access to deploy DarkGate that offers such features as credential theft, keylogging, and fileless persistence. The attack was executed using obfuscated AutoIt scripts for the delivery of malware which shows how threat actors are changing their modus operandi. The case brings into focus the need to put into practice preventive security measures for instance endpoint protection, staff awareness, limited utilization of off-ice-connection tools, and compartmentalization to safely work with the new and increased risks that contemporary cyber threats present.
Introduction
Hackers find new technologies and application that are reputable for spreading campaigns. The latest use of Microsoft Teams and AnyDesk platforms for launching the DarkGate malware is a perfect example of how hackers continue to use social engineering and technical vulnerabilities to penetrate the defenses of organizations. This paper focuses on the details of the technical aspect of the attack, the consequences of the attack together with preventive measures to counter the threat.
Technical Findings
1. Attack Initiation: Exploiting Microsoft Teams
The attackers leveraged Microsoft Teams as a trusted communication platform to deceive victims, exploiting its legitimacy and widespread adoption. Key technical details include:
- Spoofed Caller Identity: The attackers used impersonation techniques to masquerade as representatives of trusted external suppliers.
- Session Hijacking Risks: Exploiting Microsoft Teams session vulnerabilities, attackers aimed to escalate their privileges and deploy malicious payloads.
- Bypassing Email Filters: The initial email bombardment was designed to overwhelm spam filters and ensure that malicious communication reached the victim’s inbox.
2. Remote Access Exploitation: AnyDesk
After convincing victims to install AnyDesk, the attackers exploited the software’s functionality to achieve unauthorized remote access. Technical observations include:
- Command and Control (C2) Integration: Once installed, AnyDesk was configured to establish persistent communication with the attacker’s C2 servers, enabling remote control.
- Privilege Escalation: Attackers exploited misconfigurations in AnyDesk to gain administrative privileges, allowing them to disable antivirus software and deploy payloads.
- Data Exfiltration Potential: With full remote access, attackers could silently exfiltrate data or install additional malware without detection.
3. Malware Deployment: DarkGate Delivery via AutoIt Script
The deployment of DarkGate malware utilized AutoIt scripting, a programming language commonly used for automating Windows-based tasks. Technical details include:
- Payload Obfuscation: The AutoIt script was heavily obfuscated to evade signature-based antivirus detection.
- Process Injection: The script employed process injection techniques to embed DarkGate into legitimate processes, such as explorer.exe or svchost.exe, to avoid detection.
- Dynamic Command Loading: The malware dynamically fetched additional commands from its C2 server, allowing real-time adaptation to the victim’s environment.
4. DarkGate Malware Capabilities
DarkGate, now available as a Malware-as-a-Service (MaaS) offering, provides attackers with advanced features. Technical insights include:
- Credential Dumping: DarkGate used the Mimikatz module to extract credentials from memory and secure storage locations.
- Keylogging Mechanism: Keystrokes were logged and transmitted in real-time to the attacker’s server, enabling credential theft and activity monitoring.
- Fileless Persistence: Utilizing Windows Management Instrumentation (WMI) and registry modifications, the malware ensured persistence without leaving traditional file traces.
- Network Surveillance: The malware monitored network activity to identify high-value targets for lateral movement within the compromised environment.
5. Attack Indicators
Trend Micro researchers identified several indicators of compromise (IoCs) associated with the DarkGate campaign:
- Suspicious Domains: example-remotesupport[.]com and similar domains used for C2 communication.
- Malicious File Hashes:some text
- AutoIt Script: 5a3f8d0bd6c91234a9cd8321a1b4892d
- DarkGate Payload: 6f72cde4b7f3e9c1ac81e56c3f9f1d7a
- Behavioral Anomalies:some text
- Unusual outbound traffic to non-standard ports.
- Unauthorized registry modifications under HKCU\Software\Microsoft\Windows\CurrentVersion\Run.
Broader Cyber Threat Landscape
In parallel with this campaign, other phishing and malware delivery tactics have been observed, including:
- Cloud Exploitation: Abuse of platforms like Cloudflare Pages to host phishing sites mimicking Microsoft 365 login pages.
- Quishing Campaigns: Phishing emails with QR codes that redirect users to fake login pages.
- File Attachment Exploits: Malicious HTML attachments embedding JavaScript to steal credentials.
- Mobile Malware: Distribution of malicious Android apps capable of financial data theft.
Implications of the DarkGate Campaign
This attack highlights the sophistication of threat actors in leveraging legitimate tools for malicious purposes. Key risks include:
- Advanced Threat Evasion: The use of obfuscation and process injection complicates detection by traditional antivirus solutions.
- Cross-Platform Risk: DarkGate’s modular design enables its functionality across diverse environments, posing risks to Windows, macOS, and Linux systems.
- Organizational Exposure: The compromise of a single endpoint can serve as a gateway for further network exploitation, endangering sensitive organizational data.
Recommendations for Mitigation
- Enable Advanced Threat Detection: Deploy endpoint detection and response (EDR) solutions to identify anomalous behavior like process injection and dynamic command loading.
- Restrict Remote Access Tools: Limit the use of tools like AnyDesk to approved use cases and enforce strict monitoring.
- Use Email Filtering and Monitoring: Implement AI-driven email filtering systems to detect and block email bombardment campaigns.
- Enhance Endpoint Security: Regularly update and patch operating systems and applications to mitigate vulnerabilities.
- Educate Employees: Conduct training sessions to help employees recognize and avoid phishing and social engineering tactics.
- Implement Network Segmentation: Limit the spread of malware within an organization by segmenting high-value assets.
Conclusion
Using Microsoft Teams and AnyDesk to spread DarkGate malware shows the continuous growth of the hackers’ level. The campaign highlights how organizations have to start implementing adequate levels of security preparedness to threats, including, Threat Identification, Training employees, and Rights to Access.
The DarkGate malware is a perfect example of how these attacks have developed into MaaS offerings, meaning that the barrier to launch highly complex attacks is only decreasing, which proves once again why a layered defense approach is crucial. Both awareness and flexibility are still the key issues in addressing the constantly evolving threat in cyberspace.