Deepfakes, AI fuel new wave of cyber attacks on businesses

Raphael John-Lall

Busi­ness own­ers are be­ing urged to strength­en their cy­ber­se­cu­ri­ty de­fences as in­creas­ing­ly so­phis­ti­cat­ed cy­ber­at­tacks—dri­ven by ar­ti­fi­cial in­tel­li­gence and deep­fake tech­nol­o­gy—pose a grow­ing threat to op­er­a­tions and fi­nan­cial sta­bil­i­ty.

Man­ag­ing Di­rec­tor of Pina­ka Con­sult­ing, Shi­va Bisses­sar, warned that cy­ber­crim­i­nals are rapid­ly evolv­ing their tac­tics, us­ing more con­vinc­ing and tech­no­log­i­cal­ly ad­vanced meth­ods to ex­ploit vul­ner­a­bil­i­ties with­in or­gan­i­sa­tions.

Speak­ing to the Busi­ness Guardian, Bisses­sar high­light­ed deep­fakes as one of the most press­ing risks fac­ing busi­ness­es to­day. He al­so ref­er­enced his pre­sen­ta­tion at the CAN­TO Con­nect 2026 and its 42nd AGM, held from Feb­ru­ary 1 to 3 at the Hy­att Re­gency Ho­tel in Port of Spain, where the is­sue was a cen­tral fo­cus.

CAN­TO Caribbean, in a so­cial me­dia post on the event, not­ed that Bisses­sar ad­dressed the grow­ing threat posed by deep­fakes—AI-gen­er­at­ed con­tent ca­pa­ble of ma­nip­u­lat­ing au­dio, video and im­ages in ways that un­der­mine trust, se­cu­ri­ty and de­ci­sion-mak­ing across gov­ern­ments, busi­ness­es and so­ci­ety.

That ses­sion ex­am­ined what deep­fakes are, why they mat­ter, and how busi­ness own­ers, or­gan­i­sa­tions and pol­i­cy­mak­ers can re­spond in an in­creas­ing­ly com­plex dig­i­tal en­vi­ron­ment.

“So, what is the at­tack evo­lu­tion that we’re see­ing right now? Deep­fakes, AI-gen­er­at­ed con­tent, it’s a threat that is out there right now, and we’re see­ing it mov­ing. You guys would have seen the videos with Will Smith two years ago eat­ing spaghet­ti, where he looks re­al­ly con­tort­ed and his face is all over the place, to now where we have re­al­is­tic deep­fakes.”

He ex­plained that cy­ber­crim­i­nals are shift­ing away from tra­di­tion­al so­cial en­gi­neer­ing tech­niques to more ad­vanced, AI-en­hanced de­cep­tion strate­gies.

“And the at­tack evo­lu­tion is go­ing to be now, mov­ing so­cial en­gi­neer­ing from your tra­di­tion­al meth­ods of try­ing to fool peo­ple, to try­ing to fool peo­ple with more con­vinc­ing deep­fakes. So so­cial en­gi­neer­ing is not a tech­ni­cal term, it’s some­thing that you do all the time. You come and you meet an au­di­ence, you so­cial en­gi­neer your way in­to a room. So­cial en­gi­neer­ing is how we con­vince peo­ple to trust us, to car­ry out some ac­tion that we want them to car­ry out. It’s not tech­ni­cal.”

Bisses­sar warned that this evo­lu­tion is al­ready af­fect­ing busi­ness­es through schemes such as busi­ness email com­pro­mise, where fraud­sters im­per­son­ate ven­dors or ex­ec­u­tives to ma­nip­u­late em­ploy­ees in­to au­tho­ris­ing pay­ments or grant­i­ng ac­cess.

“We have now the ad­vent of at­tacks that are based on busi­ness email com­pro­mise. So, a busi­ness email com­pro­mise is where you would see some­one pre­tend­ing to be a ven­dor. They will send you an email, and they are try­ing to con­vince you to click on that email and add them to the ven­dor list, or send a wire to an ex-dif­fer­ent ac­count that you’re nor­mal­ly ac­cus­tomed to. That busi­ness email com­pro­mise is very preva­lent in T&T.”

He stressed that es­tab­lished in­ter­nal con­trols—par­tic­u­lar­ly those gov­ern­ing fi­nan­cial trans­ac­tions—must not be by­passed, even when com­mu­ni­ca­tions ap­pear le­git­i­mate.

“You have to go through a process. But this is the game. These guys are so good at try­ing to get you to by­pass your ex­ist­ing work­flows. This is what they try to do. So, they would send you an email, pre­tend to be a sup­pli­er, hey, click on this link to add them to the list. Click on this link to send mon­ey to a dif­fer­ent ac­count.”

New and Emerg­ing Threats

Bisses­sar al­so point­ed to a grow­ing range of AI-en­abled threats, not­ing that cy­ber­crim­i­nals are re­fin­ing their tac­tics us­ing more so­phis­ti­cat­ed scripts and de­cep­tion tech­niques.

“What are some of these AI-en­abled tech­niques? We’ve seen the tech­ni­cal mea­sures that bad ac­tors are try­ing to per­pe­trate against the good ac­tors, where are the good ac­tors, or their po­ten­tial vic­tims. The ar­eas that they would ex­ploit would be that pre­text script that they have to try to con­vince some­body that they are some­one else. Those scripts will now im­prove with AI.”

He high­light­ed “fi­nan­cial sex­tor­tion” as an­oth­er emerg­ing con­cern, par­tic­u­lar­ly af­fect­ing younger users.

“This is where per­sons try to prey on teenagers and get them to sub­mit some com­pro­mis­ing pho­to of them­selves, and they will use that now as lever­age to ask them for mon­ey once they’ve fall­en vic­tim to that scheme. These at­tacks are not per­pe­trat­ed by in­di­vid­u­als. There are groups known for these types of at­tacks, and they are based in cer­tain re­gions of the world.”

He not­ed sim­i­lar­i­ties with ro­mance scams, which have al­ready been flagged lo­cal­ly by the Fi­nan­cial In­tel­li­gence Unit of Trinidad and To­ba­go.

“Ro­mance scams have been recog­nised by the Fi­nan­cial In­tel­li­gence Unit of Trinidad and To­ba­go (FI­UTT) as some­thing tak­ing place in Trinidad and To­ba­go of sig­nif­i­cance. They have da­ta to sup­port that. They’ve is­sued a re­port. They’ve is­sued warn­ings on that, where­as the fi­nan­cial sex­tor­tion is some­thing that ap­plies to the youth. But this type of ex­tor­tion, if we look at it from that gen­er­al word of ex­tor­tion, it is some­thing that takes place glob­al­ly, and it has been tak­ing place in T&T.”

Bisses­sar added that deep­fake-en­abled fraud is no longer the­o­ret­i­cal, cit­ing a high-pro­file case in Hong Kong where a com­pa­ny em­ploy­ee was tricked dur­ing a video call in­to trans­fer­ring mil­lions of dol­lars.

“Deep­fake at­tacks did take place in Hong Kong maybe a cou­ple years ago, where the con­troller of ac­counts was on a con­fer­ence call that he thought was his ex­ec­u­tives, and they were ba­si­cal­ly scammed out of…he sent mon­ey. He fol­lowed the in­struc­tions re­ceived on that video call, and he sent mon­ey to the tune of, I be­lieve, $25 mil­lion. So, this is not fic­tion.”

He al­so warned that ran­somware at­tacks are be­com­ing more or­gan­ised, with cy­ber­crim­i­nals op­er­at­ing in struc­tured net­works re­sem­bling le­git­i­mate busi­ness ecosys­tems.

“Ran­somware is be­ing per­pe­trat­ed by a group of bad ac­tors. It’s an ecosys­tem. It’s a busi­ness ecosys­tem. Just as you have economies of scale in the every­day world, these guys have classed them­selves in­to ar­eas of spe­cial­i­sa­tion.”

Call for Col­lab­o­ra­tion

Against this back­drop, Bisses­sar called for stronger col­lab­o­ra­tion be­tween the pub­lic and pri­vate sec­tors to counter the grow­ing cy­ber threat.

“The bad ac­tors are cre­at­ing ecosys­tems. What are the good ac­tors do­ing? Do we tru­ly have pub­lic-pri­vate part­ner­ship in Trinidad and To­ba­go when it comes to cy­ber­se­cu­ri­ty? We’ve heard some great plans about what the Telecom­mu­ni­ca­tions Au­thor­i­ty of Trinidad and To­ba­go (TATT) is do­ing. But I would en­cour­age you to part­ner with the pri­vate sec­tor as well. Part­ner with some of the small­er pri­vate sec­tor en­ti­ties as well, be­cause we have cer­tain ex­per­tise that we could lend to this type of sit­u­a­tion.”

As cy­ber threats be­come more so­phis­ti­cat­ed, he stressed that vig­i­lance, ro­bust in­ter­nal con­trols and col­lab­o­ra­tion will be crit­i­cal in safe­guard­ing busi­ness­es from in­creas­ing­ly com­plex dig­i­tal risks.

Raphael John-Lall
Read More

Latest

Newsletter

Don't miss

The Vogue Business Funding Tracker

Introducing the Vogue Business Funding Tracker, a running list highlighting the most notable and intriguing investment and M&A activity in fashion and beauty. From emerging disruptors to legacy giants undergoing major changes, we spotlight the deals that are shifting the dynamics of the sectors we cover, including fashion, beauty, tech and sustainability. April 2026 Icicle

Family Business? Tee Grizzley Reacts After His Mom Accuses Him Of Leaving Her To Struggle (PHOTOS)

Y’all… it looks like some family tension might be brewing behind the scenes involving Tee Grizzley and his mom. What seemed like a regular social media post quickly turned into something deeper. And now, folks are side-eyeing the situation and wondering what’s really going on. RELATED: Tee Grizzley Shares A Message For Artists After His

SoE necessary but not sufficient, business leaders say

PE­TER CHRISTO­PHER Se­nior Mul­ti­me­dia Re­porter pe­ter.christo­pher@guardian.co.tt Heavy hand­ed but nec­es­sary giv­en the state of crime in T&T. This was a com­mon as­sess­ment from var­i­ous busi­ness groups when asked for their per­spec­tive on the lat­est de­c­la­ra­tion of a state of emer­gency in the coun­try. The T&T Cham­ber of In­dus­try and Com­merce, in a re­leased is­sued yes­ter­day