Microsoft names developers behind illicit AI tools used in celebrity deepfake scheme

Avatar

Four foreign and two U.S. developers unlawfully accessed generative AI services, reconfigured them to allow the creation of harmful content such as celebrity deepfakes and then resold access to the tools, Microsoft said Thursday in a legal filing.

Users created “non-consensual intimate images of celebrities and other sexually explicit content” with the modified AI tools, including Microsoft’s Azure OpenAI services, the tech giant said in a blog post about its amended civil litigation complaint. The lawsuit was filed in December in a Virginia federal court and was unsealed in January. 

Microsoft did not name the celebrities out of concerns for their privacy. The company also said it “excluded synthetic imagery and prompts from our filings to prevent the further circulation of harmful content.”

The developers of the malicious AI tools are part of a “global cybercrime network” that Microsoft tracks as Storm-2139, the blog post said. 

The two U.S. individuals are based in Illinois and Florida, Microsoft said, but it withheld their names because of pending criminal investigations. 

The four foreign developers, the company said, are Arian Yadegarnia, aka “Fiz,” of Iran; Alan Krysiak, aka “Drago,” of the United Kingdom; Ricky Yuen, aka “cg-dot,” of Hong Kong; and Phát Phùng Tấn, aka “Asakuri,” of Vietnam.

Microsoft said it is preparing criminal referrals to law enforcement agencies in the U.S. and overseas.

Storm-2139’s access to the AI services was through “exploited exposed customer credentials scraped from public sources,” Microsoft said.

After Microsoft’s initial filing, the court issued a temporary restraining order and preliminary injunction that enabled the company to seize a website connected to Storm-2139. Microsoft said the disruption enabled its investigation to go deeper.

“The seizure of this website and subsequent unsealing of the legal filings in January generated an immediate reaction from actors, in some cases causing group members to turn on and point fingers at one another,” said the blog post, written by Steven Masada, assistant general counsel of Microsoft’s Digital Crimes Unit.

As chatter about the lawsuit increased, participants in the group’s communications channels also doxed Microsoft lawyers, “posting their names, personal information, and in some instances photographs,” the company said. The doxing backfired, though, and some suspected members of Storm-2139 emailed Microsoft, “attempting to cast blame on other members of the operation.” 

The six individuals mentioned in the blog post are among 10 “John Does” listed in the original complaint, Microsoft said.

CybercrimeIndustryNewsPrivacyTechnology
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Joe Warminsky

is the news editor for Recorded Future News. He has more than 25 years experience as an editor and writer in the Washington, D.C., area. He previously he helped lead CyberScoop for more than five years. Prior to that, he was a digital editor at WAMU 88.5, the NPR affiliate in Washington, and he spent more than a decade editing coverage of Congress for CQ Roll Call.

 

Total
0
Shares
Previous Post

Thousands rescued from scam compounds in Myanmar now stuck at Thai border

Next Post

Sticky Werewolf Uses Undocumented Implant to Deploy Lumma Stealer in Russia and Belarus

Related Posts

Experts Find Shared Codebase Linking Morpheus and HellCat Ransomware Payloads

An analysis of HellCat and Morpheus ransomware operations has revealed that affiliates associated with the respective cybercrime entities are using identical code for their ransomware payloads. The findings come from SentinelOne, which analyzed artifacts uploaded to the VirusTotal malware scanning platform by the same submitter towards the end of December 2024. "These two payload samples are
Avatar
Read More

The New Ransomware Groups Shaking Up 2025

In 2024, global ransomware attacks hit 5,414, an 11% increase from 2023.  After a slow start, attacks spiked in Q2 and surged in Q4, with 1,827 incidents (33% of the year's total). Law enforcement actions against major groups like LockBit caused fragmentation, leading to more competition and a rise in smaller gangs. The number of active ransomware groups jumped 40%, from 68 in 2023 to 95
Avatar
Read More