Microsoft names developers behind illicit AI tools used in celebrity deepfake scheme

Avatar

Four foreign and two U.S. developers unlawfully accessed generative AI services, reconfigured them to allow the creation of harmful content such as celebrity deepfakes and then resold access to the tools, Microsoft said Thursday in a legal filing.

Users created “non-consensual intimate images of celebrities and other sexually explicit content” with the modified AI tools, including Microsoft’s Azure OpenAI services, the tech giant said in a blog post about its amended civil litigation complaint. The lawsuit was filed in December in a Virginia federal court and was unsealed in January. 

Microsoft did not name the celebrities out of concerns for their privacy. The company also said it “excluded synthetic imagery and prompts from our filings to prevent the further circulation of harmful content.”

The developers of the malicious AI tools are part of a “global cybercrime network” that Microsoft tracks as Storm-2139, the blog post said. 

The two U.S. individuals are based in Illinois and Florida, Microsoft said, but it withheld their names because of pending criminal investigations. 

The four foreign developers, the company said, are Arian Yadegarnia, aka “Fiz,” of Iran; Alan Krysiak, aka “Drago,” of the United Kingdom; Ricky Yuen, aka “cg-dot,” of Hong Kong; and Phát Phùng Tấn, aka “Asakuri,” of Vietnam.

Microsoft said it is preparing criminal referrals to law enforcement agencies in the U.S. and overseas.

Storm-2139’s access to the AI services was through “exploited exposed customer credentials scraped from public sources,” Microsoft said.

After Microsoft’s initial filing, the court issued a temporary restraining order and preliminary injunction that enabled the company to seize a website connected to Storm-2139. Microsoft said the disruption enabled its investigation to go deeper.

“The seizure of this website and subsequent unsealing of the legal filings in January generated an immediate reaction from actors, in some cases causing group members to turn on and point fingers at one another,” said the blog post, written by Steven Masada, assistant general counsel of Microsoft’s Digital Crimes Unit.

As chatter about the lawsuit increased, participants in the group’s communications channels also doxed Microsoft lawyers, “posting their names, personal information, and in some instances photographs,” the company said. The doxing backfired, though, and some suspected members of Storm-2139 emailed Microsoft, “attempting to cast blame on other members of the operation.” 

The six individuals mentioned in the blog post are among 10 “John Does” listed in the original complaint, Microsoft said.

CybercrimeIndustryNewsPrivacyTechnology
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Joe Warminsky

is the news editor for Recorded Future News. He has more than 25 years experience as an editor and writer in the Washington, D.C., area. He previously he helped lead CyberScoop for more than five years. Prior to that, he was a digital editor at WAMU 88.5, the NPR affiliate in Washington, and he spent more than a decade editing coverage of Congress for CQ Roll Call.

 

Total
0
Shares
Previous Post

Thousands rescued from scam compounds in Myanmar now stuck at Thai border

Next Post

Hacker behind over 90 high-profile data leaks worldwide arrested in Thailand

Related Posts

Webinar: Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program

It’s not enough to be secure. In today’s legal climate, you need to prove it. Whether you’re protecting a small company or managing compliance across a global enterprise, one thing is clear: cybersecurity can no longer be left to guesswork, vague frameworks, or best-effort intentions. Regulators and courts are now holding organizations accountable for how “reasonable” their security programs are
Avatar
Read More

Microsoft Fixes 78 Flaws, 5 Zero-Days Exploited; CVSS 10 Bug Impacts Azure DevOps Server

Microsoft on Tuesday shipped fixes to address a total of 78 security flaws across its software lineup, including a set of five zero-days that have come under active exploitation in the wild. Of the 78 flaws resolved by the tech giant, 11 are rated Critical, 66 are rated Important, and one is rated Low in severity. Twenty-eight of these vulnerabilities lead to remote code execution, 21 of them
Avatar
Read More

Taiwan NSB Alerts Public on Data Risks from TikTok, Weibo, and RedNote Over China Ties

Taiwan's National Security Bureau (NSB) has warned that China-developed applications like RedNote (aka Xiaohongshu), Weibo, TikTok, WeChat, and Baidu Cloud pose security risks due to excessive data collection and data transfer to China. The alert comes following an inspection of these apps carried out in coordination with the Ministry of Justice Investigation Bureau (MJIB) and the Criminal
Avatar
Read More