У нас вы можете посмотреть бесплатно How to Simulate the UXLINK Deepfake Social Engineering Attack или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
Adam and Jason from Breacher.ai demonstrate how to simulate a real-world deepfake social engineering attack, the UXLINK breach using the Breacher.ai platform. 00:00 Overview of the UXLINK-inspired attack scenario 00:25 Attack setup and simulation flow 00:55 Deepfake voice call demonstration 02:05 Reaction to voice impersonation realism 02:25 Phishing email delivery 02:55 Secure download page walkthrough 03:25 Simulation failure and platform logging 03:55 Visibility into user actions 04:20 Why realistic simulations matter 04:45 Final thoughts and next steps The UXLINK incident resulted in $11.3 million stolen and a ~70% collapse in token value, not because of a smart contract flaw, but because attackers successfully exploited human trust using deepfake impersonation and highly targeted social engineering. This walkthrough shows, step by step, how an attack like the one used against UXLINK can be simulated for training and testing purposes: • A deepfake phone call impersonating a trusted executive • A follow-up spear phishing email with a malicious download link • A convincing “secure” download page built from public assets • Full visibility into employee actions and simulation outcomes This is not a generic phishing template. It’s an intelligence-driven, real-world attack chain designed to reflect how modern threat actors actually operate. If your security program still assumes voice calls, familiar names, or professional-looking download pages are safe, the UXLINK breach shows why that assumption no longer holds. Who this video is for: • CISOs and security leaders • Blockchain and crypto organizations • MSPs and MSSPs • Red teams and security awareness teams • Organizations preparing for AI-powered impersonation attacks If you want to test how your organization would respond to an attack like the one that impacted UXLINK, reach out to learn how these simulations can be tailored to your environment.