A recent Google Cloud / Mandiant threat intelligence write-up describes a modern, high-conversion attack chain aimed at crypto and FinTech teams: a trusted contact reaches out, schedules a short meeting, and then uses a fake Zoom call plus AI-generated video to create urgency and credibility. Once the victim is "in the meeting", the attacker manufactures a technical problem ("audio issues") and pushes the victim into a ClickFix flow — running "troubleshooting" commands that actually start the infection chain.
This is a big deal because it is not just malware — it is identity + trust manipulation. The attacker does not need to break your firewall if they can convince you to break your own device.
Based on the report, the sequence looks like this:
If you have ever helped someone troubleshoot on a call, you can see why this works: it feels normal.
VerifyHuman is built for one core problem: proving the person on the other side of a call is the real person. Right now.
This attack chain relies on you accepting visual presence as proof. But deepfakes and pre-recorded video break that assumption.
VerifyHuman adds a second channel of proof that is hard to fake in real time:
In other words: even if an attacker can generate a convincing face and voice, they still can not pass a real-time check that is tied to a relationship you already established.
When someone messages you from a known account, your brain relaxes.
Better default: treat "a familiar username" as not enough. If the message is asking for
a meeting, money, access, or urgency, do a quick VerifyHuman check.
Verify identity before you treat the call as legitimate. If they stall, deflect, or can't complete it, you end the call before the attacker gets to the ClickFix step.
ClickFix works because it reframes a security boundary as "helpful troubleshooting." VerifyHuman can prevent you from ever entering the attacker's scripted funnel. If the person can not verify, you don't follow their instructions; especially not "paste this into Terminal."
If you are a founder, developer, or exec who takes a lot of calls, adopt these defaults:
Want a lightweight way to verify who is really on the call?
If deepfakes are part of the threat landscape, we need a better default than "they looked real on Zoom."
Learn more in our FAQ