Why SlashIDIdentity ProtectionBlogNewsroomDocumentation
Why SlashID
Use Cases
IAM Teams
Discover Identity RiskEliminate IAM DebtAccess ReviewsSecure Non-Human Identities & AI Agents
SOC Teams
Identity Threat Detection & ResponseStop Phishing AttemptsStop Impersonation & Deepfake AttacksDiscover & Block Shadow AppsMutual TOTP
GRC Teams
Identity Security Posture ManagementAutomate Compliance Gap AnalysisIdentity ProtectionBlogNewsroomDocumentation
Vincenzo Iozzo, SlashID Team
Vincenzo Iozzo, SlashID Team
Vincenzo Iozzo, SlashID Team
30 Mar, 2026
1. Introduction 2. Mutual TOTP: Cryptographic Verification for Human-to-Human Identity 3. Why Mutual TOTP Stops Deepfake Attacks 4. Conclusion
Security
Deepfake Impersonation Attacks (Part 2): Defending with SlashID Mutual TOTP

As generative AI makes deepfake impersonation attacks increasingly convincing, traditional enterprise security controls fail to protect human-to-human communication channels.

This post introduces SlashID Mutual TOTP, a cryptographic verification mechanism that replaces perception-based trust with mathematical proof of identity, stopping deepfake impersonation attacks before sensitive information is shared.

1. Introduction

In Part 1 of this series, we examined the anatomy of modern deepfake impersonation attacks (GANs, Diffusion, rPPG injection) and how advances in Machine Learning and generative AI are enabling threat actors to convincingly replicate human identities. The 2024 fraud against engineering firm Arup’s Hong Kong office, where an employee transferred approximately $25 million after joining what appeared to be a legitimate internal video conference, illustrates how powerful these attacks have become. In that case, attackers combined phishing with AI-generated voices and video participants to create a realistic meeting environment that convinced the victim to execute multiple financial transfers.

As generative AI tools become easier to access and operate, the scale of deepfake-enabled fraud is expected to increase significantly. Industry forecasts estimate that deepfake-enabled fraud losses could reach $40 billion annually by 2027, highlighting how rapidly these techniques are being adopted by cybercriminal groups.

One reason these attacks are so effective is that traditional enterprise security controls were not designed to defend against human impersonation inside trusted communication channels. Email filtering, endpoint protection, and network monitoring focus on detecting malicious files, suspicious logins, or anomalous traffic. Even strong authentication mechanisms such as MFA primarily verify a user’s identity when accessing systems, not when communicating with colleagues over phone calls or video meetings. Deepfake impersonation attacks exploit this gap.

To address this emerging threat, organizations must introduce a mechanism for verifying identity during human-to-human interactions, not only during system logins. SlashID approaches this challenge with Mutual TOTP, a cryptographic verification mechanism that allows both parties in a conversation to confirm each other’s identity in real time before sensitive information is shared or privileged actions are performed.

Mapping Deepfake Impersonation to MITRE ATT&CK

Deepfake impersonation attacks partially align with techniques in the MITRE ATT&CK framework. The social engineering component resembles Impersonation (T1656), while the preparation phase like training or acquiring generative models can relate to Obtain Capabilities: Artificial Intelligence (T1588.007).

However, real-time AI impersonation during live phone or video calls is not yet represented as a distinct technique in ATT&CK, highlighting how generative AI is creating a new class of identity attacks where the target is human trust rather than system vulnerabilities.

2. Mutual TOTP: Cryptographic Verification for Human-to-Human Identity

Traditional authentication systems verify users to systems. For example, a user logs into an application and proves possession of credentials using passwords, passkeys, or one-time codes. Deepfake impersonation attacks expose a different security gap: the lack of reliable human-to-human identity verification during real-time communication such as phone calls or video meetings.

Mutual TOTP addresses this problem of perception (Passive Trust) based on recognizing a voice, or face by introducing cryptographic identity verification between both participants in a conversation. Instead of trusting visual or auditory signals, both parties must prove possession of a registered device (Active Trust) capable of generating time-based one-time passwords derived from a shared cryptographic secret.

2.1. Technical Architecture of Mutual TOTP

Mutual TOTP builds on the standard Time-Based One-Time Password (TOTP) algorithm defined in RFC 6238, extending it to support bidirectional identity verification between two human participants.

The core security properties are derived from three elements:

  1. Shared secret key provisioning
  2. Time-based cryptographic code generation
  3. Bidirectional verification protocol

Together these components allow two parties to confirm each other’s identity before exchanging sensitive information.

2.2. Device Enrollment and Secret Provisioning

Before Mutual TOTP can be used, each participant must enroll a device. During enrollment:

  1. The identity provider generates a unique cryptographic secret key (K) for the user.
  2. The key is securely delivered to the user’s mobile application or hardware-backed secure enclave.

This secret key is never transmitted during verification. Instead, it is used locally to generate short-lived authentication codes. The enrollment process establishes device-bound identity, meaning the user must possess the registered device to participate in verification.

2.3. TOTP Code Generation

Instead of a counter used in earlier HOTP (RFC 4226) systems, TOTP (RFC 6238) algorithm uses the current time (T). The formula computes time steps (T) based on the Unix epoch, typically dividing the current time by X = 30 second intervals:

T = (CurrentTime - T0) / X

At its core, the system derives a TOTP code using:

TOTP = HMAC(K, T)

Each interval generates a new 6 digits long code. This design provides several security guarantees:

  • Codes expire every 30 seconds — useless 31 seconds later.
  • Codes cannot be predicted without the secret key — computationally infeasible.
  • Replay attacks fail because codes become invalid quickly.

2.4. Bidirectional Verification Protocol

In a Mutual TOTP session, two independent seeds (Kinitiator and Ktarget) are used. Both parties generate a code simultaneously. These codes are bound to a Secure Enclave on a physical device.

Mutual TOTP Bidirectional Verification Protocol

Unlike traditional TOTP, where a user authenticates to a service, Mutual TOTP requires both parties to verify each other simultaneously. The protocol operates as follows:

  1. Handshake Initiation — One participant initiates a verification request by selecting the target user (e.g., by email address). The identity platform sends a verification request to the target user’s device.

  2. Independent Code Generation — Each device independently generates a TOTP code using its secret key.

    Code_A = TOTP(K_A, T)
    Code_B = TOTP(K_B, T)

    Where K_A is user A’s secret, and K_B is user B’s secret.

  3. Code Exchange Over the Communication Channel — Participants verbally exchange the codes during the call. Each device then verifies the code received from the other party.

  4. Mutual Confirmation — The handshake succeeds only when both verifications are completed.

Mutual TOTP maintains a short-lived session state during verification, thus providing Real-Time Session Synchronization. Key characteristic is the 2-minute timeout with real-time state synchronization across both devices.

3. Why Mutual TOTP Stops Deepfake Attacks

Deepfake impersonation attacks exploit perception-based trust signals:

  • Voice recognition
  • Facial appearance
  • Conversational style
  • Contextual familiarity

However, deepfakes cannot reproduce cryptographic secrets. Therefore, Mutual TOTP replaces perception-based trust with cryptographic proof of identity.

Trust ModelTraditional Call VerificationSlashID Mutual TOTP
Identity proofVoice / face / familiarityCryptographic code + registered device
Deepfake resistantNoYes
Replay resistantNoYes
Audit trailUsually noneYes
Mutual verificationNoYes

Trust is no longer a human feeling; it’s a mathematical certainty.

4. Conclusion

Deepfake impersonation attacks highlight a growing shift in cybercrime: attackers are no longer limited to exploiting software vulnerabilities, but can now convincingly impersonate trusted individuals during phone calls and video meetings. As generative AI continues to advance, perception-based trust such as recognizing a voice, face, or familiar context is becoming an increasingly unreliable way to verify identity.

SlashID’s Mutual TOTP directly addresses this gap. By introducing cryptographic verification into human-to-human communication, both participants must prove possession of their registered device using time-based one-time passwords before sensitive actions occur. This transforms identity verification from passive trust based on perception into active trust backed by cryptographic proof.

Even the most convincing deepfake cannot generate valid TOTP codes without access to the legitimate device and secret key. By enforcing real-time mutual verification, SlashID Mutual TOTP stops impersonation attacks before sensitive information is shared, preventing fraud, unauthorized access, and social engineering attempts driven by AI-generated identities.

Related articles

Security

/ 16 Mar, 2026

Deepfake Impersonation Attacks (Part 1): Anatomy of Modern Deepfakes

In 2024, Arup, a global engineering consultancy, fell victim to one of the most sophisticated deepfake fraud attacks, losing $25 million after an employee joined what appeared to be a legitimate video conference with AI-generated deepfake executives.

This post explores the technical evolution of deepfake technology, from early GANs to modern diffusion models, and explains how attackers can now bypass enterprise liveness detection to impersonate executives in real-time video calls.

Vincenzo Iozzo, SlashID Team
Vincenzo Iozzo, SlashID Team
Vincenzo Iozzo, SlashID Team

Security

/ 6 Mar, 2026

NYDFS 2026 Vishing Advisory: Detection and Defense with SlashID

On February 6, 2026, NYDFS issued an industry letter warning DFS-regulated entities about a spike in targeted vishing attacks where threat actors impersonate IT help desk staff to steal credentials and MFA codes.

This post breaks down the technical mechanics of the campaign, why it reliably bypasses MFA, and how to detect and contain it using identity telemetry with SlashID Identity Protection, Mutual TOTP verification, and MITM detection.

SlashID Team, Vincenzo Iozzo
SlashID Team, Vincenzo Iozzo
SlashID Team, Vincenzo Iozzo

Security

/ 16 Jan, 2026

Scattered Spider Tradecraft: Identity Abuse, Attack Flow, and Defense

Scattered Spider is a highly adaptive cybercrime group that breaches enterprises by abusing identity, trust, and legitimate access paths rather than malware exploits.

Learn about their identity-centric attack flow, real-world campaigns like the MGM and Caesars breaches, and how to defend against these sophisticated threats.

SlashID Team, Vincenzo Iozzo
SlashID Team, Vincenzo Iozzo
SlashID Team, Vincenzo Iozzo

Ready to start a top-tier security upgrade?

Get in touch
Terms · Privacy · System Status
© 2025 SlashID® Inc. All Rights Reserved.

Products

Why SlashID
Identity Protection Use Cases
Identity Management

Resources

Blog Newsroom Documentation

We use cookies to improve your experience. Read our cookie policy.