Incident Response

Deepfake Executive Impersonation: The SMB Verification Playbook for 2026

The scenario used to be science fiction. Now it is a weekly incident ticket. An employee in finance joins a Teams call with the CFO and two accounting staff. The CFO explains an urgent wire transfer, the others nod along, the employee authorizes the payment. Nothing feels off until the real CFO walks past their desk four hours later asking about a completely different topic.

That is the model for the $25 million deepfake fraud that hit a Hong Kong firm in 2024. Since then the technology has only gotten cheaper, faster, and more convincing. CrowdStrike documented a 442% surge in voice phishing between the first and second halves of 2024. McAfee demonstrated that three seconds of audio is enough to clone a voice convincingly. Keepnet reports that 70% of organizations have fallen victim to a voice phishing attack, and Regula Forensics found 49% of businesses have been hit by a deepfake voice or video fraud.

SMBs are squarely in the crosshairs. Unlike Fortune 500 companies, most midmarket organizations have no deepfake detection vendor, no formalized verification protocol, and no playbook for what happens when finance realizes they authorized a fraudulent transfer 20 minutes ago. This post is a pragmatic playbook for closing that gap without a seven-figure security budget.

Why your existing defenses do not help

Every deepfake executive fraud that has made the news in the last 18 months bypassed the victim's entire security stack. The email gateway does not fire because the attack is a phone call or a video conference. EDR does not fire because no malware runs on any endpoint. The firewall does not fire because the traffic is normal Teams or Zoom or WhatsApp. MFA does not fire because nobody logged in anywhere. The attacker's only requirement is that the victim trusts what they are hearing and seeing.

This is a trust-layer attack. The security team cannot patch trust. What the security team can do is require out-of-band verification before trust converts into action — specifically into money movement, credential issuance, access changes, or data exfiltration.

The playbook below assumes three realities:

  • You cannot reliably detect a good deepfake in real time. Detection vendors like Reality Defender and DuckDuckGoose are promising, but no SMB has them deployed across every call their finance team takes.
  • Your executives already have enough public audio and video online to be cloned. LinkedIn posts, YouTube interviews, earnings calls, and conference recordings are all training data. Taking those down is not a viable strategy.
  • Your employees will not win a cognitive battle against a real-time deepfake of someone they know and respect. Training alone will not save you. Process will.

The four controls that actually work

Every effective deepfake defense we have seen deployed at SMB scale reduces to four controls. None of them require new software. All of them require executive sponsorship and written policy.

Control 1: A mandatory out-of-band callback for money movement

This is the single highest-value control. Any wire transfer, ACH initiation, vendor payment change, or payroll direction change above a defined dollar threshold requires a callback to the requestor at a number from the company directory — not from the email, chat, or call that initiated the request.

For SMBs, a reasonable threshold is $5,000. If your finance team pushes back that this will slow down operations, ask them how much a $25,000 wire fraud slows down operations. The callback rule applies to everyone, including the CEO. Especially the CEO. Attackers target CEO requests specifically because employees do not push back.

A typical written policy looks like this:

POLICY: Executive Request Verification (version 1.0)

1. Any request to initiate, modify, or expedite a payment over
   $5,000 must be verified via an out-of-band callback before
   execution. No exceptions for urgency, seniority, or travel.

2. The callback MUST be to a number retrieved from the company
   directory, HR system, or a previously-saved contact. It MUST NOT
   be to a number provided in the request itself.

3. If the requestor cannot be reached, escalate to the finance
   lead and a second authorized signer. Do not execute the request
   based on assumed identity alone.

4. Log every verification attempt, including failures, in the
   finance-ops channel for quarterly review.

Publish this policy, get it signed by the CEO, and train finance on it like you would train them on a new accounting procedure — because that is what it is.

Control 2: Shared duress words and verification phrases

A pre-agreed challenge phrase turns a deepfake from a sure thing into a gamble. The CFO and the finance team agree on a rotating monthly phrase — something unguessable, not on LinkedIn, not in Slack. When a finance team member is on a high-stakes call with what appears to be the CFO, they can casually ask: "Before we finalize, what is the April phrase?" A real CFO answers in two seconds. A deepfake stalls, deflects, or fails outright.

This works because deepfake attacks today are usually scripted or semi-scripted. The attacker has studied the target and rehearsed the scenario. Challenge phrases break the script. Two operational notes:

  • Rotate phrases monthly. Announce them through a channel the attacker is unlikely to have compromised — we recommend a printed handout in finance and a spoken briefing, not email.
  • Treat failure to answer as a confirmed incident. If the "CFO" on a video call cannot or will not produce the phrase, the call ends and incident response begins. No second chances, no embarrassment.

Control 3: Two-person approval for high-risk actions

Anything above a higher threshold — we typically recommend $25,000 for wire transfers, or any modification to vendor banking details regardless of amount — requires written approval from two authorized signers through two separate channels. One of those channels should be a signed document or a ticket in your finance system, not a chat reaction or a verbal "yes" on the same call.

This is standard segregation-of-duties hygiene, and it is how most successful deepfake fraud cases are caught mid-flight. In the Hong Kong $25M case, a single employee made the decision alone in the middle of a video call. Two-person approval would have forced a pause, and the pause is almost always what breaks the attacker's timeline.

Control 4: An incident response plan specifically for suspected impersonation

When an employee suspects they just talked to a deepfake, they need a number to call that is not "ask my manager." Most SMBs have no such number. Build one.

A minimal IR runbook for suspected executive impersonation:

SUSPECTED DEEPFAKE INCIDENT — FIRST 60 MINUTES

Minute 0-5:
  [ ] Employee notifies IT security or their designated backup
  [ ] IT security creates an incident ticket with a high-priority tag
  [ ] Employee PRESERVES the recording if the platform supports it
      (Teams: Start Recording immediately; Zoom: recording is
      already retained if enabled; Phone: note timestamps and
      caller ID)

Minute 5-15:
  [ ] Contact the "impersonated" executive through a known-good
      channel (directory phone, in-person, or a different platform)
  [ ] Confirm whether they were on the suspected call
  [ ] If they were NOT: contain and escalate
  [ ] If they WERE: stand down and document

Minute 15-30:
  [ ] If any financial action was authorized during the call,
      contact the receiving bank IMMEDIATELY to attempt recall
  [ ] Notify finance leadership
  [ ] Notify legal if the amount exceeds the legal threshold for
      mandatory disclosure

Minute 30-60:
  [ ] Preserve all logs: email, chat, calendar invite, platform
      recordings, phone records
  [ ] Open a case with the FBI's IC3 (ic3.gov) if financial loss
      occurred or was attempted
  [ ] Begin the internal investigation timeline

The minute-15 check is the most important line in this runbook. The difference between a $250,000 loss and a $0 loss is almost always how quickly the receiving bank is contacted. Wire recall windows are short — often under four hours — and SMBs frequently miss them because nobody knows which bank to call or who is authorized to make the call.

What to skip, at least for now

The deepfake detection vendor market is loud, and SMBs are frequently sold tools they do not need. A few honest observations based on what we see in assessments.

Real-time video deepfake detection for every call is not realistic at SMB scale. The tools exist — Reality Defender, DuckDuckGoose's Waver, Microblink — but integrating them into every platform and paying per-user licensing is a fight most SMBs should not pick in 2026. Budget that money for verification process maturity and user training first.

Executive digital footprint scrubbing sounds good in a sales deck and is nearly impossible in practice. Every public earnings call, LinkedIn video, and conference panel is a training data source. Accept that your executives are cloneable and invest in the verification side of the equation instead.

A 30-day rollout for SMBs

If you do not have any of the four controls today, here is a realistic 30-day plan to get them in place.

Week 1: Draft the verification policy. Get the CEO and CFO to sign it. Circulate to all authorized signers in finance and operations. Identify a primary and backup IR contact for suspected impersonation incidents.

Week 2: Pick and distribute the first month's challenge phrase. Brief every finance and executive assistant on the callback rule, the challenge phrase, and the two-person approval threshold. Run one tabletop exercise where someone plays an attacker trying to authorize a $40,000 transfer.

Week 3: Publish the suspected deepfake IR runbook to whatever internal wiki or SharePoint your team uses. Add the FBI IC3 link and your bank's wire recall contact numbers. Walk finance leadership through the timeline expectations.

Week 4: Run a second tabletop — this time simulating a video call from a deepfake CEO. Measure how long it takes the employee to trigger the callback rule. Debrief, refine the policy, and schedule quarterly reviews.

Thirty days, zero software licenses, and a meaningful reduction in the blast radius of the next impersonation attempt that lands in your finance team's inbox or calendar.

The broader point

Deepfakes are a preview of a larger shift in threat modeling. Security controls that worked when attackers had to break systems do not work when attackers break trust directly. The organizations that adapt fastest are the ones that treat identity verification as a first-class operational control, not a cultural norm — written down, enforced uniformly, and tested like any other part of incident response.

This is good news for SMBs. Unlike most cybersecurity problems, the right answer here is not another platform. It is policy, process, and a willingness to slow down a transaction long enough to verify who you are actually talking to. The CFO who asks for your challenge phrase is the CFO who deserves to authorize a wire. The one who gets annoyed when you ask is the one you should worry about.

Need an incident response plan built for trust-layer attacks?

Red Hound helps SMBs stand up practical verification policies, run deepfake tabletop exercises, and build incident response runbooks that assume attackers can imitate your executives. If your finance team does not have a written callback policy yet, start there.