Your IP: Unknown · Your Status: Unprotected Protected
Blog News

Deepfake bot can forge your nude pic in seconds on Telegram

Nov 03, 2020 · 3 min read

Deepfake bot can forge your nude pic in seconds on Telegram

What a lovely summer day! You take a selfie and upload it to Instagram to show your friends the good time you’re having at your favorite cafe. A few days later, someone sends you an image of you sitting naked in the same position and at the same cafe. You can’t explain how it looks so real – that’s because it’s a deepfake nude photo.

What happened?

Researchers have discovered an easy-to-use deepfake bot on Telegram that has forged nude photos of over 100,000 women. The bot's AI algorithm replaces the clothed parts of an uploaded image with artificially generated nudity. The abusers could modify someone's picture with just a few clicks.

Online abusers publicly posted more than 100,000 non-consensual sexual images made by the bot, but there are probably way more photos out there. Sensity, an independent research company specializing in deep fakes, published a report on the bot claiming that all of the victims were women, and 70% of them were private individuals, not celebrities. A small percent of them were underage.

Cybercriminals promoted the bot via Telegram and VKontakte. There are around 100,000 people in bot-related channels on Telegram, most of which are based in Russia or Eastern Europe.

Why is this scary?

Deepfake technology is an advanced evolution of old-school photo manipulation techniques. It uses a mixture of artificial intelligence, machine learning, and neural networks to produce realistic images or photos of people doing or saying something they never did. For example, it can impose someone else's face on your video, creating the illusions that the person is saying or doing what you did.

Some abusers use deepfakes to discredit or mock politicians or other public figures. Others create deepfake pornogrpahy by abusing popular celebrities' images. One of the most notorious examples was the now-defunct Deepnude app, which would “strip” clothing from photos.

However, this Telegram bot case raises deepfake threats to a new level because it involves private individuals and is dangerously accessible. If you have at least one photo uploaded somewhere online, you could easily become a potential victim of cyber harassment or cyberbullying. Such images can cause psychological damage to their victims not to mention reputation damage or opportunities for blackmail.

How protect yourself

This exploit proves how important it is to keep your personal data to yourself and people you know and trust. Even the most tech-savvy person can become a victim, but here are few tips on how you can reduce your vulnerability:

  • Adjust your social media privacy settings. First of all, make your private data and images as unGoogleable as possible. This may be way more difficult if you are a public person, but at least keep your social media and more intimate info closer to yourself. Adjust your social media settings so that only friends and people you trust can see your profile data;
  • Do not post very private, intimate and confidential content on social media;
  • Curate your friends list. Never add anyone you don't trust to your social media friends list;
  • Immediately contact cyberpolice or other responsible authorities if you become a victim of deepfake abuse or spot such cases. report such cases to the platforms where you witnessed them as well;
  • Use common sense when using online social platforms. Do not send your images to strangers and do not click on obscure links or upload your pictures to shady websites.

Check some more tips on how to secure your data privacy here.

Stay safe!

To learn more about cybersecurity, subscribe to our monthly blog newsletter below!


Paul Black
Paul Black successVerified author

Paul is a technology and art enthusiast who is always eager to explore the most up-to-date issues in cybersec and internet freedom. He is always in search for new and unexplored angles to share with his readers.


Subscribe to NordVPN blog