TL;DR
Impersonation in real-time channels (phone, video) is today’s most critical, unmanaged security risk because traditional defenses lack the necessary “trust intelligence” to verify human authenticity instantly. Leading research from Gartner, SACR, and Google confirms that threat groups like Scattered Spider have pivoted to vishing (voice phishing), relying on the ease of impersonating high-value employees to compromise IT help desks. While Generative AI accelerates this threat, analysts at the recent Gartner IAM Summit warned that deepfake detection alone is insufficient due to its probabilistic nature. Instead, security must shift to automated impersonation detection (AIDD/AIV), which uses behavioral, network, and device signals to enforce trust and stop deception before a conversation even begins.
I recently returned from the Gartner Identity & Access Management Summit, and the sessions there solidified a reality that has been emerging across the threat landscape: the battleground has shifted from protecting credentials to verifying authenticity. The insights shared at the conference reinforce recent findings from SACR and Google, confirming that real-time impersonation is the defining blind spot of modern security.
While headlines focus on “deepfakes,” the consensus among analysts is that the problem is much broader. Defenders are facing a structural gap where they cannot distinguish a trusted employee from a malicious actor in live interactions.
1. The Impersonation Blind Spot: A Lack of Unified Trust Intelligence
Impersonation prevention in real-time communications is a blind spot because modern security architectures were not built to validate human trust, especially when that trust is instantly exploited.
Gartner highlights that the inability to definitively know who is on the other end of an interaction is a core failure of existing identity controls. As Gartner notes in Emerging Tech: The 3 Pillars of Disinformation Security Solutions, interactions taken behind the “digital curtain” often provide “little ability to validate users beyond onboarding and credentialing”. Even when security data exists, it is often too fragmented to be actionable in real time:
- Gartner states, “Plenty of data exists to implement impersonation prevention capabilities today; however, these signals are not necessarily being amalgamated into a single picture of user trust”.
- This structural gap allows malicious actors to “take damaging actions under the guise of trusted users”.
To close this gap, Gartner states that impersonation prevention requires “trust intelligence to baseline the predictable actions of employees, customers and partners and rapidly assess legitimate interactions from fake ones”.
2. The Impersonation Gap: Escalation via Vishing and Deepfakes
The urgency of this security gap is dramatically amplified by the threat actor pivot to real-time, identity-focused attacks, which bypass traditional Multi-Factor Authentication (MFA) and other perimeter defenses.
Vishing and Help Desk Exploitation
The crime group Scattered Spider (UNC3944/Octo Tempest) exemplifies the tactical shift to real-time impersonation. They rely heavily on voice phishing (vishing) to exploit human trust within corporate systems. SACR identifies this as the group’s primary initial access strategy:
- SACR notes that Scattered Spider “recently abandoned phishing pages to rely exclusively on vishing (voice phishing) against IT help desk staff as their primary initial access method”.
- The attack involves “impersonating high-value employees to manipulate IT help desk staff into resetting passwords or, critically, re-enrolling Multi-Factor Authentication (MFA) to an attacker-controlled device, thereby bypassing critical security controls”.
This urgency is reinforced by Google in its Cybersecurity Forecast 2026, anticipating that sophisticated threat actors like ShinyHunters (UNC6240) “will accelerate the use of highly manipulative AI-enabled social engineering”. Furthermore, Google warns that vishing is “poised to incorporate AI-driven voice cloning to create hyperrealistic impersonations, notably of executives or IT staff”.
Deepfakes in Video Calls
Generative AI (GenAI) has scaled up the ability of threat actors to execute convincing impersonation in video channels. The prevalence of this threat indicates a severe gap in monitoring synchronous corporate interactions:
- A 2025 Gartner survey found that “36% of respondents… said their organization had experienced social engineering with a deepfake in a video call with an employee”.
- These episodic attacks often target internal surfaces such as corporate meeting solutions (e.g., Microsoft Teams, Zoom).
Why Deepfake Detection is Not Enough (Insights from Gartner IAM)
While the rise of AI-driven fraud suggests a need for “deepfake detection” tools, insights from the recent Gartner Identity & Access Management Summit suggest a different reality.
Analysts Akif Khan and James Hoover explicitly warned against relying solely on content analysis (detecting if a face or voice is “fake”).
They highlighted several critical limitations to a content-only approach:
- Probabilistic Chaos: Deepfake detection is not deterministic; it provides a probability score (e.g., “60% likely fake”). This creates operational paralysis—do you hang up on a major client based on a probability?.
- The Generalization Problem: Accuracy drops significantly—sometimes to 85-90%—when detection models face “zero-day” cloning tools they haven’t been trained on.
- Operational Risk: As stated in the conference materials, organizations must “Mitigate risk by assuming that deepfake detection will fail”.
3. The Emerging Imperative: Detection and the Three Pillars of Security
The fundamental shift in attack tactics has driven the necessity for specialized solution categories focused on verifying human authenticity rather than merely checking content or network perimeter access. This shift is being defined by analysts across two distinct frameworks: Gartner’s Three Pillars of Disinformation Security and SACR’s Impersonation-Focused Markets.
A. Gartner’s Three Pillars of Disinformation Security
In Emerging Tech: The 3 Pillars of Disinformation Security Solutions, Gartner categorizes the defense against these threats into three core pillars:
- Content Authenticity: Requires a multilayered approach to combat deepfakes. This involves evaluating content provenance (C2PA), veracity, metadata, and performing forensic inspection to detect manipulation artifacts.
- Impersonation Prevention: This pillar focuses on leveraging trust intelligence to baseline predictable user actions. Gartner recommends incorporating capabilities to detect impersonations by “evaluating user actions from multiple perspectives, including network intelligence, device fingerprinting and access tokens”.
- Narrative Intelligence: This must evolve from detecting disinformation campaigns to enabling preemptive action. It involves generating counternarratives and using intelligent simulation to test responses before a crisis occurs.
B. SACR’s Impersonation-Focused Markets
To directly address the identity-centric methods of groups like Scattered Spider, SACR highlights several key specialized tool categories that are emerging to close the gap:
- Automated Impersonation & Deepfake Detection (AIDD): This emerging market is focused on detecting deepfakes and behavioral anomalies in real-time synchronous interactions.
- Automated Identity Verification (AIV): These solutions are critical for high-risk processes like IT help desk account recovery, directly countering vishing attacks. SACR explains that AIV platforms implement “robust, policy-driven workflows designed to replace human discretion with standardized, automated checks,” neutralizing social engineering at the crucial initial access stage.
4. The Emerging Solution: Signal-Based Impersonation Detection
To successfully defend against advanced impersonation, the consensus from both the Gartner IAM Summit and research reports is that organizations must look beyond the content and verify the context.
Gartner illustrates that impersonation prevention requires a technology stack spanning several layers of assurance, moving from foundational network checks up to advanced behavioral analysis.
Effective platforms now correlate signals that imposters cannot easily forge, ensuring security systems are focused on a “runtime-based approach”:
- Device Fingerprinting: Identifies unique device identifiers and detects suspicious execution environments, such as emulators or virtual machines, often used to inject fake footage.
- Network Intelligence: Detects if an account is being accessed from an unusual geographic location or a suspicious network, such as a residential proxy.
- Behavioral Biometrics: Analyzes anomalies around day/time, access methods, applications used, tone, and historic actions.
Summary
The real-time impersonation problem is a gap born from security solutions that focus on content and network perimeters, failing to implement the continuous trust verification necessary for live communication channels. Adversaries have successfully transitioned to exploiting this gap, pivoting to vishing (voice phishing) and deepfakes to manipulate employees who lack the automated tools to distinguish a genuine colleague from an attacker.
To mitigate this threat, organizations must adopt solutions—such as those categorized by SACR as AIDD and AIV—that prioritize the detection of behavioral and environmental anomalies over manual checks. As Gartner advises, success hinges on achieving “trust intelligence” by unifying signals across device, network, and access tokens to defeat the impersonator instantly. The defense posture against sophisticated threat groups like Scattered Spider has fundamentally shifted, requiring integrated identity intelligence platforms to ensure operational resilience.
Research & Reports:
- Gartner: Emerging Tech: The 3 Pillars of Disinformation Security Solutions (David Senf, Apeksha Kaushik, Alfredo Ramirez IV, Oct 2025)
- Gartner: Fight AI Disinformation – A CISO Playbook for Working with Your CIO and CMO (Akif Khan, Oct 2025)
- SACR (Software Analyst Cyber Research): Defending the Modern Identity Stack: Scattered Spider and the New Era of Identity Warfare (Lawrence Pingree & Francis Odum, Nov 2025)
- Google Cloud: Cybersecurity Forecast 2026
- Conference Sessions (Gartner Identity & Access Management Summit):
- Akif Khan: How to Stop Deepfake Identity Impersonation Attacks
- James Hoover: Guidance for Workforce Identity Verification
- Emi Chiba: Workforce IAM Begins With Candidates and HR

