The Real Asset Security Model Was Built on Friction. AI Just Eliminated It.
The assumption that protected every real asset portfolio for a century, that impersonation was expensive, is dead. The industries that own the physical world are the ones least prepared for what comes next.
May 4, 2026
In February 2024, a finance employee at Arup, the engineering firm behind the Sydney Opera House and Beijing's Bird's Nest Stadium, joined a video call with his CFO and several colleagues to approve a confidential transaction. Every face looked right. Every voice sounded right. Over the following days, he executed fifteen wire transfers totaling HK$200 million, roughly $25 million USD.
He was the only real person on the call.
No network was breached. No password was cracked. No vulnerability was exploited in any piece of software. The attack ran on the one system real estate, construction, hospitality, and logistics have leaned on for a century: human trust, verified by a face and a voice.
That system just broke.
The Assumption That Protected Every Real Asset Portfolio Is Gone
That assumption is dead. Generative AI has driven the marginal cost of impersonation to zero.
What used to take a sophisticated criminal syndicate — voice cloning, face models, real-time video synthesis — now takes a laptop, a handful of commodity tools, and a few minutes of source audio or video. The same content-generation curves that produced ChatGPT have produced a fraud infrastructure, and it has arrived in the one set of industries least prepared to absorb it.
This is not a projection. It is already happening, at a rate that most operators have not registered.
Real assets are uniquely exposed because the operating model sits on three overlapping surfaces: a physical footprint, a digital control layer, and a human approval chain. A modern office tower has an IT network, an OT network running HVAC and elevators and access control and lighting, a property management system, a vendor ecosystem of roughly fifty service providers, and a daily cash movement flow running through a small number of people. The attack no longer starts at the firewall. It starts at the weakest human in that chain, and AI has made every human in that chain weaker at once.
The Convergence Has Already Happened. Most Owners Haven't Noticed.
In September 2023, a loose collective of native-English-speaking social engineers known as Scattered Spider — many of them teenagers — called the IT help desk of MGM Resorts, impersonated an employee whose LinkedIn profile they had scraped, and talked their way into credentials. Within hours they had moved laterally into the systems that run slot machines, hotel keys, and digital signage. MGM disclosed roughly $100 million in impact. Caesars, hit in parallel, reportedly paid around $15 million to make the attackers go away.
These were not cyber attacks in the traditional sense. They were phone calls. The attackers did not need to defeat MGM's billion-dollar surveillance apparatus, its security staff, its physical access controls, or its regulators. They needed to defeat one help-desk worker, once. The physical-world fortress was bypassed by a voice on a phone.
This is the convergence point. Physical security and cyber security are no longer distinct disciplines protecting distinct surfaces. They are two faces of the same attack surface, and the industries that own the physical world still run them as separate budgets, separate vendors, and separate reporting lines. That organizational seam is now the vulnerability.
What the Exposure Looks Like by Asset Class
Office. Building automation systems (HVAC, access control, elevators, lighting, surveillance) are increasingly IP-connected and increasingly administered by small service vendors whose own cyber posture is an open question. A compromised vendor credential is a building-wide vulnerability. A deepfake of the property manager calling the BAS vendor to "reset access" is now a viable attack path. The headline risk is not a ransomed lobby screen. It is an attacker with persistent access to the HVAC of a trophy asset, holding the life-safety implications over the owner's head.
Multifamily. The industry has spent a decade digitizing: online leasing, resident portals, integrated payments, smart locks, package rooms. Each integration is a vendor. Each vendor is an identity surface. The personally identifiable information of tens of thousands of residents sits across property management systems, background check providers, and payment processors. The wire fraud vector is also acute. Rent syndication payouts, construction draws, and vendor payables all move on email-and-phone approval chains that were never designed to withstand synthetic voices.
Hospitality and gaming. MGM and Caesars were the warning shot. Casinos in particular concentrate everything a deepfake-enabled attacker wants: high daily cash flow, complex vendor and entertainment payables, VIP hosts who authorize large transactions by phone, and an OT environment that physically controls the floor. Hotels without gaming are no less exposed. They simply make the news less often.
Data centers. The facilities most aware of cyber risk are also the ones with the most valuable physical access to protect. The path from a deepfaked service ticket to a tech with badge access inside a cage is shorter than most operators want to admit. Hyperscaler tenants are already auditing this path. Colocation operators who can prove a converged physical-and-digital security model will price it into leases within the next 24 months. The ones who cannot will lose deals they do not realize they were in.
Industrial and warehousing. Warehouse management systems, robotic fleets, and yard management increasingly run on networks that touch corporate IT. A logistics operation can be shut down as completely by a ransomware event as by a physical sabotage event, and the deepfake-as-wedge pattern works just as well on a dispatch supervisor as on a CFO. The attack surface of a modern industrial portfolio is no longer a fence line. It is a directory of every human who can authorize movement.
The Loss Curve Is Already Priced In
$200M+ — Deepfake-enabled fraud losses reported in North America, Q1 2025 alone
680% — Year-over-year increase in voice deepfakes in 2024 (Pindrop)
~$500K — Average enterprise loss per deepfake incident in 2024
The Deloitte Center for Financial Services projects that generative-AI-enabled fraud losses in the US will climb from $12.3 billion in 2023 to approximately $40 billion in 2027, a 32% compound annual growth rate. That is not a tail scenario. That is the baseline.
Deepfake-enabled fraud alone accounted for more than $200 million in reported North American losses in the first quarter of 2025. Voice deepfakes rose 680% year-over-year in 2024 per Pindrop. The average enterprise loss per deepfake incident was close to $500,000 in 2024, with some crossing $680,000. These are the numbers real asset operators are competing against when they argue that this quarter's cyber budget can slip another cycle.
What Owners and Operators Actually Need to Do
The instinct of most boards is to buy more software. That is not the answer. The answer is structural.
Rebuild the verification layer on the assumption that voice and video are unreliable. Any financial movement above a defined threshold, any credential reset, any vendor change, and any physical access change requires verification through a second, pre-agreed channel: a callback to a known number, a pre-shared code phrase, or a signed message through a managed platform. This is not exotic. It is what banks have done for decades. Real asset operators have not done it because they did not have to. Now they do.
Converge the security organization. Most real asset platforms still have a Director of IT Security and a VP of Physical Security who do not share a boss below the CEO. That model is obsolete. The function needs a single executive — call it a Chief Security Officer, a Chief Trust Officer, whatever the org tolerates — with authority across both domains and a single incident playbook. The boards that hire this role in 2026 will look prescient by 2028.
Segment OT from IT, ruthlessly. Building automation, access control, elevators, and industrial control systems should not share a network with email. In a non-trivial share of the Class A office stock in the United States, they still do. This is a multi-year retrofit, and it is the largest single risk reducer available to a large owner.
Tabletop the specific scenarios. Run an annual exercise where the attacker is a deepfaked CFO demanding a wire. Another where it is a deepfaked general contractor calling for a construction draw. Another where it is a deepfaked tenant escalating to the BAS vendor. The purpose is not to prove you have a process. It is to discover that you don't.
Audit the vendor perimeter as if it were your own. The number of real estate breaches that have originated in an HVAC contractor, a property management software vendor, or an identity verification provider is too large to be a coincidence. Every major vendor contract should carry cyber and deepfake-response language, with audit rights. Operators with more than 500 vendors need a dedicated vendor risk function. The overwhelming majority do not have one.
Re-read your insurance. Most crime policies do not cover losses initiated by a voluntary, if deceived, transfer. Most cyber policies do not cover social engineering without a specific rider. The Arup-style attack sits in a coverage gap at the majority of real asset operators. The right answer is not to panic. It is to bring the broker in and have the conversation before the incident, not after.
Who's Building the Defense
Two categories of venture-backed companies are worth naming, because the CSO memo you write after reading this piece will need a vendor shortlist. One group is rebuilding cyber defense for the physical asset base itself. The other is attacking the deepfake problem directly. A mature security posture will almost certainly include both.
Cybersecurity for the Physical Asset Base
Countering the Deepfake Directly
The Window
There is a version of this decade in which real asset owners treat the deepfake era the way the industry treated cybersecurity a decade ago: late, underfunded, and by the time the breach happens, too far behind to get ahead of. There is another version in which the best operators treat the convergence of physical and digital security as an operating advantage — where the leasing pitch to a Fortune 500 tenant includes the security posture, where the insurance premiums reflect the sophistication, where the LP update names the CSO.
The marginal cost of impersonation went to zero. The marginal cost of trust did not. The owners and operators who rebuild on that foundation first will compound an advantage that is very hard to replicate once the rest of the market catches up.
The call is coming from inside the building.