the scary part is how easy this would be to do right now, especially for a larger, higher-profile company. leadership is almost synonymous with an online presence in the form of podcasts, interviews, youtube videos, conference talks. combine that with public photo-sharing app profiles, and you're in business.
It's a sophisticated attack for sure, but the data collection really isn't too difficult now. A minute or two of audio is sufficient for voice, and a single good image.
Only if you intend to run the scam only once, or if all of the work is completely bespoke and not reusable for future attacks.
That seems unlikely. I'm pretty sure there's actually a lot of economies of scale here, where the attackers' pipelines will become vastly more efficient and higher quality over time, with each attack requiring less manual work.
This sounds like it required quite a bit of preparation, i.e. collecting data for each deep-faked participant including image/voice samples.
If it's reaching this level of sophistication already then I suspect a new participant validation scheme is on its way for sensitive meetings.