{"id":5488,"date":"2025-05-17T05:55:28","date_gmt":"2025-05-16T21:55:28","guid":{"rendered":"https:\/\/cicserver.com\/the-fbi-says-hackers-are-using-ai-voice-clones-to-impersonate-us-government-officials\/"},"modified":"2025-05-17T05:55:28","modified_gmt":"2025-05-16T21:55:28","slug":"the-fbi-says-hackers-are-using-ai-voice-clones-to-impersonate-us-government-officials","status":"publish","type":"post","link":"https:\/\/cicserver.com\/de\/the-fbi-says-hackers-are-using-ai-voice-clones-to-impersonate-us-government-officials\/","title":{"rendered":"The FBI says hackers are using AI voice clones to impersonate US government officials"},"content":{"rendered":"<p><br \/>\n<br \/><img decoding=\"async\" src=\"https:\/\/cdn.mos.cms.futurecdn.net\/LEn4RWFLrJ7FxZPhnQgKsP.jpg\" \/><\/p>\n<div id=\"article-body\">\n<p>Had a call from a senior US official? It probably wasn&#8217;t real. The FBI has issued a warning about an ongoing malicious text and voice messaging campaign in which scammers use AI-generated voices to target victims.<\/p>\n<p>As part of the campaign, threats actors claim to be a senior US official in a bid to access personal accounts. The campaign began in April, according to the law enforcement agency, and it hasn&#8217;t said which senior US officials are being impersonated.<\/p>\n<aside data-block-type=\"embed\" data-render-type=\"fte\" data-skip=\"dealsy\" data-widget-type=\"seasonal\" class=\"hawk-base\"\/>\n<p>AI-generated voice calls have been used in a few high profile attacks. Last year, an executive at Ferrari stymied a similar attack by asking about a book recommended by the person being impersonated.<\/p>\n<p>Similarly, British engineering company Arup paid out $25 million to scammers who set up a false video call meeting to trick an employee while back in 2019 a <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.itpro.com\/social-engineering\/34308\/fraudsters-use-ai-voice-manipulation-to-steal-200000\" data-before-rewrite-localise=\"https:\/\/www.itpro.com\/social-engineering\/34308\/fraudsters-use-ai-voice-manipulation-to-steal-200000\"><u>British energy firm<\/u><\/a> was targeted using AI-generated calls to a cost of more than \u00a3200,000.<\/p>\n<p>In its advisory, the FBI said the &#8220;smishing&#8221; or &#8220;vishing&#8221; attacks, as the American policing agency called them, may be using AI tools to generate the voices.<\/p>\n<p>&#8220;One way the actors gain such access is by sending targeted individuals a malicious link under the guise of transitioning to a separate messaging platform,&#8221; the FBI said in a <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.ic3.gov\/PSA\/2025\/PSA250515\" target=\"_blank\" data-url=\"https:\/\/www.ic3.gov\/PSA\/2025\/PSA250515\" referrerpolicy=\"no-referrer-when-downgrade\" data-hl-processed=\"none\"><u>statement<\/u><\/a>.<\/p>\n<p>Once the account of one person is compromised, it can be used in future attacks.<\/p>\n<div id=\"slice-container-newsletterForm-articleInbodyContent-3JJQ6ioJ3wdYnc9LwVTMbm\" class=\"slice-container newsletter-inbodyContent-slice newsletterForm-articleInbodyContent-3JJQ6ioJ3wdYnc9LwVTMbm slice-container-newsletterForm\">\n<div data-hydrate=\"true\" class=\"newsletter-form__wrapper newsletter-form__wrapper--inbodyContent\">\n<div class=\"newsletter-form__container\">\n<section class=\"newsletter-form__top-bar\"\/>\n<section class=\"newsletter-form__main-section\">\n<p class=\"newsletter-form__strapline\">Sign up today and you will receive a free copy of our Future Focus 2025 report &#8211; the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives<\/p>\n<\/section>\n<\/div>\n<\/div>\n<\/div>\n<p>&#8220;Access to personal or official accounts operated by US officials could be used to target other government officials, or their associates and contacts, by using trusted contact information they obtain,&#8221; the FBI added.<\/p>\n<p>&#8220;Contact information acquired through social engineering schemes could also be used to impersonate contacts to elicit information or funds.&#8221;<\/p>\n<p>The warning comes as <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.itpro.com\/security\/deepfake-attacks-are-prompting-drastic-security-changes-at-enterprises\" data-before-rewrite-localise=\"https:\/\/www.itpro.com\/security\/deepfake-attacks-are-prompting-drastic-security-changes-at-enterprises\"><u>68% of businesses have said<\/u><\/a> they&#8217;ve developed a &#8220;deepfake&#8221; response plan amid the rise in social engineering attacks, with separate research saying nearly <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.itpro.com\/security\/financial-services-workers-are-facing-a-wave-of-deepfake-scams-and-its-only-going-to-get-worse\" data-before-rewrite-localise=\"https:\/\/www.itpro.com\/security\/financial-services-workers-are-facing-a-wave-of-deepfake-scams-and-its-only-going-to-get-worse\"><u>two-thirds of finance professionals<\/u><\/a> had been targeted by deepfake fraud.<\/p>\n<h2 id=\"avoiding-ai-scams-3\">Avoiding AI scams<\/h2>\n<p>The FBI warning noted that the scammers are using software to generate a phone number that isn&#8217;t attributed to a specific phone. As such, anyone unsure of a message should verify the identity of the person calling with a bit of research, independently verify their correct number, and check that any information shared is correct.<\/p>\n<p>However, Max Gannon, intelligence manager at Cofense, noted that threat actors can also spoof known phone numbers of trusted individuals or organizations. This, he said, adds another layer of risk for potential victims.<\/p>\n<p>\u201cPhone filtering does not typically detect when the number is being spoofed, giving a false sense of security to users who rely on their phones to tell them when something is a scam call,\u201d he said.<\/p>\n<p>When examining a video or image for signs of AI, the FBI suggested looking for subtle imperfections such as distorted hands or feet, indistinct faces, inaccurate shadows, voices matching facial movements, and other unnatural movements.<\/p>\n<p>These practices could be the difference between swerving a disaster or falling victim, the agency added. However, it warned that AI-generated content has now \u201cadvanced to the point that it is often difficult to identify\u201d.<\/p>\n<p>As such, the FBI suggested people create a secret word or phrase to prove their identity, as well as the usual security advice of not trusting links or email attachments that haven&#8217;t been verified. Additionally, individuals and enterprises should never send money, gift cards, or cryptocurrency to someone via the internet or phone.<\/p>\n<p>&#8220;Both smishing and vishing techniques rely on social engineering to manipulate recipients, often by instilling a sense of urgency or fear,&#8221; Gannon added.<\/p>\n<p>&#8220;Threat actors are increasingly turning to AI to execute <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.itpro.com\/security\/29093\/what-is-phishing\" data-before-rewrite-localise=\"https:\/\/www.itpro.com\/security\/29093\/what-is-phishing\">phishing <\/a>attacks, making these scams more convincing and nearly indistinguishable from legitimate communication. For traditional phishing alone, Cofense has observed a <a data-analytics-id=\"inline-link\" href=\"https:\/\/tracking.us.nylas.com\/l\/1c295d7974ff4480905f1dd7a9f81ace\/2\/2c41c9dae3f171113bafa8bb059a6533ddfa96f079eadd83ad6f8e9d41fdf00f?cache_buster=1747339979\" target=\"_blank\" data-url=\"https:\/\/tracking.us.nylas.com\/l\/1c295d7974ff4480905f1dd7a9f81ace\/2\/2c41c9dae3f171113bafa8bb059a6533ddfa96f079eadd83ad6f8e9d41fdf00f?cache_buster=1747339979\" referrerpolicy=\"no-referrer-when-downgrade\" data-hl-processed=\"none\"><u>70% increase in BEC attacks from 2023 to 2024<\/u><\/a>, which can be attributed to the increasing use of AI.&#8221;<\/p>\n<h3 class=\"article-body__section\" id=\"section-more-from-itpro\"><span>MORE FROM ITPRO<\/span><\/h3>\n<div class=\"block\" id=\"articleTag\" data-component-name=\"PostArticleLinks\">\n<p>TOPICS<\/p>\n<nav class=\"py-2.5 flex gap-2.5 flex-wrap\" data-analytics-id=\"article-tag\">\n<a class=\"flex-none p-2.5 text-white bg-neutral-950 hover:bg-neutral-500 hover:underline hover:underline-offset-2\" href=\"https:\/\/www.itpro.com\/tag\/social-engineering\" data-before-rewrite-localise=\"\/tag\/social-engineering\">Social Engineering<\/a><br \/>\n<\/nav>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Had a call from a senior US official? It probably wasn&#8217;t real. The FBI has issued a warning about an ongoing malicious text and voice messaging campaign in which scammers use AI-generated voices to target victims. As part of the campaign, threats actors claim to be a senior US official in a bid to access [&hellip;]<\/p>","protected":false},"author":3,"featured_media":5489,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-5488","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-blog"},"_links":{"self":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/posts\/5488","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/comments?post=5488"}],"version-history":[{"count":0,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/posts\/5488\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/media\/5489"}],"wp:attachment":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/media?parent=5488"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/categories?post=5488"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/tags?post=5488"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}