No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Cybersecurity

AI Voice Cloning Is Giving Rise to Extortion & Vishing Scams

Technology powering new generation of attackers

by Perry Carpenter
September 9, 2024
in Cybersecurity
voice cloning concept speech bubbles repeated

The New York Times dubbed deepfake Elon Musk the biggest scammer on the internet thanks to the proliferation of AI-powered videos. The same technology that can superpower deepfake videos such as those using Musk’s likeness can be turned against corporate executives and leadership, says KnowBe4’s Perry Carpenter, who offers some common-sense advice for security teams.

AI-powered voice cloning isn’t just a nuisance for celebrities, politicians and other public figures. The technology has emerged as a significant threat in the cybersecurity landscape as a vector for social engineering attacks. While many are familiar with its use in entertainment and disinformation, the application of voice cloning in targeted cyberattacks, fraud and extortion schemes poses a growing concern for organizations worldwide.

This evolving threat, known as vishing (voice-based phishing), leverages advanced AI to clone voices of individuals, creating convincing impersonations that can fool even the most vigilant employees. As the technology becomes more sophisticated and accessible, businesses must adapt their security strategies to protect against these novel attack methods.

Corporate security teams now face the challenge of defending against attacks that exploit innate trust in familiar voices, potentially compromising sensitive information, financial assets and even personal safety.

A new generation of attacks

Traditional vishing attacks include robocalls, pre-recorded messages, alleged technical support, bank representatives, IRS officials or someone from a well-known or trusted company. Today’s vishing attacks are entirely different. Threat actors and scammers are using voice cloning technology to run dangerous, scary and highly targeted vishing attacks against their targets, potentially even causing physical harm.

High-value CEO fraud

Scammers recently cloned the voice of Mark Read, the CEO of WPP, and tried to convince an individual to set up a new business with the aim of extracting money and personal details. In 2021, scammers cloned the voice of a company director and convinced bankers to authorize fund transfers to the tune of $40 million. And the New York Times has dubbed deepfake versions of Elon Musk the internet’s biggest scammer.

Virtual kidnapping

An Arizona woman was left shaken after she received a phone call from an unknown person threatening to harm her child if she did not dole out thousands of dollars. The scammer cloned her daughter’s voice to make it sound like she was abducted and crying for help.

Grandparent scams

The elderly are being increasingly targeted with what is known as a grandparent fraud in which people receive unexpected calls from a grandchild claiming to be stuck in a family emergency (accident, jail, lost wallet, help traveling abroad, etc.) begging to have money sent immediately.

rotary phone
Cybersecurity

Your CFO Is Calling: What Are the Risks of Answering?

by Baptiste Collot
May 21, 2024

Security tactics need to match fraudsters’ increasing sophistication

Read moreDetails

How it works & why it’s such a risk

In a recent social engineering contest, the John Henry Competition, I and other researchers demonstrated that it was possible to prompt-engineer large language models and fuse them with audio generation tools to create AI-powered voice phishing bots that can operate autonomously and even outperform experienced human social engineers. Judging by the pace of AI innovation, organized cyber gangs soon will not only clone people’s voices but design and unleash AI-powered bots that will conduct targeted and automated vishing attacks at massive scale.

The internet is already chock full of videos, images and audio recordings of millions — even billions — of people. A McAfee survey found that more than half of all adults share their voice data online (social media, voice notes, etc.) at least once a week. Business executives, too, are easy to find online, as they regularly appear in media interviews, podcasts, events and webinars.

Today’s tech is so powerful that threat actors are able to clone a person’s voice using just a few seconds of audio recording.

Thwarting vishing attempts

Below are best practices and recommendations that can help organizations mitigate these threats:

  1. Keep staff members informed and aware: Update and remind employees about the prevalence of vishing attacks. Ask them to cautiously limit the amount of information they share online, not to succumb to urgency, pressure or emotional manipulation, not to respond to unexpected requests or unsolicited calls and to deflect threats or intimidation.
  2. Update security measures: Update security policies and processes around vishing attacks. Implement security tools that can help verify callers. Use phishing-resistant multi-factor authentication, zero-trust network access and other advanced security controls to protect organizations from social engineering and unauthorized access.
  3. Vishing training and exercises: Leverage vishing simulation exercises and real-world training to protect against vishing attempts. Remaining calm, avoiding revealing sensitive information and reporting suspicious calls are all smart options. Advise them to use a “secret code” with close colleagues and families that only they would know.

 


Tags: Artificial Intelligence (AI)
Previous Post

News Roundup: SEC Actions Heat Up at End of Summer

Next Post

8 Questions to Help Rightsize Responsible AI Governance

Perry Carpenter

Perry Carpenter

Perry Carpenter is an award-winning author, podcaster and speaker, with over two decades in cybersecurity focusing on how cybercriminals exploit human behavior. He is the chief human risk management strategist at KnowBe4. His latest book, “FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation and AI-Generated Deceptions” (2024 Wiley), explores AI's role in deception.

Related Posts

GAN Integrity TPRM & AI

Where TPRM Meets AI: Balancing Risk & Reward

by Corporate Compliance Insights
May 13, 2025

Is your organization prepared for the dual challenges of AI in third-party risk management? Whitepaper Where TPRM Meets AI: Balancing...

tracking prices

Pricing Algorithms Raise New Antitrust Concerns

by FTI Consulting
May 13, 2025

Interdisciplinary frameworks can help manage legal, privacy and consumer protection risks

news roundup data grungy

DEI, Immigration Regulations Lead List of Employers’ Concerns

by Staff and Wire Reports
May 9, 2025

Half of fraud driven by AI; finserv firms cite tech risks in ’25

ai policy

Planning Your AI Policy? Start Here.

by Bradford J. Kelley, Mike Skidgel and Alice Wang
May 7, 2025

Effective AI governance begins with clear policies that establish boundaries for workplace use. Bradford J. Kelley, Mike Skidgel and Alice...

Next Post
ai governance human robot hands

8 Questions to Help Rightsize Responsible AI Governance

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights