Source |
Mandiant |
Identifiant |
8542844 |
Date de publication |
2024-07-23 14:00:00 (vue: 2024-07-23 17:07:19) |
Titre |
De quelle voix est-ce de toute façon?Vocation à propulsion Ai pour les attaques de vision de nouvelle génération Whose Voice Is It Anyway? AI-Powered Voice Spoofing for Next-Gen Vishing Attacks |
Texte |
Written by: Emily Astranova, Pascal Issa
Executive Summary
AI-powered voice cloning can now mimic human speech with uncanny precision, creating for more realistic phishing schemes.
According to news reports, scammers have leveraged voice cloning and deepfakes to steal over HK$200 million from an organization.
Attackers can use AI-powered voice cloning in various phases of the attack lifecycle, including initial access, and lateral movement and privilege escalation.
Mandiant\'s Red Team uses AI-powered voice spoofing to test defenses, demonstrating the effectiveness of this increasingly sophisticated attack technique.
Organizations can take steps to defend against this threat by educating employees, and using source verification such as code words.
Introduction
Last year, Mandiant published a blog post on threat actor use of generative AI, exploring how attackers were using generative AI (gen AI) in phishing campaigns and information operations (IO), notably to craft more convincing content such as images and videos. We also shared insights into attackers\' use of large language models (LLMs) to develop malware. In the post, we emphasized that while attackers are interested in gen AI, use has remained relatively limited.
This post continues on that initial research, diving into some new AI tactics, techniques, and procedures (TTPs) and trends. We take a look at AI-powered voice spoofing, demonstrate how Mandiant red teams use it to test defenses, and provide security considerations to help stay ahead of the threat.
Growing AI-Powered Voice Spoofing Threat
Gone are the days of robotic scammers with barely decipherable scripts. AI-powered voice cloning can now mimic human speech with uncanny precision, injecting a potent dose of realism into phishing schemes. We are reading more stories on this threat in the news, such as the scammers that reportedly stole over HK$200 million from a company using voice cloning and deepfakes, and now the Mandiant Red Team has incorporated these TTPs when testing defenses.
Brief Overview of Vishing
Unlike its traditionally email-based counterpart, vishing (voice phishing) uses a voice-based approach. Rather than sending out an email with the hopes of garnering clicks, threat actors will instead place phone calls directly to individuals in order to earn trust and manipulate emotions, often by creating a sense of urgency. |
Notes |
★★★
|
Envoyé |
Oui |
Condensat |
2023 abnormal about access accessible according accounts accuracy achieved action actions active actively actor actors adding additional administrator adopt adopted after against agencies ahead alarming algorithms alike all allowing also although and/or another answered any anyway application apply approach are around ask asked asks assessments assets associated astranova attack attacker attackers attacks attention audience audio authentication authenticity authority available awareness back background band banks barely based before began being believe best biometrics blog boss both breach brief but by: bypass bypassed bypassing cadence call caller callers calling calls campaigns can capabilities captcha captured carefully case cases: center chaining challenge channels character chat choices chosen cleaning clicking clicks client cloning code colleagues combination commonly communication company completed completely completion complex compromised conclusion conducted conducting confidential consent consider considerations content continues control controlled controls conversations convincing could counterpart craft crafting create creating creators critical cross crucial curated currently custom data days deal dealing deceive deceptive decipherable deepfakes defend defender defenders defenses demand demonstrate demonstrating detected detecting detection detonation develop developed development device different digital directly discover diving divulging does dose doubt downloading due during ear earn ease easily edge educate educating effective effectiveness element email emails emily emotions emphasized employee employees empowered enables encryption enforce engineering enhanced enough enterprise entities escalation especially establish establishing even eventually ever everyone executing executive executives exercise existence explicit exploitation exploited explored exploring exposure extra extremely facilitate facing factor fall familiar fillers financial first following forward frequency from fueling funds future gain gaining garnering gathering gen generative generators gives global goal going gone good government granting greetings growing had hands hang hanging has have healthy heightened help helpdesk helps hey high higher highlights hk$200 hop hopes host how however human hurdles identified identifying identities identity image images imagine immediate impact impacting imperative imperceptible impersonate impersonated impersonating impersonations implement implemented implementing improve includes including inconsistencies inconsistent incorporated increased increases increasingly individual individuals inflections information inherent initial initially initiate initiated initiating injecting insights instead instilled instructions intelligence interact interaction interested internal introduction involved involves issa its job language large last late lateral laterally layer let level levels leverage leveraged leveraging libraries lifecycle like likely limit limited line links list llms locations look made major making malicious malware management mandiant manipulate many marked materials may meantime measures meeting member message method methodologies microsoft might million mimic mimicry misconfiguration mitigations mobile model models modern money more most move movement multi natural nature necessary need needing network networks new news next noise normally not notably notes now number number/entity numbers objectives obtained obtaining occur offer offers offline often one onto open operations opportune opted order organization organizations oriented osint other otherwise otp out outage over overview particularly party pascal passable password patterns pauses pay payload permission permissions person personal personnel phase phases phishing phone phones place plan played popular positions possess possible post potent potential potentially power powered powerful pre precautions precision prepared pretext previously principles: privilege proactive procedures processing projects prompts protect protecting pr |
Tags |
Malware
Tool
Vulnerability
Threat
Studies
Mobile
Cloud
Technical
|
Stories |
|
Move |
|