Zen Managed ServicesZen Managed ServicesZen Managed ServicesZen Managed Services
  • Services
    • Domain Names
    • Managed Cyber Security
    • Secure VPN
    • Hosting
      • Managed WordPress Hosting
      • ColdFusion Hosting
      • Lucee Hosting
      • SmarterMail Hosting
    • Migration Services
    • Managed WordPress
    • Email Filtering & Archiving
    • Acronis Cloud Backup
  • Support
    • Open Ticket
    • Knowledgebase
    • News/Announcements
  • BLOG
  • Contact
  • Clients
    • Client Area
    • Hosting Control Panel
    • RMM Dashboard

Voice cloning – the latest cybersecurity threat

    Home Security Voice cloning – the latest cybersecurity threat
    Previous
    voice clning cybersecurity threat

    Voice cloning – the latest cybersecurity threat

    By russmichaels | Security | 0 comment | 11 May, 2023 | 0

    Just when you think you’re reasonably on top of all the cyber threats out there, new ones emerge. Say hello to voice cloning. Or don’t say hello to it because you don’t want a scammer to have your voice.

    Voice cloning made headlines recently when scammers called a frantic mom saying they had kidnapped her daughter and demanded $1 million in ransom. They “put her on the phone” and the mother was certain it was her daughter on the other end. It wasn’t her daughter, but it was her daughter’s voice.

    The incident was described in a CNN report which illustrates the wider threat voice cloning poses: Sometimes, the caller reaches out to grandparents and says their grandchild has been in an accident and needs money. Fake kidnappers have used generic recordings of people screaming.

    But federal officials warn such schemes are getting more sophisticated, and that some recent ones have one thing in common: cloned voices. The growth of cheap, accessible artificial intelligence (AI) programs has allowed con artists to clone voices and create snippets of dialogue that sound like their purported captives.

    The next big threat – in reverse

    This same type of voice cloning can be used to breach the perimeter of cyber defences. “This really is the next big thing – in reverse,” explains Jamie Johnson, a cybersecurity expert in Chicago. Johnson says that voice technology was going to add an extra layer of security to systems, but now that inexpensive AI is available, hackers can weaponize voice.

    “Voice cloning is now so authentic, if your boss called you and asked for some passwords or access, would the average employee risk their job by refusing?” Johnson questions. The best cyber defences could succumb if someone unwittingly gives out a password to someone who sounds exactly like their supervisors.

    Johnson also warns that because the threat from voice cloning is so new, many cybersecurity experts simply aren’t equipped to handle it.

    The emerging technology is opening cybercrime to a whole new cohort of criminals that wouldn’t typically have operated in the space. “A criminal with few computer skills can now use AI to create malicious code, spread spam, or writing phishing emails, this is already happening,” Johnson warns.

    Johnson recommends a few best practices for MSPs, and other security specialists:

    Be aware of the threat. The first step is to be aware of the threat of voice cloning. Scammers are using this technology to impersonate people they know, such as your boss, your doctor, or your bank, to trick you into giving them money or sensitive information. “This is where user training goes a long way, a lot of people simply aren’t aware this threat exists,” Johnson explains.

    Be suspicious of unexpected calls or emails. MSPs need to train clients that if someone receives a call or email from someone they don’t know, or from someone they know but who is asking for something unusual, to be suspicious and not give out any personal information or financial information unless they are sure of the person they are talking to. “If your boss never calls you, but suddenly, out of the blue, he or she calls and asks you for access or passwords or to transfer funds, red flags should go up,” he says.

    Social Media Awareness: Employees need to be aware that when they place an audio clip of themselves sampling sushi or cheering on their favorite sports team, their voice can be cloned and used against them, Johnson warns. “It only takes a short, short snippet of audio for a cybercriminal to clone it, maybe 10 to 15 seconds.”

    What Can You Do?

    “MSPs are on the front lines of this emerging threat, so raising awareness is probably the top task,” Johnson says. Beyond awareness, here are some other tips Johnson offers to MSPs and businesses trying to get a handle on this new threat:

    • Use a secure phone system. A secure phone system will have features that make it more difficult for attackers to eavesdrop on calls or intercept data. “Or, better yet, don’t use the phone if you don’t have to, I don’t like to encourage people living and working in fear, but until we get a better handle on this threat, texting and emailing or work apps like Slack can eliminate the voice threat,” Johnson says.
    • Use a firewall. A firewall can help to block unauthorized access to networks and devices. “This is cybersecurity 101″
    • Educate employees about security best practices. Employees should be aware of the risks that voice cloning poses. “Unfortunately, voice cloning is here, and it is a real threat, so cybersecurity specialists will have to adapt accordingly,” Johnson advises.
    No tags.

    russmichaels

    More posts by russmichaels

    Related Posts

    • 7 ways to defend your network from fatal DDoS attacks

      7 ways to defend your network from fatal DDoS attacks

      By russmichaels | 0 comment

      Distributed Denial of Service Attacks (DDoS) are quite different than how they used to be. In the past, DDoS attacks involved sending as much traffic and data as possible to a network or server, withRead more

    • New Gmail security features to protect you from phishing and ransomware

      By russmichaels | 0 comment

      Google is rolling out new security features to help organizations halt email as the attack vector for ransomware. While mass ransomware attacks have become less frequent, targeted attacks are on the rise and causing majorRead more

    • cybersecurity

      Updates to our Cybersecurity solution

      By russmichaels | 0 comment

      Bitdefender has recently released Anti-Exploit, Ransomware Vaccine and Zero Day protection to their Gravity zone product. Anti-Exploit provides on-execution protection against exploit attempts targeting known and unknown vulnerabilities in commonly used applications, such as browser,Read more

    • How to make your Website GDPR compliant

      By russmichaels | 0 comment

      Beginning May 25, 2018, The  GDPR says that users have complete control over their data, and you have to tell them why you need it. At which point, they can give the go-ahead or not.Read more

    • Severe Drupal core remote code execution vulnerability

      By russmichaels | 0 comment

      This morning we are publishing a public service announcement about a severe Drupal core remote code execution vulnerability announced yesterday. If you use Drupal or know someone who does, I’d encourage you to read this post andRead more

    Previous

    Categories

    • News
    • Products & Services
    • Security
    • Tutorials
    • Uncategorized

    Recent Posts

    • Voice cloning – the latest cybersecurity threat
    • 7 ways to defend your network from fatal DDoS attacks
    • New Gmail security features to protect you from phishing and ransomware
    • Updates to our Cybersecurity solution
    • DON’T MISS OUT! – Last chance to claim your .uk domain name

    Recent Comments

      Archives

      • May 2023
      • November 2020
      • June 2019
      • April 2018
      • March 2018
      • November 2017
      • September 2017
      • August 2017
      • July 2017
      • June 2017
      • May 2017
      • April 2017
      • March 2017
      • February 2017
        Legal Documents
      • Hosting Master Service Agreement
      • Terms & Conditions
      • Privacy Policy
      • Services
        • Domain Names
        • Managed Cyber Security
        • Secure VPN
        • Hosting
          • Managed WordPress Hosting
          • ColdFusion Hosting
          • Lucee Hosting
          • SmarterMail Hosting
        • Migration Services
        • Managed WordPress
        • Email Filtering & Archiving
        • Acronis Cloud Backup
      • Support
        • Open Ticket
        • Knowledgebase
        • News/Announcements
      • BLOG
      • Contact
      • Clients
        • Client Area
        • Hosting Control Panel
        • RMM Dashboard
      Zen Managed Services