Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Here’s how I used AI to clone a 60 Minutes correspondent’s voice to trick a colleague into handing over Sharyn's passport number.

Here’s how I used AI to clone a 60 Minutes correspondent’s voice to trick a colleague into handing over Sharyn's passport number.

Scheduled Pinned Locked Moved Uncategorized
2 Posts 2 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • racheltobac@infosec.exchangeR This user is from outside of this forum
    racheltobac@infosec.exchangeR This user is from outside of this forum
    racheltobac@infosec.exchange
    wrote on last edited by
    #1

    Here’s how I used AI to clone a 60 Minutes correspondent’s voice to trick a colleague into handing over Sharyn's passport number. I cloned Sharyn’s voice then manipulated the caller ID to show Sharyn’s name on the caller ID with a spoofing tool.
    The hack took 5 minutes total for me to steal the sensitive information.

    So, how do we protect ourselves, our loved ones, and our organizations?
    1. Make sure the people around you know that caller ID is easily faked (spoofed) and that voices can also be easily impersonated.
    2. If they receive a dire call from “you”, verify it’s really you with another method of communication (text, DM, FT, call, etc) before taking an action (like sending money). Kind of like human MFA.

    Some suggest setting up a secret “verification word” with their folks ones so that if someone impersonates & demands money/access etc you can ask for the verification word to see if it’s a real crisis. This won’t work for all people but could work for some. If it’s a match, use it.

    In general, I recommend keeping advice simple: if premise of call is dire use a 2nd method of communication to confirm a person is in trouble before taking action (like wiring money or sensitive data). Rapid text, email, DM, have others message repeatedly — before wiring money.

    Bottom line is:
    Scammers use urgency & fear to convince victims to take actions (like sending money, data, etc).
    If premise of a call, text, email, or DM is too dire (or too good to be true), that’s a likely scam.
    Use a 2nd method of communication to check it’s real before taking action!

    Link Preview Image
    Ethical hacker scams 60 Minutes staffer to show how easy digital theft is

    Anybody can be hacked, even those who are tech-savvy. An ethical hacker targeted a 60 Minutes employee to show how easy it is to scam people.

    favicon

    (www.cbsnews.com)

    ag100pct@infosec.exchangeA 1 Reply Last reply
    0
    • racheltobac@infosec.exchangeR racheltobac@infosec.exchange

      Here’s how I used AI to clone a 60 Minutes correspondent’s voice to trick a colleague into handing over Sharyn's passport number. I cloned Sharyn’s voice then manipulated the caller ID to show Sharyn’s name on the caller ID with a spoofing tool.
      The hack took 5 minutes total for me to steal the sensitive information.

      So, how do we protect ourselves, our loved ones, and our organizations?
      1. Make sure the people around you know that caller ID is easily faked (spoofed) and that voices can also be easily impersonated.
      2. If they receive a dire call from “you”, verify it’s really you with another method of communication (text, DM, FT, call, etc) before taking an action (like sending money). Kind of like human MFA.

      Some suggest setting up a secret “verification word” with their folks ones so that if someone impersonates & demands money/access etc you can ask for the verification word to see if it’s a real crisis. This won’t work for all people but could work for some. If it’s a match, use it.

      In general, I recommend keeping advice simple: if premise of call is dire use a 2nd method of communication to confirm a person is in trouble before taking action (like wiring money or sensitive data). Rapid text, email, DM, have others message repeatedly — before wiring money.

      Bottom line is:
      Scammers use urgency & fear to convince victims to take actions (like sending money, data, etc).
      If premise of a call, text, email, or DM is too dire (or too good to be true), that’s a likely scam.
      Use a 2nd method of communication to check it’s real before taking action!

      Link Preview Image
      Ethical hacker scams 60 Minutes staffer to show how easy digital theft is

      Anybody can be hacked, even those who are tech-savvy. An ethical hacker targeted a 60 Minutes employee to show how easy it is to scam people.

      favicon

      (www.cbsnews.com)

      ag100pct@infosec.exchangeA This user is from outside of this forum
      ag100pct@infosec.exchangeA This user is from outside of this forum
      ag100pct@infosec.exchange
      wrote last edited by
      #2

      @racheltobac
      You are "spot on" about the urgency and fear aspect. It seems to be part of every scam.

      I always wonder what happened to the enhanced STIR/SHAKEN & Verified Caller Identity proposals

      1 Reply Last reply
      1
      0
      • R relay@relay.infosec.exchange shared this topic
      Reply
      • Reply as topic
      Log in to reply
      • Oldest to Newest
      • Newest to Oldest
      • Most Votes


      • Login

      • Login or register to search.
      • First post
        Last post
      0
      • Categories
      • Recent
      • Tags
      • Popular
      • World
      • Users
      • Groups