• About Us
  • Contact Us
  • Terms & Conditions
  • Privacy Policy
Technology Hive
  • Home
  • Technology
  • Artificial Intelligence (AI)
  • Cyber Security
  • Machine Learning
  • More
    • Deep Learning
    • AI in Healthcare
    • AI Regulations & Policies
    • Business
    • Cloud Computing
    • Ethics & Society
No Result
View All Result
  • Home
  • Technology
  • Artificial Intelligence (AI)
  • Cyber Security
  • Machine Learning
  • More
    • Deep Learning
    • AI in Healthcare
    • AI Regulations & Policies
    • Business
    • Cloud Computing
    • Ethics & Society
No Result
View All Result
Technology Hive
No Result
View All Result
Home Technology

How Deepfake Vishing Attacks Work and Why They Can Be Hard to Detect

Linda Torries – Tech Writer & Digital Trends Analyst by Linda Torries – Tech Writer & Digital Trends Analyst
August 7, 2025
in Technology
0
How Deepfake Vishing Attacks Work and Why They Can Be Hard to Detect
0
SHARES
0
VIEWS
Share on FacebookShare on Twitter

Deepfake Scam Calls: A Growing Threat

By now, you’ve likely heard of fraudulent calls that use AI to clone the voice of people the call recipient knows. Often, the result is what sounds like a grandchild, CEO, or work colleague you’ve known for years reporting an urgent matter requiring immediate action, saying wiring money, divulging login credentials, or visiting a malicious website.

Researchers and government officials have been warning of the threat for years, with the Cybersecurity and Infrastructure Security Agency saying in 2023 that threats from deepfakes and other forms of synthetic media have increased “exponentially.” Last year, Google’s Mandiant security division reported that such attacks are being executed with “uncanny precision, creating for more realistic phishing schemes.”

Anatomy of a Deepfake Scam Call

On Wednesday, security firm Group-IB outlined the basic steps involved in executing these sorts of attacks. The takeaway is that they’re easy to reproduce at scale and can be challenging to detect or repel.

The workflow of a deepfake vishing attack.

Credit: Group-IB

Steps Involved in a Deepfake Scam Call

The basic steps are:

Collecting voice samples of the person who will be impersonated. Samples as short as three seconds are sometimes adequate. They can come from videos, online meetings, or previous voice calls.

Feeding the samples into AI-based speech synthesis engines, such as Google’s Tacotron 2, Microsoft’s Vall-E, or services from ElevenLabs and Resemble AI. These engines allow the attacker to use a text-to-speech interface that produces user-chosen words in a voice tone and conversational tics of the person being impersonated. Most services bar such use of deepfakes, but as Consumer Reports found in March, the safeguards these companies have in place to curb the practice could be bypassed with minimal effort.

An optional step is to spoof the number belonging to the person or organization being impersonated. These sorts of techniques have been in use for decades.

Next, attackers initiate the scam call. In some cases, the cloned voice will follow a script. In other, more sophisticated attacks, the faked speech is generated in real time, using voice masking or transformation software. The real-time attacks can be more convincing because they allow the attacker to respond to questions a skeptical recipient may ask.

“Although real-time impersonation has been demonstrated by open-source projects and commercial APIs, real-time deepfake vishing in-the-wild remains limited,” Group-IB said. “However, given ongoing advancements in processing speed and model efficiency, real-time usage is expected to become more common in the near future.”

Conclusion

Deepfake scam calls are a growing threat, and it’s essential to be aware of the risks and take steps to protect yourself. By understanding how these attacks work and being cautious when receiving calls from unknown numbers or familiar voices, you can reduce the risk of falling victim to these scams.

Frequently Asked Questions

Q: What is a deepfake scam call?

A: A deepfake scam call is a type of scam where an attacker uses AI to clone the voice of a person the call recipient knows, in order to trick them into taking a certain action or divulging sensitive information.

Q: How do attackers collect voice samples?

A: Attackers can collect voice samples from videos, online meetings, or previous voice calls. Samples as short as three seconds can be adequate.

Q: Can deepfake scam calls be detected?

A: Detecting deepfake scam calls can be challenging, but being cautious when receiving calls from unknown numbers or familiar voices can help reduce the risk of falling victim to these scams.

Previous Post

States Lead in AI Regulation Amid Federal Inaction

Next Post

Humanities Hold the Key to AI’s Future

Linda Torries – Tech Writer & Digital Trends Analyst

Linda Torries – Tech Writer & Digital Trends Analyst

Linda Torries is a skilled technology writer with a passion for exploring the latest innovations in the digital world. With years of experience in tech journalism, she has written insightful articles on topics such as artificial intelligence, cybersecurity, software development, and consumer electronics. Her writing style is clear, engaging, and informative, making complex tech concepts accessible to a wide audience. Linda stays ahead of industry trends, providing readers with up-to-date analysis and expert opinions on emerging technologies. When she's not writing, she enjoys testing new gadgets, reviewing apps, and sharing practical tech tips to help users navigate the fast-paced digital landscape.

Related Posts

Fast vs Slow: Model Thinking Strategies
Technology

Fast vs Slow: Model Thinking Strategies

by Linda Torries – Tech Writer & Digital Trends Analyst
October 29, 2025
Nvidia Reaches Record  Trillion Valuation Amid AI Bubble Concerns
Technology

Nvidia Reaches Record $5 Trillion Valuation Amid AI Bubble Concerns

by Linda Torries – Tech Writer & Digital Trends Analyst
October 29, 2025
Is Cognition AI Necessary with Claude Code, Cursor, and Copilot?
Technology

Is Cognition AI Necessary with Claude Code, Cursor, and Copilot?

by Linda Torries – Tech Writer & Digital Trends Analyst
October 29, 2025
OpenAI Introduces Open-Weight AI Safety Models
Technology

OpenAI Introduces Open-Weight AI Safety Models

by Linda Torries – Tech Writer & Digital Trends Analyst
October 29, 2025
95% of AI Automation Projects Fail
Technology

95% of AI Automation Projects Fail

by Linda Torries – Tech Writer & Digital Trends Analyst
October 29, 2025
Next Post
Humanities Hold the Key to AI’s Future

Humanities Hold the Key to AI's Future

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Articles

Who Invented Artificial Intelligence?

Who Invented Artificial Intelligence?

February 27, 2025
Huawei Maps Out AI Future in APAC

Huawei Maps Out AI Future in APAC

May 13, 2025
Musk Used Meta’s Llama 2 for Government Slashing, Report Says

Musk Used Meta’s Llama 2 for Government Slashing, Report Says

May 22, 2025

Browse by Category

  • AI in Healthcare
  • AI Regulations & Policies
  • Artificial Intelligence (AI)
  • Business
  • Cloud Computing
  • Cyber Security
  • Deep Learning
  • Ethics & Society
  • Machine Learning
  • Technology
Technology Hive

Welcome to Technology Hive, your go-to source for the latest insights, trends, and innovations in technology and artificial intelligence. We are a dynamic digital magazine dedicated to exploring the ever-evolving landscape of AI, emerging technologies, and their impact on industries and everyday life.

Categories

  • AI in Healthcare
  • AI Regulations & Policies
  • Artificial Intelligence (AI)
  • Business
  • Cloud Computing
  • Cyber Security
  • Deep Learning
  • Ethics & Society
  • Machine Learning
  • Technology

Recent Posts

  • Fast vs Slow: Model Thinking Strategies
  • Cursor 2.0 Debuts Multi-Agent AI Coding with Composer Model
  • DeepSeek may have found a new way to improve AI’s ability to remember
  • Migrating AI from Nvidia to Huawei: Opportunities and Challenges
  • Nvidia Reaches Record $5 Trillion Valuation Amid AI Bubble Concerns

Our Newsletter

Subscribe Us To Receive Our Latest News Directly In Your Inbox!

We don’t spam! Read our privacy policy for more info.

Check your inbox or spam folder to confirm your subscription.

© Copyright 2025. All Right Reserved By Technology Hive.

No Result
View All Result
  • Home
  • Technology
  • Artificial Intelligence (AI)
  • Cyber Security
  • Machine Learning
  • AI in Healthcare
  • AI Regulations & Policies
  • Business
  • Cloud Computing
  • Ethics & Society
  • Deep Learning

© Copyright 2025. All Right Reserved By Technology Hive.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?