As an moral hacker, I put organizations’ cyberdefenses to the check, and — like malicious menace actors — I do know that social engineering stays some of the efficient strategies for gaining unauthorized entry to non-public IT environments.
The Scattered Spider hacking group has repeatedly confirmed this level in its social engineering assaults concentrating on IT assist desks at main enterprises, together with on line casino giants Caesars Leisure and MGM Resorts, in addition to British retailer Marks and Spencer. In such assaults, a menace actor impersonates a reliable worker and convinces the assistance desk to reset that person’s password, typically utilizing an authoritative tone or sense of urgency to govern the opposite particular person into granting account entry. Such basic social engineering techniques typically handle to bypass technical defenses solely by exploiting human behavioral weaknesses.
I’ve used phone-based social engineering in my very own crimson teaming technique for years, and up to date enhancements in deepfake and voice cloning know-how have made such voice phishing (vishing) assaults much more efficient. On this article, I’ll stroll you thru a current, real-world instance that demonstrates how simply menace actors are actually utilizing AI-enabled deepfakes and voice cloning to deceive finish customers. CISOs should check their organizations’ means to face up to such assaults, in addition to educate staff on what these strategies seem like and methods to cease them.
How an AI voice cloning assault tricked a seasoned worker
As a part of a crimson teaming train, a big enterprise just lately requested me to attempt to hack into the e-mail account of certainly one of its senior leaders. Usually, you want the next three parts to realize entry to an e-mail account:
- The e-mail tackle.
- The password.
- A way of bypassing MFA.
On this case, the goal’s e-mail tackle itself was listed publicly. His info had additionally been uncovered in a number of public information breaches, with the identical password apparently in use throughout a number of separate accounts. I surmised he was doubtless to make use of the identical password for his company account login, as properly.
Defeating the corporate’s MFA, Microsoft Authenticator, was the trickiest a part of the crimson group train. I made a decision the perfect methodology can be to name the goal and impersonate a member of the corporate’s IT group, utilizing voice cloning.
First, I recognized the names of the group’s IT group members on LinkedIn after which additional researched them on Google. I discovered that one of many senior IT leaders had given a presentation at a convention, with a 60-minute video of the session publicly out there on YouTube. It’s doable to clone somebody’s voice with simply three seconds of audio, so I used to be assured an hour-long recording would allow a really correct and convincing duplicate.
I extracted the audio from the YouTube video and used a device known as ElevenLabs to create a voice clone. I then tried to log in to the goal’s e-mail account utilizing the password I had discovered uncovered in earlier third-party information breaches, and as anticipated, it labored.
The profitable login triggered Microsoft Authenticator, sending the goal an MFA push notification on his cellphone. I known as him, utilizing the AI voice cloning software program to impersonate the IT group member in our real-time dialog. I defined to the goal that the IT group was conducting inside upkeep on his account, resulting in the MFA immediate, and requested him to enter the two-digit quantity from my display into his Microsoft Authenticator app. Fully satisfied, he typed within the quantity, thereby giving me entry to his e-mail and SharePoint.
The goal had been with the corporate for 15 years on the time of the crimson group train, so his account held a treasure trove of knowledge. If I had been a malicious hacker, I might have began sending e-mail from his actual e-mail tackle, doubtlessly tricking additional employees members or purchasers into opening malicious paperwork or authorizing monetary transactions.
Classes realized
This instance demonstrates why I’ve been unsurprised to see legal teams more and more turning to vishing-based social engineering as a dependable methodology for gaining preliminary entry to focus on environments. As soon as a menace actor has accessed a Microsoft enterprise account — particularly one with elevated privileges — compromising the community and working ransomware on all endpoints and essential servers is comparatively easy.
To guard towards these kinds of assaults, CISOs should guarantee IT assist groups comply with clear and constant verification procedures in conversations with finish customers. Most significantly, organization-wide safety consciousness coaching ought to educate all staff about these kinds of assaults, the psychological methods they make use of and greatest practices for verifying that somebody is who they declare to be.
Rob Shapland is an moral hacker specializing in cloud safety, social engineering and delivering cybersecurity coaching to corporations worldwide.







