Breaking
March 18, 2025

The rise of AI voice cloning: A new era of phone scams begins | usagoldmines.com

Imagine being woken up late one Tuesday night by a phone call from your young relative. They’ve been in a car accident and urgently need money sent to their phone, not having their wallet on them. The connection is bad but it does sound like them. Still groggy and confused, you start making the transfer.

Only it’s not them calling you, they’re asleep, safe and sound. You’re talking to a robocall, steered by a scammer and made from a spoofed number. The scammer has cloned your relative’s voice by using their TikTok videos to train a so-called AI model. They’re sitting at a keyboard, guiding the conversation, probably from a country halfway around the globe.

PROMOTION

Stop spam calls and scam messages

Say goodbye to unwanted callers. Get Incogni and reclaim peace of mind from telemarketers, robocallers and scam attempts. We remove your personal data from hundreds of databases with ease, protecting your identity: name, phone numbers, emails, addresses, financial information, and much more.

Let’s take a closer look at what’s happening here. There are two threads that come together in these kinds of scams: the popularity of imposter calls (even as robocalls continue to decline) and the increasing availability of voice-cloning technology.

Imposter calls holding steady

According to an Incogni study, reports of unwanted calls in general, and robocalls in particular, had generally been on the decline from 2017 to 2023. Still, robocalls accounted for 55% of all reported unwanted calls in 2023, even though the ratio of robocalls to live calls was also in decline from 2021 (3.1 robocalls to every live call) to 2023 (1.6:1).

Drilling down into the topics covered during unwanted calls, the same study found that “imposter calls” held steady as being the most common type of call from 2019 to 2023, making up around a third of all reported calls in 2022 and 2023. Imposter calls were defined as “all unwanted calls where the caller impersonated someone else, an agency, or a company.”

To impersonate someone, a scammer would need not only their number and yours, but also some basic information like the person’s name, age and sex. To make a more elaborate imposter call convincing, they’d need a whole host of additional personal data, like ethnicity, hobbies, shopping habits, online activity, criminal and court records, even sexual preferences. This is exactly the kind of data a personal information removal service like Incogni removes from circulation, online and off.

There’s a significant proportion of unwanted calls that rely on impersonation. It’s reasonable to assume that a large number of these calls are scam calls, as it’s difficult to imagine a legitimate reason for a caller pretending to be someone else. What happens when new technologies make it easier for scammers to impersonate not only celebrities and politicians, but everyday people as well?

Voice-cloning technology enters the mix

Recent advances in “AI” technology have resulted in high-quality voice-generating and voice-cloning software being readily available, often for free. These technologies make the nightmare scenario of someone cloning the voice of a loved one and impersonating them on the phone possible.

Combined with number spoofing (making Caller ID display a number different from the one they’re calling from) and the availability of vast amounts of personal information online—including, for many people, voice-samples—these technologies can make for some extremely convincing impersonations.

Here’s how a criminal could execute such a scam:

Step 1: Target selection

If they’re going to go after you, it’s going to have to be worth their while. Scammers can:

  • Buy a ready-made list of people vulnerable to scams directly from a data broker,
  • Browse data broker records, looking for the perfect victim (like someone who’s older and has just sold a property, for example),
  • Buy or download breached or leaked data sets on the dark web,
  • Come across your social media profiles and decide to target you based on what you share there.

Ultimately, anything that suggests to a scammer that you both have something worth stealing and are sufficiently gullible is enough to make you a target.

Step 2: Background research

A scammer is going to need to know at least a few key things about you if they’re going to target you with a convincing scenario. These are some of the more common data points used in impersonation scams:

  • Full name,
  • Contact details, like phone number, email and address,
  • Employment history,
  • Educational background,
  • Financial situation,
  • Criminal history,
  • Relatives,
  • Known associates.

And, of course, they’ll need a similar set of data points on each of your relatives and associates, especially if they’re going to be impersonating one or more of them. Where can they find all this data, nicely packaged into detailed profiles?

Data brokers are companies that specialize in collecting, organizing, and monetizing personal information just like this. With trial memberships available for as little as $1, basically anyone can end up with detailed profiles on you and your close ones with just a few clicks. Personal information removal services like Incogni take these profiles down and request that data brokers stop collecting your data.

Step 3: Collecting voice samples (optional)

If the scammer is planning on impersonating someone over the phone, they’ll need some recordings of that person speaking to give their “AI” software something to imitate. If you post videos of yourself on social media, have a YouTube channel or have appeared on a podcast, this won’t be a problem for them.

Step 4: Number spoofing (also optional)

Again, if the scammer is impersonating someone close to you, it’d be more convincing if the call appeared to be coming from that person’s number. There are several ways to achieve this at little-to-no cost to the scammer, although it might require some technical know-how.

They can’t spoof a number they don’t know, though, so having this kind of personal data purged from the internet can stop even these very technical attacks dead in their tracks.

Step 5: Execution

By now, the scammer now knows a lot about you, about the person they’re going to impersonate, and your shared network of friends, colleagues and relatives. They just need to choose the right time (often when you’re likely to be tired, in a rush or distracted) and make the call.

The relative simplicity of perpetrating a fraud like this goes some way to explaining why the FCC made the use of “AI-generated voices” in robocalls illegal in 2024. Of course, making something illegal only discourages law-abiding people from doing it—scammers are unlikely to take notice.

You might be feeling pretty safe at this point: maybe your loved ones don’t have any voice-recordings out there for the scammer to sample, maybe your phone or carrier has anti-spoofing measures in place, maybe you’re confident that you’d pick up on the fake voice, even if the scammer lowers the audio quality and adds background noise.

The fact is, if you’re an everyday person with not much of an online presence and not much in the way of money to lose, then it’s unlikely you’d be targeted with such an involved scam.

The more likely nightmare scenario

We started with a scenario in which a scammer clones the voice of someone close to you. But we also saw that the voice-cloning and number-spoofing steps are optional—how so? Well, if the scammer knows enough about you and your close one, they don’t need to impersonate them for the scam to work.

It’s late Tuesday night, you’re asleep when your phone wakes you up. You don’t recognize the number. You pick up. It’s a police officer, he says your young relative has been in a car accident and they’re in custody. Your relative asked the police officer to call you, they want to keep the situation under wraps until they can talk to their parents. In the meantime, they need you to bail them out.

Still groggy and confused, you start making the transfer.

In this scenario, the scammer doesn’t need to sound like anyone in particular, just a random police officer. The need for voice cloning goes away, as does the need for number spoofing. The scammer might still need to synthesize a voice, to cover up poor English skills or a suspiciously strong accent, for example, but that’s easy enough to do.

All they really need is to find your and your relative’s records on a data broker’s website.

What you can do

Staying off social media is always a good idea, but not always feasible. Also, not taking part in recorded interviews or presenting your ideas publicly just to avoid voice-cloning attacks seems like throwing the baby out with the bathwater.

Scammers can’t or at least aren’t likely to target you if they can’t find your information on data brokers’ websites in the first place. They also can’t easily figure out who your friends and family are (especially if you’ve set your social media profiles to “private”).

There’s a big difference between a “police officer” calling you to ask about your nephew Daniel Thomas Walsh, born on the 11th of March, 2006, who drives a blue Silverado and would have been on his way home from work at the pizza place, and the same “police officer” umming and ahhing as he can’t really give any details concerning Daniel other than his name.

Take scammers’ best tool away from them by having your personal information removed from data-broker databases. An automated personal information removal service like Incogni can make this an easy, set-and-forget process.

When choosing a data removal service, look for one that covers a wide range of data brokers, including marketing, recruitment, risk-mitigation, and people-search data brokers. Many services remove data only from people search sites, leaving users exposed.

Incogni covers all four of these data broker types, removing personal information from over 220 brokers in total. It also offers a family plan, so you can keep your and your nephew’s information private.

 

This articles is written by : Nermeen Nabil Khear Abdelmalak

All rights reserved to : USAGOLDMIES . www.usagoldmines.com

You can Enjoy surfing our website categories and read more content in many fields you may like .

Why USAGoldMines ?

USAGoldMines is a comprehensive website offering the latest in financial, crypto, and technical news. With specialized sections for each category, it provides readers with up-to-date market insights, investment trends, and technological advancements, making it a valuable resource for investors and enthusiasts in the fast-paced financial world.

Recent:

SteamOS update preps for third-party handhelds beyond the Steam Deck | usagoldmines.com

HyperX’s Cloud III S headset brings 200 hours of battery on Bluetooth | usagoldmines.com

HP unveils ultra-light OmniBook 7 Aero laptop with Ryzen AI CPU | usagoldmines.com

Gemini Introduces Two New Features to Try: Canvas and Audio Overviews Kellen | usagoldmines.com

We Really Are Getting New Pebble Watches and You Can Pre-Order Them Today Kellen | usagoldmines.com

This Refurbished Apple Watch Ultra (GPS + Cellular) Is $360 Right Now Pradershika Sharma | usagoldmi...

'Find My Device' for Android Now Lets You Track People David Nield | usagoldmines.com

iPad Keyboards Buyer's Guide: 10+ Differences Compared Hartley Charlton | usagoldmines.com

Stop Videos From Looping in the Photos App Tim Hardwick | usagoldmines.com

Unlike the iPhone 16e, the iPhone 17 Air is Expected to Feature MagSafe Joe Rossignol | usagoldmines...

Fortinet firewall bugs are being targeted by LockBit ransomware hackers | usagoldmines.com

Get ready for Audio Overview in Google Gemini, I’ve used it in Notebook LM and it's a complete game ...

Gemini just got a huge writing and coding upgrade - Google keeps making its AI better and ChatGPT sh...

This new HyperX wireless gaming headset can last for up to 200 hours before running out of juice das...

Pebble is back! Pebble founder announces two new smartwatches, and they're basically the opposite of...

HP follows Dell by simplifying almost its entire PC range across laptops and desktops, just in time ...

HP launches its first modular laptop: EliteBook 8 G1 is designed to be repaired and upgraded in minu...

What a surprise! HP positions Qualcomm as AMD's only rival in fiercely contested 40+ TOPS business l...

Criminals are using CSS to get around filters and track email usage | usagoldmines.com

Eight years later, new but familiar-looking PebbleOS watches appear Kevin Purdy | usagoldmines.com

Roku’s latest ad experiment just blew up in its face | usagoldmines.com

Samsung 9100 Pro review: Return of the SSD king | usagoldmines.com

Samsung’s One UI 7 Update Starts April 7 on Galaxy S24, More Devices Kellen | usagoldmines.com

What's New on Disney+ in April 2025 Emily Long | usagoldmines.com

What's New on Hulu in April 2025 Emily Long | usagoldmines.com

Steeper Discounts Hit New M3 iPad Air on Amazon, Now Starting at $549 Mitchel Broussard | usagoldmin...

Here's What's Rumored for the Regular iPhone 17 This Year Joe Rossignol | usagoldmines.com

Microsoft warns of a devious new RAT malware which can avoid detection with apparent ease | usagold...

More US government departments ban controversial AI model DeepSeek | usagoldmines.com

Apple Watch blood pressure monitoring tech revealed in patent stephen.warwick@futurenet.com (Stephen...

Hidden clues suggest Microsoft is moving another part of Windows 11’s Control Panel to the Settings ...

Pokemon and Lego announce the most electrifying collaboration of all time and I’m going to be first ...

Starfield could be getting a PS5 release after fans spot a PlayStation logo on work-in-progress Crea...

BYD’s latest electric vehicle platform can add 249-miles of range in just five minutes – your move T...

NYT Connections hints and answers for Wednesday, March 19 (game #647) | usagoldmines.com

NYT Strands hints and answers for Wednesday, March 19 (game #381) | usagoldmines.com

Quordle hints and answers for Wednesday, March 19 (game #1150) | usagoldmines.com

You can now rent a PS5 and other hardware from PlayStation Direct UK for a monthly fee - here's how ...

Privacy must be a business priority: the urgent need for investment and action | usagoldmines.com

Moana 2 achieves demigod status as the movie sets new streaming record on Disney+ grace.morris@futur...

New OLED pixel breakthrough could make TVs, phones, watches and more much more energy efficient – an...

How phishing attacks are hitting the supply chain – and how to fight back | usagoldmines.com

We love this RTX-powered Acer laptop, and it’s over $700 off right now | usagoldmines.com

I made a ‘paranoid PC’ to dodge hackers. Its secret? An obscure Windows feature | usagoldmines.com

Spring cleaning your PC is super easy with this $10 app | usagoldmines.com

Meta Is Experimenting With AI-Generated Comments, for Some Reason Jake Peterson | usagoldmines.com

Apple Fifth Avenue is Closing Overnight Later This Week, Here's Why Joe Rossignol | usagoldmines.com

Apple Prioritizing Foldable Display Efficiency to Boost Battery Life Hartley Charlton | usagoldmines...

iPhone 17 Pro Said to Feature 12GB of RAM, 48-Megapixel Telephoto Camera, and More Joe Rossignol | u...

Google to acquire cloud security platform Wiz in $32 billion deal benedict.collins@futurenet.com (Be...

Our favorite free photo editor finally got the update it deserves - and these are the top 5 features...

Finally! One UI 7 has a release date - here are the Samsung phones that’ll get it first jamie.richar...

New EV battery boasts 5-min charge time, adding 250 miles of range Jonathan M. Gitlin | usagoldmines...

DOGE cuts to USDA may open door to invasive species, higher food prices Kate Knibbs, wired.com | usa...

This sleek 6-in-1 charging station for home offices is now 40% off | usagoldmines.com

LG’s smart washer & dryer solved my headaches. But now I’m trapped | usagoldmines.com

Today’s best laptop deals: Save big on work, school, home use, and gaming | usagoldmines.com

Amazon Spring Sale 2025: What to expect and best early deals | usagoldmines.com

How to Add Your Passport to Google Wallet Emily Long | usagoldmines.com

TikTok Has a New Security Checkup Dashboard Emily Long | usagoldmines.com

Apple Loses Appeal Against German Regulatory Controls Tim Hardwick | usagoldmines.com

Verdansk returns to Warzone in a matter of weeks and I’m dreaming of the return of two iconic weapon...

Great news! The best gaming CPU ever made is finally available for it's original MSRP again aleksham...

We won't be seeing any Radeon RX 9000 series GPUs from MSI - AMD prioritizes other board partners in...

Nothing’s next-gen CMF cheap earbuds slated to arrive within the month, but don’t expect hi-res audi...

The cutting-edge controllers that'll make your sim feel incredibly real | usagoldmines.com

These fake GitHub "security alerts" could actually let hackers hijack your account | usagoldmines.c...

Microsoft is supercharging Windows 11’s voice commands on Copilot+ PCs with Snapdragon CPUs, and fin...

Apple expert just tipped a load of iPhone 17 upgrades: here are 7 things we’ve learned alexblake.tec...

The Future Games Show returns this week for its Spring Showcase, here's how to watch and what games ...

Apple's rumored foldable iPad tipped to launch sooner than expected with an exciting software twist ...

Google Messages could finally be getting this WhatsApp-style group chat feature jamie.richards@futur...

A worrying critical security flaw in Apache Tomcat could let hackers take over servers with ease | ...

Roku tests showing ads before you even reach the home screen, and it's infuriating users | usagoldm...

A new Garmin study hints at the link between burning calories and happiness, and I've got good and b...

The AMD Ryzen AI Max+ 395 dominates as the "most powerful" APU on the market, but its competition is...

People in this career are better at seeing through optical illusions Martin Doherty and Radoslaw Win...

Even the worst mass extinction had its oases Elizabeth Rayne | usagoldmines.com

Best budget computer speakers 2025: Solid PC audio for $100 or less | usagoldmines.com

Don’t be scared! Buy a cheaper laptop and upgrade the storage yourself | usagoldmines.com

Alienware AW2725Q monitor review: 4K 240Hz QD-OLED glory, for less | usagoldmines.com

I tried running AI chatbots locally on my laptop — and they kinda suck | usagoldmines.com

Resident Evil 3 Now Available on iPhone, iPad, and Mac Tim Hardwick | usagoldmines.com

Apple Debuts Short Film Starring Pedro Pascal With AirPods 4 Tim Hardwick | usagoldmines.com

Ofcom cracks down on UK tech firms, will issue sanctions for illegal content | usagoldmines.com

Someone made a Stardew Valley theme for Wear OS and it's perfect stephen.warwick@futurenet.com (Step...

I tested Samsung's new flagship OLED TV, and it fixes my one key flaw with its predecessor, and has ...

Google rolls out another Chromecast bug fix for users who factory-reset their devices | usagoldmine...

Silent Hill f's content warning has been detailed by the ESRB, and it's not exactly what I'd call li...

Living in the US? You can now measure your online data exposure for free chiara.castro@futurenet.com...

New Playstation studio is helmed by veteran Call of Duty dev and has been 'working away in the shado...

Rumors about a GameCube controller for Switch 2 flare up again, this time thanks to evidence from Ni...

Standalone identity theft protection from Nord Security is now available benedict.collins@futurenet....

Nvidia GTC 2025 - all the news and updates from Jensen Huang keynote as it happens | usagoldmines.c...

Here’s the secret to how Firefly was able to nail its first lunar landing Stephen Clark | usagoldmin...

Farewell Photoshop? Google’s new AI lets you edit images by asking Benj Edwards | usagoldmines.com

Volvo EX90 and EX30 Models Now Support Apple Car Keys Tim Hardwick | usagoldmines.com

What time is Daredevil: Born Again episode 4 going to be released on Disney+? tom.power@futurenet.co...

AI innovation in business: moving beyond scale to drive real results | usagoldmines.com

Subsea internet cables can now ‘listen’ for sabotage using irregular pulses of light benedict.collin...

Leave a Reply