Breaking
March 17, 2025

The rise of AI voice cloning: A new era of phone scams begins | usagoldmines.com

Imagine being woken up late one Tuesday night by a phone call from your young relative. They’ve been in a car accident and urgently need money sent to their phone, not having their wallet on them. The connection is bad but it does sound like them. Still groggy and confused, you start making the transfer.

Only it’s not them calling you, they’re asleep, safe and sound. You’re talking to a robocall, steered by a scammer and made from a spoofed number. The scammer has cloned your relative’s voice by using their TikTok videos to train a so-called AI model. They’re sitting at a keyboard, guiding the conversation, probably from a country halfway around the globe.

PROMOTION

Stop spam calls and scam messages

Say goodbye to unwanted callers. Get Incogni and reclaim peace of mind from telemarketers, robocallers and scam attempts. We remove your personal data from hundreds of databases with ease, protecting your identity: name, phone numbers, emails, addresses, financial information, and much more.

Let’s take a closer look at what’s happening here. There are two threads that come together in these kinds of scams: the popularity of imposter calls (even as robocalls continue to decline) and the increasing availability of voice-cloning technology.

Imposter calls holding steady

According to an Incogni study, reports of unwanted calls in general, and robocalls in particular, had generally been on the decline from 2017 to 2023. Still, robocalls accounted for 55% of all reported unwanted calls in 2023, even though the ratio of robocalls to live calls was also in decline from 2021 (3.1 robocalls to every live call) to 2023 (1.6:1).

Drilling down into the topics covered during unwanted calls, the same study found that “imposter calls” held steady as being the most common type of call from 2019 to 2023, making up around a third of all reported calls in 2022 and 2023. Imposter calls were defined as “all unwanted calls where the caller impersonated someone else, an agency, or a company.”

To impersonate someone, a scammer would need not only their number and yours, but also some basic information like the person’s name, age and sex. To make a more elaborate imposter call convincing, they’d need a whole host of additional personal data, like ethnicity, hobbies, shopping habits, online activity, criminal and court records, even sexual preferences. This is exactly the kind of data a personal information removal service like Incogni removes from circulation, online and off.

There’s a significant proportion of unwanted calls that rely on impersonation. It’s reasonable to assume that a large number of these calls are scam calls, as it’s difficult to imagine a legitimate reason for a caller pretending to be someone else. What happens when new technologies make it easier for scammers to impersonate not only celebrities and politicians, but everyday people as well?

Voice-cloning technology enters the mix

Recent advances in “AI” technology have resulted in high-quality voice-generating and voice-cloning software being readily available, often for free. These technologies make the nightmare scenario of someone cloning the voice of a loved one and impersonating them on the phone possible.

Combined with number spoofing (making Caller ID display a number different from the one they’re calling from) and the availability of vast amounts of personal information online—including, for many people, voice-samples—these technologies can make for some extremely convincing impersonations.

Here’s how a criminal could execute such a scam:

Step 1: Target selection

If they’re going to go after you, it’s going to have to be worth their while. Scammers can:

  • Buy a ready-made list of people vulnerable to scams directly from a data broker,
  • Browse data broker records, looking for the perfect victim (like someone who’s older and has just sold a property, for example),
  • Buy or download breached or leaked data sets on the dark web,
  • Come across your social media profiles and decide to target you based on what you share there.

Ultimately, anything that suggests to a scammer that you both have something worth stealing and are sufficiently gullible is enough to make you a target.

Step 2: Background research

A scammer is going to need to know at least a few key things about you if they’re going to target you with a convincing scenario. These are some of the more common data points used in impersonation scams:

  • Full name,
  • Contact details, like phone number, email and address,
  • Employment history,
  • Educational background,
  • Financial situation,
  • Criminal history,
  • Relatives,
  • Known associates.

And, of course, they’ll need a similar set of data points on each of your relatives and associates, especially if they’re going to be impersonating one or more of them. Where can they find all this data, nicely packaged into detailed profiles?

Data brokers are companies that specialize in collecting, organizing, and monetizing personal information just like this. With trial memberships available for as little as $1, basically anyone can end up with detailed profiles on you and your close ones with just a few clicks. Personal information removal services like Incogni take these profiles down and request that data brokers stop collecting your data.

Step 3: Collecting voice samples (optional)

If the scammer is planning on impersonating someone over the phone, they’ll need some recordings of that person speaking to give their “AI” software something to imitate. If you post videos of yourself on social media, have a YouTube channel or have appeared on a podcast, this won’t be a problem for them.

Step 4: Number spoofing (also optional)

Again, if the scammer is impersonating someone close to you, it’d be more convincing if the call appeared to be coming from that person’s number. There are several ways to achieve this at little-to-no cost to the scammer, although it might require some technical know-how.

They can’t spoof a number they don’t know, though, so having this kind of personal data purged from the internet can stop even these very technical attacks dead in their tracks.

Step 5: Execution

By now, the scammer now knows a lot about you, about the person they’re going to impersonate, and your shared network of friends, colleagues and relatives. They just need to choose the right time (often when you’re likely to be tired, in a rush or distracted) and make the call.

The relative simplicity of perpetrating a fraud like this goes some way to explaining why the FCC made the use of “AI-generated voices” in robocalls illegal in 2024. Of course, making something illegal only discourages law-abiding people from doing it—scammers are unlikely to take notice.

You might be feeling pretty safe at this point: maybe your loved ones don’t have any voice-recordings out there for the scammer to sample, maybe your phone or carrier has anti-spoofing measures in place, maybe you’re confident that you’d pick up on the fake voice, even if the scammer lowers the audio quality and adds background noise.

The fact is, if you’re an everyday person with not much of an online presence and not much in the way of money to lose, then it’s unlikely you’d be targeted with such an involved scam.

The more likely nightmare scenario

We started with a scenario in which a scammer clones the voice of someone close to you. But we also saw that the voice-cloning and number-spoofing steps are optional—how so? Well, if the scammer knows enough about you and your close one, they don’t need to impersonate them for the scam to work.

It’s late Tuesday night, you’re asleep when your phone wakes you up. You don’t recognize the number. You pick up. It’s a police officer, he says your young relative has been in a car accident and they’re in custody. Your relative asked the police officer to call you, they want to keep the situation under wraps until they can talk to their parents. In the meantime, they need you to bail them out.

Still groggy and confused, you start making the transfer.

In this scenario, the scammer doesn’t need to sound like anyone in particular, just a random police officer. The need for voice cloning goes away, as does the need for number spoofing. The scammer might still need to synthesize a voice, to cover up poor English skills or a suspiciously strong accent, for example, but that’s easy enough to do.

All they really need is to find your and your relative’s records on a data broker’s website.

What you can do

Staying off social media is always a good idea, but not always feasible. Also, not taking part in recorded interviews or presenting your ideas publicly just to avoid voice-cloning attacks seems like throwing the baby out with the bathwater.

Scammers can’t or at least aren’t likely to target you if they can’t find your information on data brokers’ websites in the first place. They also can’t easily figure out who your friends and family are (especially if you’ve set your social media profiles to “private”).

There’s a big difference between a “police officer” calling you to ask about your nephew Daniel Thomas Walsh, born on the 11th of March, 2006, who drives a blue Silverado and would have been on his way home from work at the pizza place, and the same “police officer” umming and ahhing as he can’t really give any details concerning Daniel other than his name.

Take scammers’ best tool away from them by having your personal information removed from data-broker databases. An automated personal information removal service like Incogni can make this an easy, set-and-forget process.

When choosing a data removal service, look for one that covers a wide range of data brokers, including marketing, recruitment, risk-mitigation, and people-search data brokers. Many services remove data only from people search sites, leaving users exposed.

Incogni covers all four of these data broker types, removing personal information from over 220 brokers in total. It also offers a family plan, so you can keep your and your nephew’s information private.

 

This articles is written by : Nermeen Nabil Khear Abdelmalak

All rights reserved to : USAGOLDMIES . www.usagoldmines.com

You can Enjoy surfing our website categories and read more content in many fields you may like .

Why USAGoldMines ?

USAGoldMines is a comprehensive website offering the latest in financial, crypto, and technical news. With specialized sections for each category, it provides readers with up-to-date market insights, investment trends, and technological advancements, making it a valuable resource for investors and enthusiasts in the fast-paced financial world.

Recent:

I’m a desk fidgeter. These 5 fidget toys keep me sane while I work | usagoldmines.com

Don’t be scared! Buy a cheaper laptop and upgrade the storage yourself | usagoldmines.com

Streaming Major League Baseball games: A how-to guide | usagoldmines.com

Best budget computer speakers 2025: Solid PC audio for $100 or less | usagoldmines.com

I love this Steam Sale tool that discovers hidden PC gaming gems | usagoldmines.com

Turn Spring Cleaning Into All-Year Cleaning With These Techniques Lindsey Ellefson | usagoldmines.co...

Apple Seeds Fourth Betas of visionOS 2.4, tvOS 18.4, and watchOS 11.4 Juli Clover | usagoldmines.com

Apple Seeds Fourth iOS 18.4 and iPadOS 18.4 Betas With Priority Notifications, Ambient Music and Mor...

Apple Seeds Fourth Beta of macOS Sequoia 15.4 With Mail Categorization Juli Clover | usagoldmines.co...

Apple Exclusively Selling New 4-in-1 MagSafe Charging Stand Joe Rossignol | usagoldmines.com

Intel's Panther Lake processors won't arrive until Q1 2026 - corroborates previous delay rumors desp...

Samsung's best Dolby Atmos soundbar is being bricked by a new update – here's what we know so far |...

Adolescence is the best show on Netflix right now, and you can watch it in one evening john-anthony....

Microsoft shot itself in the foot with its latest Windows update | usagoldmines.com

Elecom’s world-first Na-ion power bank has 10x more charging cycles than Li-ion | usagoldmines.com

This free tool cuts through Steam Sales and finds the hidden gems | usagoldmines.com

Samsung Galaxy S24 Series Grabs March Update Kellen | usagoldmines.com

Instead of Spring Cleaning, Try Spring Decluttering Lindsey Ellefson | usagoldmines.com

The Seven Deadly Sins of Spring Cleaning Stephen Johnson | usagoldmines.com

I didn't know an SSD could be cute until I saw Seagate's new Genshin Impact limited edition dash.woo...

Quordle hints and answers for Tuesday, March 18 (game #1149) | usagoldmines.com

NYT Connections hints and answers for Tuesday, March 18 (game #646) | usagoldmines.com

NYT Strands hints and answers for Tuesday, March 18 (game #380) | usagoldmines.com

I asked ChatGPT 4o, Gemini Live, and Siri what to wear, and only one could really help me look my be...

Technology monitoring solutions are becoming obsolete | usagoldmines.com

Your next GPU could be from AMD, not Nvidia, if Team Red’s success with PC gamers continues | usago...

The Samsung Galaxy S24 is getting one of the S25’s biggest video upgrades with One UI 7 – here’s why...

Nintendo Switch 2 likely to have AI upscaling similar to PS5 Pro’s PSSR according to patent, and it ...

How Google's new anti-scraping measures are forcing an industry evolution | usagoldmines.com

“More sovereignty and protection” - Google goes all-in on UK AI with data residency, upskilling proj...

Infamous ransomware hackers reveal new tool to brute-force VPNs | usagoldmines.com

I've been using an Apple Watch for 10 years – here are three common mistakes even I've made stephen....

Pebble confirms its smartwatch announcement is just hours away stephen.warwick@futurenet.com (Stephe...

Security issue in open source software leaves businesses concerned for systems | usagoldmines.com

Physicists unlock another clue to brewing the perfect espresso Jennifer Ouellette | usagoldmines.com

A tough race for the rookies as F1 starts 2025 in Australia Jonathan M. Gitlin | usagoldmines.com

Why wait? Google is already dismantling Assistant as it switches to Gemini. Ryan Whitwam | usagoldmi...

This free app unlocks AMD’s FSR 4 for unsupported games | usagoldmines.com

Asus jacks up prices on Nvidia and AMD GPUs | usagoldmines.com

Microsoft’s Remote Desktop app is being killed soon | usagoldmines.com

Logitech’s MX Vertical mouse rarely goes on sale — it’s 30% off now | usagoldmines.com

7 Google Assistant features vanishing soon as Gemini transition approaches | usagoldmines.com

Put Your Kids in Charge of These Spring Cleaning Chores Meghan Moravcik Walbert | usagoldmines.com

The Best Spring Cleaning Tips, According to Pros Lindsey Ellefson | usagoldmines.com

At 50% off, the Blink Mini 2 is a great first home security camera | usagoldmines.com

Never pay full price for Amazon purchases again with this free site | usagoldmines.com

$400 Off the Pixel 9 Pro XL is Happening Right Now For Some Reason Kellen | usagoldmines.com

My Favorite Gadgets to Make Spring Cleaning Actually Kind of Fun Lindsey Ellefson | usagoldmines.com

The Specialty Spring Cleaning Tools That Are Actually Useful Lindsey Ellefson | usagoldmines.com

Mac Studio With M3 Ultra Runs Massive DeepSeek R1 AI Model Locally Tim Hardwick | usagoldmines.com

Apple's First Foldable iPhone Estimated to Cost Nearly Twice as Much as iPhone 16 Pro Max Joe Rossig...

1Password Spring Sale Features Up to 50% Off Plans for Families and Individuals Mitchel Broussard | ...

Get ready to pay $1360 more for the RTX 5090 - Asus just raised prices yet again, and AMD's RX 9070 ...

Huawei might have beaten Apple to the folding phone finish line by creating a foldable 'iPad mini' j...

Switchbot has totally redesigned its smart home hub – and it's great news for renters | usagoldmine...

It’s crunch time for Apple Intelligence as Apple execs look for a solution to the company’s AI woes ...

Circular's new smart ring is getting blood pressure and blood glucose monitoring before the Apple Wa...

Disney+ renews Percy Jackson and the Olympians for season 3, unleashing an epic new odyssey based on...

Knights of the Old Republic remake developer Saber Interactive states all its projects are 'still in...

Worryingly, Google Gemini’s new AI image generation features can be used to remove watermarks from i...

EU tech companies push for digital sovereignty, reducing reliance on US and others benedict.collins@...

Google is slowly phasing out its Assistant helper to make room for Gemini's reign in smartphones - h...

Adobe Summit 2025 - all the news and updates as it happens | usagoldmines.com

Renault unveils its wildest EV to date and it comes with in-wheel motors and a rally-style vertical ...

Latest Snap Spectacles update teases an exciting AR future that I can't wait for hamish.hector@futur...

Microsoft 365 accounts are under attack from new malware spoofing popular work apps | usagoldmines....

One of the most powerful ransomware hacks around has been cracked using some serious GPU power | us...

Demon City on Netflix is Japan's answer to John Wick with a dash of Oldboy, and it rocks | usagoldm...

How to use a virtual number to stay safe from scammers | usagoldmines.com

How to check if your data has already leaked | usagoldmines.com

“They knew everything about me”–How modern identity thieves profile victims | usagoldmines.com

How to take back control after your data was breached | usagoldmines.com

How Surfshark VPN can help you watch content while travelling as if you were still at home | usagol...

Make Chrome secure and private by using the Surfshark VPN extension | usagoldmines.com

Surfshark Antivirus: all-around antivirus protection and more | usagoldmines.com

The digital footprint you leave online & how can Surfshark Antivirus protect it | usagoldmines....

How to delete yourself from the internet | usagoldmines.com

Today’s best laptop deals: Save big on work, school, home use, and gaming | usagoldmines.com

Only $329 for this Ryzen 7 mini PC with 32GB RAM right now | usagoldmines.com

Lenovo ThinkPad X9 14 Aura Edition review: Say goodbye to TrackPoint | usagoldmines.com

Save $560 on HP’s RTX 4070 laptop with 32GB RAM today | usagoldmines.com

Refresh rate vs. frame rate: Why they matter for gaming performance | usagoldmines.com

Use These Room-by-Room Checklists to Spring Clean Your Entire Home Lindsey Ellefson | usagoldmines.c...

Seven Ways to Spring Clean When You're Feeling Lazy Lindsey Ellefson | usagoldmines.com

Alphabet spins off laser-based Internet backbone provider Taara Stephen Morris, Financial Times | us...

The 2025 Cadillac Escalade IQ first drive: 460 miles on a single charge Michael Teo Van Runkle | usa...

Apple Canned Larger iPhone 17 Air Model Over Fears of Bendgate 2.0 Tim Hardwick | usagoldmines.com

Samsung's latest software upgrade could mean Galaxy phones beat iPhones for gaming – but you can't g...

Windows 11 bug deletes Copilot from the OS – is this the first glitch ever some users will be happy ...

'It's a new beginning': Avengers 5 and 6 directors tease what Marvel fans can expect from Doomsday a...

Sony has unveiled some goodies to celebrate God of War’s 20th anniversary, but it's not the remaster...

The iPhone 17 Air could have an affordable price, and better battery life than you might have expect...

The Huawei Watch 3 is a decent Apple Watch alternative, and its successor could be close at hand ste...

Multiple hands-on Google Pixel 9a videos have emerged, days ahead of the likely launch | usagoldmin...

iOS 19 is set to usher in a major redesign – here are 4 things being tipped for the upcoming overhau...

Microsoft Teams has a whole new way for you to talk to (or annoy) your co-workers | usagoldmines.co...

Old Bolt, new tricks: Making an EV into a backup power station with an inverter Kevin Purdy | usagol...

Audi A6 Avant e-tron Supports Apple Car Keys, Porsche Likely to Follow Tim Hardwick | usagoldmines.c...

Laying the foundations for successful GenAI adoption | usagoldmines.com

Many workers are overconfident at spotting phishing attacks | usagoldmines.com

Leave a Reply