Thursday, September 21, 2023
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Malware

The concept of a virtual kidnap

Researcher by Researcher
September 14, 2023
in Malware
0
The concept of a virtual kidnap
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


Cybercrime, Scams, Digital Security, Business Security

With powerful AI, it doesn’t take much to fake a person virtually, and while there are some limitations, voice-cloning can have some dangerous consequences.

Raj Kapoor

02 Aug 2023
 • 
,
3 min. read

The grand theft of Jake Moore’s voice: The concept of a virtual kidnap

Late one night, while mindlessly scrolling through YouTube, I stumbled upon a video that shed light on a disturbing scam utilizing voice AI platforms. It revealed the potential abuse of this technology in a practice known as virtual kidnapping. This article explores the concept behind virtual kidnappings, the methods employed, and the implications of such a scam.

Understanding virtual kidnapping

Virtual kidnapping is a scam that capitalizes on the fear and panic that arises when someone believes their loved one has been kidnapped. Rather than physically abducting the victim, the scammer aims to extort money or gain some advantage by creating a convincing illusion of kidnapping.

Related articles

Who’s Behind the 8Base Ransomware Website? – Krebs on Security

Who’s Behind the 8Base Ransomware Website? – Krebs on Security

September 19, 2023
PC running slow? 10 ways you can speed it up

PC running slow? 10 ways you can speed it up

September 16, 2023

Traditional low-tech method

One of the more traditional approaches to virtual kidnapping involves spoofing the victim’s phone number. The scammer would call a member of the victim’s family or one of the victim’s friends, creating a chaotic atmosphere with background noise to make it seem like the victim is in immediate danger. The scammer would then demand a ransom for the victim’s safe return.

To enhance the credibility of the scam, perpetrators often utilize open-source intelligence (OSINT) to gather information about the victim and their associates. This information helps scammers make the ruse more plausible, such as targeting individuals who are known to be traveling or away from home by monitoring their social media accounts.

Read also: OSINT 101: What is open source intelligence and how is it used?

High-tech voice cloning

A more advanced and refined version of virtual kidnapping involves obtaining samples of the victim’s voice and using AI platforms to create a clone of it. The scammer can then call the victim’s family or friends, impersonating the victim and making alarming demands.

Feasibility of voice cloning

To demonstrate the feasibility of voice cloning, I decided to experiment with free AI-enabled video and audio editing software. By recording snippets of Jake Moore’s well-known voice — Jake is ESET’s Global Security Advisor — I attempted to create a convincing voice clone.

Using the software, I recorded Jake’s voice from various videos available online. The tool generated an audio file and transcript, which I later submitted to the AI-enabled voice cloning service. Although skeptical about the success of the experiment, I received an email notification within 24 hours stating that the voice clone was ready for use.

And here are the results:

AUDIO DOWNLOAD: Jake’s AI generated fake plea

Limitations and potential misuse

While the initial voice cloning attempt showed flaws in pacing and tone and a limited vocabulary, the potential for nefarious use of this technology remains evident. Criminals could exploit virtual kidnapping by sending voice messages that include personal information obtained through OSINT techniques, making the scam more convincing.

Moreover, high-profile individuals, such as managing directors of technology companies, could become targets for voice theft due to their public presence. By stealing their voices, scammers could manipulate employees within the organization to perform undesirable actions. Combined with other social engineering tactics, this could become both a powerful tool and a challenging issue to combat as technology improves.

A cause for concern?

This new modification of the existing virtual kidnapping technique, through which scammers create the illusion of kidnapping without physically abducting anyone, is a concerning development in the realm of cybercrime. The abuse of voice AI platforms to clone voices raises serious ethical and security concerns.

As technology progresses, it is crucial for individuals, organizations, and AI platform developers to be vigilant about the potential misuse of voice cloning and other similar tech. Safeguarding personal information, being cautious with your online presence, and employing robust security measures and training can help mitigate the risks associated with virtual kidnappings and protect against unauthorized voice cloning attempts.

Related reading: FBI warns of voice phishing attacks stealing corporate credentials



Source link

Tags: conceptkidnapvirtual
Share76Tweet47

Related Posts

Who’s Behind the 8Base Ransomware Website? – Krebs on Security

Who’s Behind the 8Base Ransomware Website? – Krebs on Security

September 19, 2023
0

The victim shaming website operated by the cybercriminals behind 8Base — currently one of the more active ransomware groups —...

PC running slow? 10 ways you can speed it up

PC running slow? 10 ways you can speed it up

September 16, 2023
0

A slow-running computer can be a major headache, affecting your productivity and causing unnecessary stress. But before frustration kicks in...

Using Discord? Don’t play down its privacy and security risks

Using Discord? Don’t play down its privacy and security risks

September 16, 2023
0

There are several tools or software applications that enable us to stay connected with our fellow teammates even during gameplay,...

How to work with it – and keep company data secure

How to work with it – and keep company data secure

September 16, 2023
0

Chatbots powered by large language models (LLMs) are not just the world’s new favorite pastime. The technology is increasingly being...

Near-ultrasonic attacks on voice assistants

Near-ultrasonic attacks on voice assistants

September 15, 2023
0

Internet of Things How your voice assistant could do the bidding of a hacker – without you ever hearing a thing...

Load More
  • Trending
  • Comments
  • Latest
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
Supply chain efficiency starts with securing port operations

Supply chain efficiency starts with securing port operations

March 15, 2022
Microsoft to Block Macros by Default in Office Apps

Qakbot Email Thread Hijacking Attacks Drop Multiple Payloads

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
LUCR-3 Attacking Fortune 2000 Companies Using Victims’ Own Tools

LUCR-3 Attacking Fortune 2000 Companies Using Victims’ Own Tools

September 21, 2023
EBANX Furthers Expansion into Africa; Adding 8 new Countries to its Ecosystem

EBANX Furthers Expansion into Africa; Adding 8 new Countries to its Ecosystem

September 21, 2023
Trend Micro Zero-day Vulnerability Let Attackers Run Arbitrary Code

Trend Micro Zero-day Vulnerability Let Attackers Run Arbitrary Code

September 21, 2023
Intel Reveals New 288-Core Sierra Forest CPU, Core Ultra Processors at Intel Innovation 2023

Intel Reveals New 288-Core Sierra Forest CPU, Core Ultra Processors at Intel Innovation 2023

September 21, 2023

Recent Posts

LUCR-3 Attacking Fortune 2000 Companies Using Victims’ Own Tools

LUCR-3 Attacking Fortune 2000 Companies Using Victims’ Own Tools

September 21, 2023
EBANX Furthers Expansion into Africa; Adding 8 new Countries to its Ecosystem

EBANX Furthers Expansion into Africa; Adding 8 new Countries to its Ecosystem

September 21, 2023
Trend Micro Zero-day Vulnerability Let Attackers Run Arbitrary Code

Trend Micro Zero-day Vulnerability Let Attackers Run Arbitrary Code

September 21, 2023

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • LetsAskBinuBlogs
  • Malware
  • Networking
  • Protection

Tags

Access attack Attacks banking BiWeekly bug Cisco cloud code critical Cyber Cybersecurity Data Digital exploited financial Fintech Flaw flaws Google Group Hackers Krebs Latest launches malware Microsoft million Network News open patches platform Ransomware RoundUp security Software Stories TFT Threat Top vulnerabilities vulnerability warns Week

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved