A few months ago, BR reported on attacks that work very similarly to the analogue “grandson trick”. Attackers pretend to be a close family member, claiming to be in an emergency situation – and in need of money. In reality, they are fraudsters. The aim is as clear as it is obvious: to get money from the caller and take advantage of their good faith.

AI algorithms that simulate familiar voices

Artificial intelligence puts a whole new spin on such attacks. AI algorithms can not only be used to automatically generate text – a use case that the general public has been aware of since ChatGPT. AI algorithms can also be used for “deep fakes”, where photos, videos or even audio sequences are faked. While the forgery of fake videos can often be detected on closer inspection, it is almost impossible to detect fakes in audio sequences. Specifically, the scam works in the same way as any other money scam: the person called (the victim) is put under pressure by the caller (the scammer) that something bad has happened and money is urgently needed. For example, the scammer pretends to be a close family member and says he or she is in hospital. Deep fakes using voice imitations are particularly insidious – because in a real-life stress situation, the imitation is unnoticeable. What is more, as technology advances, these imitations are getting better and better.

Set a shared password

How can you protect yourself? As recommended in the BR article, a shared password (secret) can be agreed. When a supposed victim receives a phone call, he or she should first ask the caller for the secret. If there is no answer or the caller is abusive, it is best to hang up – and try to reach the supposedly distressed family member on their mobile phone, for example.

We are also increasingly seeing such attacks in the business environment. Our awareness training therefore explicitly addresses such attacks. These types of attacks are also covered in our e-learning courses. Would you like to know more about how TEN Information Management can help your organisation to improve its information and IT security? We are available for a free initial consultation.

More articles

AI Risk Assessment vs. AI System Impact Assessment: according to ISO 42001 ISO 42001, the international standard for AI management systems, requires organizations to conduct both an AI Risk Assessment and an AI System Impact...
Platforms such as Mandiant, Recorded Future, and CrowdStrike Falcon Intelligence promise to provide information about the current threat situation in near real time. Many of these tools deliver comprehensive reports and are used by numerous...
A study by G DATA, Statista and brand eins confirms that IT security in the DACH region is in a poor state. Many organizations still believe that attackers are not interested in them. The organizations...