A few months ago, BR reported on attacks that work very similarly to the analogue “grandson trick”. Attackers pretend to be a close family member, claiming to be in an emergency situation – and in need of money. In reality, they are fraudsters. The aim is as clear as it is obvious: to get money from the caller and take advantage of their good faith.

AI algorithms that simulate familiar voices

Artificial intelligence puts a whole new spin on such attacks. AI algorithms can not only be used to automatically generate text – a use case that the general public has been aware of since ChatGPT. AI algorithms can also be used for “deep fakes”, where photos, videos or even audio sequences are faked. While the forgery of fake videos can often be detected on closer inspection, it is almost impossible to detect fakes in audio sequences. Specifically, the scam works in the same way as any other money scam: the person called (the victim) is put under pressure by the caller (the scammer) that something bad has happened and money is urgently needed. For example, the scammer pretends to be a close family member and says he or she is in hospital. Deep fakes using voice imitations are particularly insidious – because in a real-life stress situation, the imitation is unnoticeable. What is more, as technology advances, these imitations are getting better and better.

Set a shared password

How can you protect yourself? As recommended in the BR article, a shared password (secret) can be agreed. When a supposed victim receives a phone call, he or she should first ask the caller for the secret. If there is no answer or the caller is abusive, it is best to hang up – and try to reach the supposedly distressed family member on their mobile phone, for example.

We are also increasingly seeing such attacks in the business environment. Our awareness training therefore explicitly addresses such attacks. These types of attacks are also covered in our e-learning courses. Would you like to know more about how TEN Information Management can help your organisation to improve its information and IT security? We are available for a free initial consultation.

More articles

The second version of the Network and Information Security Directive (NIS 2) came into force in the EU at the beginning of 2023. The EU member states must transpose NIS 2 into national law by...
Cybersecurity experts from around the world gathered in Nashville, Tennessee from 25-27 October for this year’s ISC2 Secure Congress. It became clear that the information and IT security community cannot ignore the topic of Artificial...
Risk precautions are supposedly just as unwelcome as health precautions. But they are just as important! Various studies prove: Attacks on IT systems and applications are increasing significantly. The consequences are financially devastating. At the...