Close Menu
GeekBlog

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Stop falling for scams when Norton’s antivirus software is 70% off right now

    March 28, 2026

    Acer Promo Codes and Deals: Save 40% on Bundles

    March 28, 2026

    Playing Wolfenstein 3D with one hand in 2026

    March 28, 2026
    Facebook X (Twitter) Instagram Threads
    GeekBlog
    • Home
    • Mobile
    • Tech News
    • Blog
    • How-To Guides
    • AI & Software
    Facebook
    GeekBlog
    Home»AI & Software»Here’s how deepfake vishing attacks work, and why they can be hard to detect
    AI & Software

    Here’s how deepfake vishing attacks work, and why they can be hard to detect

    Michael ComaousBy Michael ComaousAugust 7, 20253 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
    Illustration of a robot speaking.
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link

    By now, you’ve likely heard of fraudulent calls that use AI to clone the voices of people the call recipient knows. Often, the result is what sounds like a grandchild, CEO, or work colleague you’ve known for years reporting an urgent matter requiring immediate action, saying to wire money, divulge login credentials, or visit a malicious website.

    Researchers and government officials have been warning of the threat for years, with the Cybersecurity and Infrastructure Security Agency saying in 2023 that threats from deepfakes and other forms of synthetic media have increased “exponentially.” Last year, Google’s Mandiant security division reported that such attacks are being executed with “uncanny precision, creating for more realistic phishing schemes.”

    Anatomy of a deepfake scam call

    On Wednesday, security firm Group-IB outlined the basic steps involved in executing these sorts of attacks. The takeaway is that they’re easy to reproduce at scale and can be challenging to detect or repel.

    The workflow of a deepfake vishing attack.

    Credit:
    Group-IB

    The workflow of a deepfake vishing attack.


    Credit:

    Group-IB

    The basic steps are:

    Collecting voice samples of the person who will be impersonated. Samples as short as three seconds are sometimes adequate. They can come from videos, online meetings, or previous voice calls.

    Feeding the samples into AI-based speech synthesis engines, such as Google’s Tacotron 2, Microsoft’s Vall-E, or services from ElevenLabs and Resemble AI. These engines allow the attacker to use a text-to-speech interface that produces user-chosen words in a voice tone and conversational tics of the person being impersonated. Most services bar such use of deepfakes, but as Consumer Reports found in March, the safeguards these companies have in place to curb the practice could be bypassed with minimal effort.

    An optional step is to spoof the number belonging to the person or organization being impersonated. These sorts of techniques have been in use for decades.

    Next, attackers initiate the scam call. In some cases, the cloned voice will follow a script. In other, more sophisticated attacks, the faked speech is generated in real time, using voice masking or transformation software. The real-time attacks can be more convincing because they allow the attacker to respond to questions a skeptical recipient may ask.

    “Although real-time impersonation has been demonstrated by open-source projects and commercial APIs, real-time deepfake vishing in-the-wild remains limited,” Group-IB said. “However, given ongoing advancements in processing speed and model efficiency, real-time usage is expected to become more common in the near future.”

    attacks deepfake detect Hard Heres vishing work
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email Copy Link
    Previous ArticleTrump announces 100% tariffs on semiconductor makers – but Apple won’t be hit, and this key chipmaker will also escape sanctions
    Next Article Massive streaming service data leak sees over 324 million records breached – here’s what we know
    Michael Comaous
    • Website

    Michael Comaous is a dedicated professional with a passion for technology, innovation, and creative problem-solving. Over the years, he has built experience across multiple industries, combining strategic thinking with hands-on expertise to deliver meaningful results. Michael is known for his curiosity, attention to detail, and ability to explain complex topics in a clear and approachable way. Whether he’s working on new projects, writing, or collaborating with others, he brings energy and a forward-thinking mindset to everything he does.

    Related Posts

    6 Mins Read

    Gemini just made it super easy for me to switch from ChatGPT  – here’s how

    3 Mins Read

    Even Realities G2’s biggest software update yet brings an app store and a meeting prep tool that changes how you work

    4 Mins Read

    David Sacks is done as AI czar — here’s what he’s doing instead

    11 Mins Read

    I built an app for work in 5 minutes with Tasklet – and watched my no-code dreams come true

    5 Mins Read

    Opera GX for Linux is way more than great gaming browser – here’s why

    4 Mins Read

    You can get a free iPhone 17e at Visible with this deal – here’s how

    Top Posts

    Discord will require a face scan or ID for full access next month

    February 9, 2026765 Views

    The Mesh Router Placement Strategy That Finally Gave Me Full Home Coverage

    August 4, 2025742 Views

    Trade in your old phone and get up to $1,100 off a new iPhone 17 at AT&T – here’s how

    September 10, 2025323 Views
    Stay In Touch
    • Facebook

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    Discord will require a face scan or ID for full access next month

    February 9, 2026765 Views

    The Mesh Router Placement Strategy That Finally Gave Me Full Home Coverage

    August 4, 2025742 Views

    Trade in your old phone and get up to $1,100 off a new iPhone 17 at AT&T – here’s how

    September 10, 2025323 Views
    Our Picks

    Stop falling for scams when Norton’s antivirus software is 70% off right now

    March 28, 2026

    Acer Promo Codes and Deals: Save 40% on Bundles

    March 28, 2026

    Playing Wolfenstein 3D with one hand in 2026

    March 28, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook
    • About Us
    • Contact us
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    © 2026 GeekBlog

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.