Skip to Content
logologo
AI Incident Database
Open TwitterOpen RSS FeedOpen FacebookOpen LinkedInOpen GitHub
Open Menu
Discover
Submit
  • Welcome to the AIID
  • Discover Incidents
  • Spatial View
  • Table View
  • List view
  • Entities
  • Taxonomies
  • Submit Incident Reports
  • Submission Leaderboard
  • Blog
  • AI News Digest
  • Risk Checklists
  • Random Incident
  • Sign Up
Collapse
Discover
Submit
  • Welcome to the AIID
  • Discover Incidents
  • Spatial View
  • Table View
  • List view
  • Entities
  • Taxonomies
  • Submit Incident Reports
  • Submission Leaderboard
  • Blog
  • AI News Digest
  • Risk Checklists
  • Random Incident
  • Sign Up
Collapse

Report 3187

Loading...
Tweet: @RachelTobac
twitter.com · 2023

Here's how I used AI to clone a 60 Minutes correspondent's voice to trick a colleague into handing over her passport number. I cloned Sharyn's voice then manipulated the caller ID to show Sharyn's name with a spoofing tool. The hack took 5 minutes total for me to steal the info.

How to stay safe?

  1. Make sure your folks know that caller ID is easily faked. Voices can also now be impersonated.
  2. If they receive a dire call from "you", verify it's really you w/ another method of communication (text, DM, FT, call, etc) before action (like sending money).

The victims of these impersonation scam calls often realize it's not real JUST AFTER wiring the money to the attacker because they wait to text, call, email, or DM the person being impersonated — then hear back from the impersonated person that they're safe after money is gone 😢

Some suggest setting up a secret "verification word" w/ their loved ones so that if someone impersonates & demands money/access etc you can ask for the verification word to see if it's a real crisis. This won't work for all people but could work for some. If it's a match, use it.

In general, I recommend keeping advice simple: if premise of call is dire use a 2nd method of communication to confirm a person is in trouble before taking action (like wiring money or sensitive data). Rapid text, email, DM, have others message repeatedly — before wiring money.

Bottom line: Scammers use urgency & fear to convince victims to take actions (like sending money, data, etc).

If premise of a call, text, email, or DM is too dire (or too good to be true), that's a likely scam.

Use a 2nd method of communication to check it's real before action!

Reminder: raising awareness of this hacking method isn't "giving the criminal ideas". Criminals are smart! It's their job to be good at tricking people. They already use this method in the wild and this video is teaching folks how to spot & shut it down.

Read the Source

Research

  • Defining an “AI Incident”
  • Defining an “AI Incident Response”
  • Database Roadmap
  • Related Work
  • Download Complete Database

Project and Community

  • About
  • Contact and Follow
  • Apps and Summaries
  • Editor’s Guide

Incidents

  • All Incidents in List Form
  • Flagged Incidents
  • Submission Queue
  • Classifications View
  • Taxonomies

2024 - AI Incident Database

  • Terms of use
  • Privacy Policy
  • Open twitterOpen githubOpen rssOpen facebookOpen linkedin
  • e1b50cd