Skip to Content
logologo
AI Incident Database
Open TwitterOpen RSS FeedOpen FacebookOpen LinkedInOpen GitHub
Open Menu
Discover
Submit
  • Welcome to the AIID
  • Discover Incidents
  • Spatial View
  • Table View
  • List view
  • Entities
  • Taxonomies
  • Submit Incident Reports
  • Submission Leaderboard
  • Blog
  • AI News Digest
  • Risk Checklists
  • Random Incident
  • Sign Up
Collapse
Discover
Submit
  • Welcome to the AIID
  • Discover Incidents
  • Spatial View
  • Table View
  • List view
  • Entities
  • Taxonomies
  • Submit Incident Reports
  • Submission Leaderboard
  • Blog
  • AI News Digest
  • Risk Checklists
  • Random Incident
  • Sign Up
Collapse

Report 5536

Associated Incidents

Incident 114123 Report
Purported AI Voice Cloning Used to Impersonate Secretary of State Marco Rubio

Loading...
AI-Driven Espionage: Deepfake Rubio Targets U.S. and Foreign Officials
the420.in · 2025

In a disturbing instance of AI misuse, an imposter used an artificially generated voice mimicking U.S. Secretary of State Marco Rubio to reach out to three foreign ministers and two American politicians. According to a confidential U.S. State Department cable accessed by Reuters, the impersonator made these contacts in mid-June using the Signal messaging app---a platform popular for secure communications.

Voicemails were left in two cases, while a third involved a text message inviting the recipient to connect over Signal. The imposter, officials believe, aimed to manipulate these high-profile individuals using AI-generated text and audio to extract sensitive information or gain unauthorized access to accounts.

No Direct Cyber Threat, But Big Red Flags

The State Department, in a cable dated July 3, emphasized that while there was no direct cyberattack on the department, the potential risk lies in the exposure of information if the targeted individuals unknowingly shared sensitive details. The warning was sent to all diplomatic and consular posts, advising staff to remain cautious of fake accounts and impersonation attempts.

This wasn't the first instance. A similar attempt occurred in April, reportedly linked to a Russian hacker who has been previously associated with phishing campaigns targeting think tanks and dissidents in Eastern Europe.

Government Scrambles to Contain Fallout

In response to the incident, the U.S. State Department issued a formal statement acknowledging the situation and confirming an active investigation. A senior official said, "The department is aware of this incident and is currently investigating the matter."

They further emphasized the government's responsibility to safeguard its information and stated that they are continuously improving cybersecurity measures to protect against future threats.

Sophisticated Spoofing with State Branding

The actor behind the impersonation went to great lengths to appear credible. According to the cable, the imposter used a spoofed "@state.gov" email address and replicated logos and branding associated with the U.S. State Department's Bureau of Diplomatic Technology.

This level of detail suggests a high degree of sophistication in the operation, reinforcing fears over how AI and deepfake technologies are becoming potent tools in digital espionage and geopolitical manipulation.

Read the Source

Research

  • Defining an “AI Incident”
  • Defining an “AI Incident Response”
  • Database Roadmap
  • Related Work
  • Download Complete Database

Project and Community

  • About
  • Contact and Follow
  • Apps and Summaries
  • Editor’s Guide

Incidents

  • All Incidents in List Form
  • Flagged Incidents
  • Submission Queue
  • Classifications View
  • Taxonomies

2024 - AI Incident Database

  • Terms of use
  • Privacy Policy
  • Open twitterOpen githubOpen rssOpen facebookOpen linkedin
  • e1b50cd