Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

New “voice scam” targets your personal information

New “voice scam” targets your personal information

New “voice scam” targets your personal information

Retool is a computer company that helps companies build software.
One day, several employees at Retool received a text message that was supposedly from the company’s IT team.
The text message said that there was a payroll issue that would prevent employees from receiving health insurance coverage.
Out of all the employees who received the text message, only one employee responded to it.
The employee clicked on a URL in the text message, which took the employee to a fake website to log in.
Next, the employee entered their login information into the website.
The login required a two-factor authentication, and to complete the authentication a phone call was placed.
But the call wasn’t from the IT team.
You see, hackers were behind the text message.
And once they had an employee respond they called him to verify the two-factor authentication.
Here’s the crazy part…
The hackers used AI-powered voice cloning to impersonate the IT team member.
So, the hacker had the voice of the familiar IT worker, but the victim employee was actually talking to a hacker.
The company said, /“The voice was familiar with the floor plan of the office, coworkers, and internal processes of the company. Throughout the conversation, the employee grew more and more suspicious, but unfortunately did provide the attacker one additional multi-factor authentication (MFA) code.”/
The hacker had done their homework and had a lot of knowledge about the company.
Once the hacker had full access to internal company systems, they used a cloud syncing function to steal data.
When the company learned about the security breach, they took immediate action to remove the hacker’s access to their internal system.
This is the latest iteration of a hack designed to steal information from companies and individuals.
You see, some companies have begun asking customers to share their voice as another method for verifying their login.
Take for instance your bank.
They already have your address, date of birth, social security number, and other personal details.
Now, they want your voice to help confirm your identity.
For example, TD Bank uses a software called “VoicePrint.” They say it’s similar to a fingerprint.
But while voices are unique, they aren’t 100% secure.
And as this story demonstrates, voice confirmation could lead to more hacks focused on stealing your voice.
Considering this new threat to your safety, here are a few reasons why you shouldn’t share your voice with your bank or any other company that wants to use it.

*Ten seconds: *
A ten second snippet of your actual voice is all hackers need to clone it.
It could even come from a company-wide Zoom meeting.
With merely ten seconds of that audio, a hacker can use software to clone a voice.
So, if you share your voice with your bank or another company it’s likely going to be longer than ten seconds of audio.
And if the audio is then stolen by hackers, they could have a field day cloning your voice.
*Unknown calls:*
Americans receive 2.5 billion spam phone calls per month.
Chances are you get plenty of these annoying calls.
The problem is that these spam calls could also be recording your voice.
So, if you don’t know the phone number don’t pick it up.
Let them leave a voicemail and call them back if it’s legitimate.
Remember, they only need a short clip of your voice, so it’s dangerous to answer any unknown call.
This is also why you don’t want to chit-chat or mess with spam callers.
While you’re having fun messing with them, they could be recording your voice.
*Disable voice assistants:*
It’s estimated that over 140 million Americans use a voice assistant.
From Amazon Alexa to Apple’s Siri almost every device has a voice assistance capability.
What you need to know is that these voice assistants listen and record your voice.
In fact, just a few years ago Amazon was caught storing voice data from Alexa users.
To keep yourself safe, it’s best to simply disable voice assistants on all your devices.
This will prevent bad guys from hacking the voice assistant or the company where your voice data is stored.

_St_ay Safe,

Jason Hanson Editor, /Black Bag Confidential /

*The Spy Briefing Family *
*/ Black Bag Confidential/ Is Just One Small Part of Former CIA Officer Jason Hanson’s Comprehensive Suite of Offerings…*
Whenever you’re ready, here are 3 ways Jason can help YOU stay more prepared and protected in the unpredictable world we live in…
*1. Attend the Ultimate Spy Week*
This is our most popular live event we do all year. It’s an adrenaline-charged week of escape and evasion, shooting, evasive driving, hand to hand self-defense and more. Click here. <pages.spybriefing.com/c/s/6s4R/XFeJS/5/sh/6Frf/6ARGEE/6m12F16nqy/P/P/T8>
*2. Get 3 Crucial Tips About Premium Survival Food*
Discover the devastating reason my family had to rely on our survival food and the 3 crucial tips you must know about getting survival food for your own family. Click here. <pages.spybriefing.com/c/s/6s4R/XFeJS/r/sT/6Frf/6ARGEE/sHQzxx2Ev7/P/P/T8>
*3. Easily Build Your Own “Survival Cache” In Our Expanded Gear Store*
Check out our new survival gear store for incredible knives, t-shirts, videos and more. Click here. <pages.spybriefing.com/c/s/6s4R/XFeJS/Y/si/6Frf/6ARGEE/zxL1G7s7SH/P/P/T8>

Total Page Visits: 811 - Today Page Visits: 6

More Articles

MySQIF Privacy

Why should you use MySQIF™ Privacy App™? Protect your privacy. Protect your trade secrets. Protect your ideas & brainstorming. Protect your

Read More »

Leave a Reply

Your email address will not be published. Required fields are marked *