{"id":100270,"date":"2025-10-25T10:22:26","date_gmt":"2025-10-25T10:22:26","guid":{"rendered":"https:\/\/www.newsbeep.com\/nz\/100270\/"},"modified":"2025-10-25T10:22:26","modified_gmt":"2025-10-25T10:22:26","slug":"hackers-use-ai-to-supercharge-social-engineering-attacks","status":"publish","type":"post","link":"https:\/\/www.newsbeep.com\/nz\/100270\/","title":{"rendered":"Hackers Use AI to Supercharge Social Engineering Attacks"},"content":{"rendered":"<p>Cybercriminals are using generative artificial intelligence and synthetic media tools to scale phishing, vishing and callback scams into high-volume, high-precision operations that are harder to spot and costlier to contain.<\/p>\n<p>The result is billions of dollars lost to fraudsters, according to the <a class=\"editor-rtfLink\" href=\"https:\/\/www.fbi.gov\/investigate\" target=\"_blank\" rel=\"noopener nofollow\">FBI<\/a>\u2019s <a class=\"editor-rtfLink\" href=\"https:\/\/www.ic3.gov\/AnnualReport\/Reports\/2024_IC3Report.pdf\" target=\"_blank\" rel=\"noopener nofollow\">2024 Internet Crime Report<\/a>, the most recent year for the report. The agency logged 859,532 complaints and $16.6 billion in losses last year, a 33% increase from 2023. Phishing and spoofing were the most common types of online crime, at 193,407 incidents.<\/p>\n<p>AI-Fueled Trust Exploitation<\/p>\n<p>Social engineering succeeds when attackers exploit human trust, and AI is making that exploitation faster, cheaper and more convincing. An Oct. 16 <a class=\"editor-rtfLink\" href=\"https:\/\/kaufmanrossin.com\/\" target=\"_blank\" rel=\"noopener nofollow\">Kaufman Rossin<\/a> analysis warned that <a class=\"editor-rtfLink\" href=\"https:\/\/kaufmanrossin.com\/blog\/ai-increasing-sophistication-of-social-engineering-attacks\/\" target=\"_blank\" rel=\"noopener nofollow\">fraudsters<\/a> now use vishing, a form of phishing that uses voice calls instead of emails.<\/p>\n<p>\u201cVishing attacks use social engineering techniques to impersonate legitimate callers, such as bank representatives, tech support agents or government officials, in order to trick victims into sharing sensitive information, such as login credentials or credit card numbers,\u201d the analysis said.<\/p>\n<p>These tactics blur the boundary between genuine correspondence and deception.<\/p>\n<p>Meanwhile, \u201c<a class=\"editor-rtfLink\" href=\"https:\/\/www.pymnts.com\/news\/security-and-risk\/2025\/boss-scams-target-new-employees-with-social-engineering\/\" target=\"_blank\" rel=\"noopener nofollow\">boss scams<\/a>,\u201d where criminals impersonate managers and pressure staff to buy gift cards, target new employees. By using data from social media posts, attackers can gain credibility and exploit human psychology before IT systems can intervene.<\/p>\n<p style=\"text-align:center\">Advertisement: Scroll to Continue<\/p>\n<p>It was reported Oct. 6 that <a class=\"editor-rtfLink\" href=\"https:\/\/www.pymnts.com\/news\/artificial-intelligence\/2025\/ai-voices-are-now-indistinguishable-from-humans-experts-say\/?\" target=\"_blank\" rel=\"noopener nofollow\">AI-generated voices<\/a> are now \u201cindistinguishable from genuine ones\u201d in controlled listening tests, enabling more persuasive vishing and callback scams.<\/p>\n<p>A <a class=\"editor-rtfLink\" href=\"https:\/\/innovation.consumerreports.org\/AI-Voice-Cloning-Report-.pdf\" target=\"_blank\" rel=\"noopener nofollow\">Consumer Reports investigation<\/a> found that some commercial voice cloning tools can create convincing replicas with minimal safeguards.<\/p>\n<p>These advances make deception scalable. Fake interactive-voice-response systems powered by generative AI can now mimic authentic bank or tech support lines, adjusting tone and prompts based on the victim\u2019s replies. The FBI\u2019s report said \u201ccyber-enabled fraud\u201d accounted for 83% of total losses in 2024, representing about $13.7 billion across 333,981 complaints. This underscores how trust exploitation has become a defining feature of financial cybercrime.<\/p>\n<p>From Awareness to Resilience<\/p>\n<p>As attackers industrialize persuasion, enterprises are shifting from awareness to layered resilience. Experts advise enforcing multifactor authentication, vaulting credentials, encrypting communications and deploying anomaly detection systems that flag irregular patterns invisible to humans. The <a class=\"editor-rtfLink\" href=\"https:\/\/www.fsisac.com\/\" target=\"_blank\" rel=\"noopener nofollow\">Financial Services Information Sharing and Analysis Center<\/a> recommended using <a class=\"editor-rtfLink\" href=\"https:\/\/www.fsisac.com\/hubfs\/Knowledge\/AI\/FSISAC_CombatingThreatsAndReducingRisksPosedByAI.pdf\" target=\"_blank\" rel=\"noopener nofollow\">AI-driven analytics<\/a> to identify deviations in transaction behavior before funds move.<\/p>\n<p>The <a class=\"editor-rtfLink\" href=\"https:\/\/www.nist.gov\/itl\/applied-cybersecurity\/national-cybersecurity-center-excellence-nccoe\" target=\"_blank\" rel=\"noopener nofollow\">National Cybersecurity Center of Excellence at NIST<\/a> encouraged organizations to stress-test incident response playbooks under simulated AI-enabled <a class=\"editor-rtfLink\" href=\"https:\/\/www.nccoe.nist.gov\/sites\/default\/files\/2025-02\/cyber-ai-concept-paper.pdf\" target=\"_blank\" rel=\"noopener nofollow\">phishing<\/a> events, ensuring coordination across IT, compliance and finance. Meanwhile, a <a class=\"editor-rtfLink\" href=\"https:\/\/www.knowbe4.com\/\" target=\"_blank\" rel=\"noopener nofollow\">KnowBe4<\/a> white paper advised expanding <a class=\"editor-rtfLink\" href=\"https:\/\/www.knowbe4.com\/resources\/whitepapers\/social-engineering-in-the-age-of-ai\" target=\"_blank\" rel=\"noopener nofollow\">employee training<\/a> to include synthetic-voice and video-deepfake scenarios, teaching staff to verify unfamiliar requests through separate channels instead of responding directly.<\/p>\n<p>The PYMNTS Intelligence report \u201c<a class=\"editor-rtfLink\" href=\"https:\/\/www.pymnts.com\/study_posts\/coos-leverage-genai-to-reduce-data-security-losses\/\" target=\"_blank\" rel=\"noopener nofollow\">The AI MonitorEdge Report: COOs Leverage GenAI to Reduce Data Security Losses<\/a>\u201d found that 55% of large organizations have implemented AI-powered <a href=\"https:\/\/www.pymnts.com\/cybersecurity\/2025\/55-of-companies-have-implemented-ai-powered-cybersecurity\/\" target=\"_blank\" rel=\"noopener nofollow\">cybersecurity<\/a> solutions and reported measurable declines in fraud incidents and improved detection times. The shift reflects a growing realization that AI is the weapon and the defense.<\/p>\n<p>Kaufman Rossin recommended pre-designating escalation teams and retaining forensic experts and legal counsel.<\/p>\n<p>Incident response maturity is now a board-level priority rather than a technical afterthought.<\/p>\n<p>The New Front Line<\/p>\n<p>For CFOs, auditors and risk executives, the battleground has moved from network perimeters to human interfaces. In payments, open banking and FinTech ecosystems, identity and trust can be breached through a single synthetic conversation. Securing digital rails remains essential, but preventing manipulation now requires verifying intent as rigorously as identity.<\/p>\n<p>For all PYMNTS AI coverage, subscribe to the daily <a href=\"https:\/\/pymnts.com\/subscribe\/\" target=\"_blank\" rel=\"noopener nofollow\">AI Newsletter<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"Cybercriminals are using generative artificial intelligence and synthetic media tools to scale phishing, vishing and callback scams into&hellip;\n","protected":false},"author":2,"featured_media":100271,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[20],"tags":[365,363,364,1510,3561,111,43,139,69,739,18434,2437,145],"class_list":{"0":"post-100270","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-artificial-intelligence","8":"tag-ai","9":"tag-artificial-intelligence","10":"tag-artificialintelligence","11":"tag-cybersecurity","12":"tag-fraud","13":"tag-new-zealand","14":"tag-news","15":"tag-newzealand","16":"tag-nz","17":"tag-pymnts-news","18":"tag-scams","19":"tag-security","20":"tag-technology"},"_links":{"self":[{"href":"https:\/\/www.newsbeep.com\/nz\/wp-json\/wp\/v2\/posts\/100270","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.newsbeep.com\/nz\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.newsbeep.com\/nz\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/nz\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/nz\/wp-json\/wp\/v2\/comments?post=100270"}],"version-history":[{"count":0,"href":"https:\/\/www.newsbeep.com\/nz\/wp-json\/wp\/v2\/posts\/100270\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/nz\/wp-json\/wp\/v2\/media\/100271"}],"wp:attachment":[{"href":"https:\/\/www.newsbeep.com\/nz\/wp-json\/wp\/v2\/media?parent=100270"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.newsbeep.com\/nz\/wp-json\/wp\/v2\/categories?post=100270"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.newsbeep.com\/nz\/wp-json\/wp\/v2\/tags?post=100270"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}