• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Experts Warn of Voice Cloning-as-a-Service

You are here: Home / General Cyber Security News / Experts Warn of Voice Cloning-as-a-Service
May 19, 2023

Security professionals are warning of surging threat actor desire in voice cloning-as-a-provider (VCaaS) offerings on the dark web, developed to streamline deepfake-dependent fraud.

Recorded Future’s newest report, I Have No Mouth and I Must Do Crime, is dependent on threat intelligence investigation of chatter on the cybercrime underground.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Deepfake audio technology can mimic the voice of a goal to bypass multi-factor authentication, spread mis- and disinformation and enrich the performance of social engineering in small business email compromise (BEC)-style attacks, between other items.

Browse much more on deepfakes: FBI: Beware Deepfakes Used to Utilize for Distant Work.

Recorded Future warned that ever more, out-of-the-box voice cloning platforms are readily available on the dark web, lowering the bar to entry for cyber-criminals. Some are absolutely free to use with a registered account though many others price minimal extra than $5 for every month, the vendor claimed.

Amongst the chatter observed by Recorded Upcoming, impersonation, contact-back again frauds and voice phishing are usually mentioned in the context of these kinds of instruments.

In some circumstances, cyber-criminals are abusing legitimate applications this kind of as those people meant for use in audio book voiceovers, film and television dubbing, voice performing and marketing.

Just one seemingly well-liked solution is ElevenLabs’ Key Voice AI program, a browser-based mostly text-to-speech instrument, that permits buyers to upload customized voice samples for a premium charge.

Nevertheless, in proscribing the use of the resource to paid clients, the vendor has encouraged far more dark web innovation, according to the report.

“It has led to an raise in references to risk actors advertising compensated accounts to ElevenLabs – as nicely as marketing VCaaS choices. These new restrictions have opened the doorway for a new type of commodified cybercrime that requirements to be tackled in a multi-layered way,” the report ongoing.

Fortunately, lots of current deepfake voice systems are confined in building only a person-time samples that are unable to be applied in actual-time extended discussions. Even so, an business-wide approach is essential to tackle the threat right before it escalates, Recorded Foreseeable future argued.

“Risk mitigation approaches need to be multidisciplinary, addressing the root will cause of social engineering, phishing and vishing, disinformation, and a lot more. Voice cloning technology is even now leveraged by individuals with precise intentions – it does not conduct attacks on its personal,” the report concluded.

“Therefore, adopting a framework that educates staff members, end users, and consumers about the threats it poses will be extra efficient in the quick-phrase than preventing abuse of the technology by itself – which need to be a long-expression strategic aim.”

Infosecurity approached Recorded Upcoming for even more comment, but it was unwilling to offer anything at all further than the report.


Some elements of this posting are sourced from:
www.infosecurity-magazine.com

Previous Post: «privacy sandbox initiative: google to phase out third party cookies starting Privacy Sandbox Initiative: Google to Phase Out Third-Party Cookies Starting 2024
Next Post: CommonMagic Malware Implants Linked to New CloudWizard Framework Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • OpenAI Unveils Aardvark: GPT-5 Agent That Finds and Fixes Code Flaws Automatically
  • Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack
  • China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats
  • China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems
  • The MSP Cybersecurity Readiness Guide: Turning Security into Growth
  • CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers
  • Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery
  • CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks
  • A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do
  • Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month

Copyright © TheCyberSecurity.News, All Rights Reserved.