{"id":167893,"date":"2024-05-15T12:23:41","date_gmt":"2024-05-15T19:23:41","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=167893"},"modified":"2025-07-08T18:41:33","modified_gmt":"2025-07-09T01:41:33","slug":"artificial-imposters-cybercriminals-turn-to-ai-voice-cloning-for-a-new-breed-of-scam","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/artificial-imposters-cybercriminals-turn-to-ai-voice-cloning-for-a-new-breed-of-scam\/","title":{"rendered":"Artificial Imposters\u2014Cybercriminals Turn to AI Voice Cloning for a New Breed of Scam"},"content":{"rendered":"<p><span data-contrast=\"none\">Three seconds of audio is all it takes.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Cybercriminals have taken up newly forged artificial intelligence <\/span><span data-contrast=\"none\">(<\/span><span data-contrast=\"none\">AI<\/span><span data-contrast=\"none\">)<\/span><span data-contrast=\"none\"> voice cloning tools and created a new breed of scam. With a small sample of audio, they can clone the voice of nearly anyone and send bogus messages by voicemail or voice messaging texts.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">The aim, most often, is to trick people out of hundreds, if not thousands, of dollars.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"none\">The rise of AI voice cloning attacks\u00a0<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">Our recent global study found that out of 7,000 people surveyed, one in four said that they had experienced an AI voice cloning scam or knew someone who had. Further, our research team at McAfee Labs discovered just how easily cybercriminals can pull off these scams.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">With a small sample of a person\u2019s voice and a script cooked up by a cybercriminal, these voice clone messages sound convincing, 70% of people in our worldwide survey said they weren\u2019t confident they could tell the difference between a cloned voice and the real thing.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Cybercriminals create the kind of messages you might expect. Ones full of urgency and distress. They<\/span> <span data-contrast=\"none\">will use the cloning tool to impersonate a victim\u2019s friend or family member with a voice message that says they\u2019ve been in a car accident, or maybe that they\u2019ve been robbed or injured. Either way, the bogus message often says they need money right away.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">In all, the approach has proven quite effective so far. One in ten of people surveyed in our study said they received a message from an AI voice clone, and 77% of those victims said they lost money as a result.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"none\">The cost of AI voice cloning attacks\u00a0<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">Of the people who reported losing money, 36% said they lost between $500 and $3,000, while 7% got taken for sums anywhere between $5,000 and $15,000.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Of course, a clone needs an original. Cybercriminals have no difficulty sourcing original voice files to create their clones. Our study found that 53% of adults said they share their voice data online or in recorded notes at least once a week, and 49% do so up to ten times a week. All this activity generates voice recordings that could be subject to hacking, theft, or sharing (whether accidental or maliciously intentional). <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.mcafee.com\/content\/dam\/consumer\/en-us\/resources\/cybersecurity\/artificial-intelligence\/rp-beware-the-artificial-impostor-report.pdf\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-169713\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/AI_VoiceScams_Infographics-04.jpg\" alt=\"\" width=\"511\" height=\"511\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/AI_VoiceScams_Infographics-04.jpg 1080w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/AI_VoiceScams_Infographics-04-300x300.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/AI_VoiceScams_Infographics-04-1024x1024.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/AI_VoiceScams_Infographics-04-150x150.jpg 150w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/AI_VoiceScams_Infographics-04-768x768.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/AI_VoiceScams_Infographics-04-129x129.jpg 129w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/AI_VoiceScams_Infographics-04-24x24.jpg 24w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/AI_VoiceScams_Infographics-04-48x48.jpg 48w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/AI_VoiceScams_Infographics-04-96x96.jpg 96w\" sizes=\"auto, (max-width: 511px) 100vw, 511px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><span data-contrast=\"none\">Consider that people post videos of themselves on YouTube, share reels on social media, and perhaps even participate in podcasts. Even by accessing relatively public sources, cybercriminals can stockpile their arsenals with powerful source material.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Nearly half (45%) of our survey respondents said they would reply to a voicemail or voice message purporting to be from a friend or loved one in need of money, particularly if they thought the request had come from their partner or spouse (40%), mother (24%), or child (20%).\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Further, they reported they\u2019d likely respond to one of these messages if the message sender said:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">They\u2019ve been in a car accident (48%).<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"none\">They\u2019ve been robbed (47%).<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"none\">They\u2019ve lost their phone or wallet (43%).<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"none\">They needed help while traveling abroad (41%).<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"none\">These messages are the latest examples of targeted \u201cspear phishing\u201d attacks, which target specific people with specific information that seems just credible enough to act on it. <\/span><span data-contrast=\"none\">Cybercriminals<\/span><span data-contrast=\"none\"> will often source this information from public social media profiles and other places online where people post about themselves, their families, their travels, and so on\u2014and then attempt to cash in. <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Payment methods vary, yet cybercriminals often ask for forms that are difficult to trace or recover, such as gift cards, wire transfers, reloadable debit cards, and even cryptocurrency. As always, requests for these kinds of payments raise a major red flag. It could very well be a scam.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">AI voice cloning tools\u2014freely available to cybercriminals<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">In conjunction with this survey, researchers at McAfee Labs spent two weeks investigating the accessibility, ease of use, and efficacy of AI voice cloning tools. Readily, they found more than a dozen freely available on the internet.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">These tools required only a basic level of experience and expertise to use. In one instance, just three seconds of audio was enough to produce a clone with an 85% voice match to the original (based on the benchmarking and assessment of McAfee security researchers). Further effort can increase the accuracy yet more. By training the data models, McAfee researchers achieved a 95% voice match based on just a small number of audio files. \u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">McAfee\u2019s researchers also discovered that that they could easily replicate accents from around the world, whether they were from the US, UK, India, or Australia. However, more distinctive voices were more challenging to copy, such as people who speak with an unusual pace, rhythm, or style. (Think of actor Christopher Walken.) Such voices require more effort to clone accurately and people with them are less likely to get cloned, at least with where the AI technology stands currently and putting comedic impersonations aside. <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<div style=\"text-align: center;\"><iframe loading=\"lazy\" title=\"YouTube video player\" src=\"https:\/\/www.youtube-nocookie.com\/embed\/qc3UvO2JsMw\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\" data-mce-fragment=\"1\"><\/iframe><\/div>\n<div><\/div>\n<p><span data-contrast=\"auto\">The research team stated that this is yet one more way that AI has lowered the barrier to entry for cybercriminals. Whether that\u2019s using it to <\/span><a href=\"https:\/\/mcas-proxyweb.mcas.ms\/certificate-checker?login=false&amp;originalUrl=https%3A%2F%2Fwww.mcafee.com.mcas.ms%2Fblogs%2Finternet-security%2Fchatgpt-a-scammers-newest-tool%2F%3FMcasTsid%3D20892&amp;McasCSRF=ba1878bf5b9fb23f947ed19bdeb213e5161fbe720799051ebb90e3461e198352\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">create malware<\/span><\/a><span data-contrast=\"auto\">, write <\/span><a href=\"https:\/\/mcas-proxyweb.mcas.ms\/certificate-checker?login=false&amp;originalUrl=https%3A%2F%2Fwww.mcafee.com.mcas.ms%2Fblogs%2Fprivacy-identity-protection%2Fcould-chatgpt-cause-heartbreak-with-online-dating-scams%2F%3FMcasTsid%3D20892&amp;McasCSRF=ba1878bf5b9fb23f947ed19bdeb213e5161fbe720799051ebb90e3461e198352\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">deceptive messages in romance scams<\/span><\/a><span data-contrast=\"auto\">, or now with spear phishing attacks with voice cloning technology, it has never been easier to commit sophisticated looking, and sounding, cybercrime.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Likewise, the study also found that the rise of deepfakes and other disinformation created with AI tools has made people more skeptical of what they see online. Now, 32% of adults said their trust in social media is less than it\u2019s ever been before.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">Protect yourself from AI voice clone attacks<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<ol>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Set a verbal codeword with kids, family members, or trusted close friends.<\/span><\/b><span data-contrast=\"auto\"> Make sure it\u2019s one only you and those closest to you know. (Banks and alarm companies often set up accounts with a codeword in the same way to ensure that you\u2019re really you when you speak with them.) Make sure everyone knows and uses it in messages when they ask for help.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Always question the source.<\/span><\/b><span data-contrast=\"auto\"> In addition to voice cloning tools, cybercriminals have other tools that can spoof phone numbers so that they look legitimate. Even if it\u2019s a voicemail or text from a number you recognize, stop, pause, and think. Does that really sound like the person you think it is? Hang up and call the person directly or try to verify the information before responding.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Think before you click and share.<\/span><\/b><span data-contrast=\"auto\"> Who is in your social media network? How well do you really know and trust them? The wider your connections, the more risk you may be opening yourself up to when sharing content about yourself. Be thoughtful about the friends and connections you have online and set your profiles to \u201cfriends and families\u201d only so your content isn\u2019t available to the greater public.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Protect your identity.<\/span><\/b> <a href=\"https:\/\/mcas-proxyweb.mcas.ms\/certificate-checker?login=false&amp;originalUrl=https%3A%2F%2Fwww.mcafee.com.mcas.ms%2Flearn%2Fidentity-monitoring%3Fpath%3Dblogs%26McasTsid%3D20892&amp;McasCSRF=ba1878bf5b9fb23f947ed19bdeb213e5161fbe720799051ebb90e3461e198352\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">Identity monitoring services<\/span><\/a><span data-contrast=\"auto\"> can notify you if your personal information makes its way to the dark web and provide guidance for protective measures. This can help shut down other ways that a scammer can attempt to pose as you.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Clear your name from data broker sites.<\/span><\/b><span data-contrast=\"auto\"> How\u2019d that scammer get your phone number anyway? It\u2019s possible they pulled that information off a data broker site. Data brokers buy, collect, and sell detailed personal information, which they compile from several public and private sources, such as local, state, and federal records, in addition to third parties. Our <\/span><a href=\"https:\/\/mcas-proxyweb.mcas.ms\/certificate-checker?login=false&amp;originalUrl=https%3A%2F%2Fwww.mcafee.com.mcas.ms%2Flearn%2Fpersonal-data-cleanup%3Fpath%3Dblogs%26McasTsid%3D20892&amp;McasCSRF=ba1878bf5b9fb23f947ed19bdeb213e5161fbe720799051ebb90e3461e198352\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">Personal Data Cleanup<\/span><\/a><span data-contrast=\"auto\"> service scans some of the riskiest data broker sites and shows you which ones are selling your personal info.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><strong>Use Technology Safeguards:<\/strong> While technology can be used for malicious purposes, it can also help protect against voice cloning attacks. Tools like McAfee Deepfake Detector, aim to <a href=\"https:\/\/www.mcafee.com\/ai\/deepfake-detector\/\">detect AI-generated deepfakes<\/a>, including audio-based clones. Stay informed about advancements in security technology and consider utilizing such tools to bolster your defenses.<\/li>\n<\/ol>\n<h2><b><span data-contrast=\"auto\">Get the full story<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.mcafee.com\/content\/dam\/consumer\/en-us\/resources\/cybersecurity\/artificial-intelligence\/rp-beware-the-artificial-impostor-report.pdf\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-169698\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/AI_VoiceScams_Infographics-01.jpg\" alt=\"\" width=\"493\" height=\"493\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/AI_VoiceScams_Infographics-01.jpg 1080w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/AI_VoiceScams_Infographics-01-300x300.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/AI_VoiceScams_Infographics-01-1024x1024.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/AI_VoiceScams_Infographics-01-150x150.jpg 150w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/AI_VoiceScams_Infographics-01-768x768.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/AI_VoiceScams_Infographics-01-129x129.jpg 129w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/AI_VoiceScams_Infographics-01-24x24.jpg 24w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/AI_VoiceScams_Infographics-01-48x48.jpg 48w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/AI_VoiceScams_Infographics-01-96x96.jpg 96w\" sizes=\"auto, (max-width: 493px) 100vw, 493px\" \/><\/a><\/p>\n<p><span data-contrast=\"auto\">A lot can come from a three-second audio clip.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">With the advent of AI-driven voice cloning tools, cybercriminals have created a new form of scam. With arguably stunning accuracy, these tools can let cybercriminals nearly anyone. All they need is a short audio clip to kick off the cloning process.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Yet like all scams, you have ways you can protect yourself. A sharp sense of what seems right and wrong, along with a few straightforward security steps can help you and your loved ones from falling for these AI voice clone scams.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">For a closer look at the survey data, along with a nation-by-nation breakdown, <a href=\"https:\/\/www.mcafee.com\/content\/dam\/consumer\/en-us\/resources\/cybersecurity\/artificial-intelligence\/rp-beware-the-artificial-impostor-report.pdf\">download a copy of our report here<\/a>.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">Survey methodology<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">The survey was conducted between January 27th and February 1st, 2023 by Market Research Company MSI-ACI, with people aged 18 years and older invited to complete an online questionnaire. In total 7,000 people completed the survey from nine countries, including the United States, United Kingdom, France, Germany, Australia, India, Japan, Brazil, and Mexico.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Three seconds of audio is all it takes.\u00a0\u00a0 Cybercriminals have taken up newly forged artificial intelligence (AI) voice cloning tools&#8230;<\/p>\n","protected":false},"author":1408,"featured_media":169668,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[13],"tags":[5091,15814,15815,6056,15813,6339,15615],"coauthors":[15741],"class_list":["post-167893","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-privacy-identity-protection","tag-ai","tag-ai-voice-attacks","tag-ai-voice-cloning","tag-deepfake","tag-identity-monitoring-services","tag-identity-protection","tag-personal-data-cleanup"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Artificial Imposters\u2014Cybercriminals Turn to AI Voice Cloning for a New Breed of Scam | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Three seconds of audio is all it takes.\u00a0\u00a0 Cybercriminals have taken up newly forged artificial intelligence (AI) voice cloning tools and created a new\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Artificial Imposters\u2014Cybercriminals Turn to AI Voice Cloning for a New Breed of Scam | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Three seconds of audio is all it takes.\u00a0\u00a0 Cybercriminals have taken up newly forged artificial intelligence (AI) voice cloning tools and created a new\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/artificial-imposters-cybercriminals-turn-to-ai-voice-cloning-for-a-new-breed-of-scam\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-15T19:23:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-09T01:41:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/04\/300x200_Blog_AI-Artificial-Imposters-Voice.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Amy Bunn\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Amy Bunn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/artificial-imposters-cybercriminals-turn-to-ai-voice-cloning-for-a-new-breed-of-scam\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/artificial-imposters-cybercriminals-turn-to-ai-voice-cloning-for-a-new-breed-of-scam\/\"},\"author\":{\"name\":\"Amy Bunn\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/15fadfbc1716a6a3d88e22ed09e95fe3\"},\"headline\":\"Artificial Imposters\u2014Cybercriminals Turn to AI Voice Cloning for a New Breed of Scam\",\"datePublished\":\"2024-05-15T19:23:41+00:00\",\"dateModified\":\"2025-07-09T01:41:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/artificial-imposters-cybercriminals-turn-to-ai-voice-cloning-for-a-new-breed-of-scam\/\"},\"wordCount\":1466,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/artificial-imposters-cybercriminals-turn-to-ai-voice-cloning-for-a-new-breed-of-scam\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/04\/300x200_Blog_AI-Artificial-Imposters-Voice.png\",\"keywords\":[\"AI\",\"AI voice attacks\",\"AI voice cloning\",\"deepfake\",\"Identity monitoring services\",\"identity protection\",\"Personal data cleanup\"],\"articleSection\":[\"Privacy &amp; Identity Protection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/artificial-imposters-cybercriminals-turn-to-ai-voice-cloning-for-a-new-breed-of-scam\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/artificial-imposters-cybercriminals-turn-to-ai-voice-cloning-for-a-new-breed-of-scam\/\",\"name\":\"Artificial Imposters\u2014Cybercriminals Turn to AI Voice Cloning for a New Breed of Scam | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/artificial-imposters-cybercriminals-turn-to-ai-voice-cloning-for-a-new-breed-of-scam\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/artificial-imposters-cybercriminals-turn-to-ai-voice-cloning-for-a-new-breed-of-scam\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/04\/300x200_Blog_AI-Artificial-Imposters-Voice.png\",\"datePublished\":\"2024-05-15T19:23:41+00:00\",\"dateModified\":\"2025-07-09T01:41:33+00:00\",\"description\":\"Three seconds of audio is all it takes.\u00a0\u00a0 Cybercriminals have taken up newly forged artificial intelligence (AI) voice cloning tools and created a new\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/artificial-imposters-cybercriminals-turn-to-ai-voice-cloning-for-a-new-breed-of-scam\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/artificial-imposters-cybercriminals-turn-to-ai-voice-cloning-for-a-new-breed-of-scam\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/artificial-imposters-cybercriminals-turn-to-ai-voice-cloning-for-a-new-breed-of-scam\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/04\/300x200_Blog_AI-Artificial-Imposters-Voice.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/04\/300x200_Blog_AI-Artificial-Imposters-Voice.png\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/artificial-imposters-cybercriminals-turn-to-ai-voice-cloning-for-a-new-breed-of-scam\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Privacy &amp; Identity Protection\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Artificial Imposters\u2014Cybercriminals Turn to AI Voice Cloning for a New Breed of Scam\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/15fadfbc1716a6a3d88e22ed09e95fe3\",\"name\":\"Amy Bunn\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/b58be83668cf2b1de7fb5b8a222bb835\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/Amy-Bunn-96x96.jpeg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/Amy-Bunn-96x96.jpeg\",\"caption\":\"Amy Bunn\"},\"description\":\"Amy Bunn is head of communications at McAfee and has worked in technology and cybersecurity for over 15 years. During this time, Amy has witnessed the changing technology landscape and the critical role that online protection plays today. Amy believes that families and individuals around the world should be free to enjoy all the benefits and advantages that the internet and technology afford and is passionate about making this a reality by discussing the very latest in cybersecurity tips and advice, which, when combined with robust online protection, can help empower people to live their life online with total confidence.\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/amy-bunn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Artificial Imposters\u2014Cybercriminals Turn to AI Voice Cloning for a New Breed of Scam | McAfee Blog","description":"Three seconds of audio is all it takes.\u00a0\u00a0 Cybercriminals have taken up newly forged artificial intelligence (AI) voice cloning tools and created a new","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Artificial Imposters\u2014Cybercriminals Turn to AI Voice Cloning for a New Breed of Scam | McAfee Blog","og_description":"Three seconds of audio is all it takes.\u00a0\u00a0 Cybercriminals have taken up newly forged artificial intelligence (AI) voice cloning tools and created a new","og_url":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/artificial-imposters-cybercriminals-turn-to-ai-voice-cloning-for-a-new-breed-of-scam\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2024-05-15T19:23:41+00:00","article_modified_time":"2025-07-09T01:41:33+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/04\/300x200_Blog_AI-Artificial-Imposters-Voice.png","type":"image\/png"}],"author":"Amy Bunn","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"Amy Bunn","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/artificial-imposters-cybercriminals-turn-to-ai-voice-cloning-for-a-new-breed-of-scam\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/artificial-imposters-cybercriminals-turn-to-ai-voice-cloning-for-a-new-breed-of-scam\/"},"author":{"name":"Amy Bunn","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/15fadfbc1716a6a3d88e22ed09e95fe3"},"headline":"Artificial Imposters\u2014Cybercriminals Turn to AI Voice Cloning for a New Breed of Scam","datePublished":"2024-05-15T19:23:41+00:00","dateModified":"2025-07-09T01:41:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/artificial-imposters-cybercriminals-turn-to-ai-voice-cloning-for-a-new-breed-of-scam\/"},"wordCount":1466,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/artificial-imposters-cybercriminals-turn-to-ai-voice-cloning-for-a-new-breed-of-scam\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/04\/300x200_Blog_AI-Artificial-Imposters-Voice.png","keywords":["AI","AI voice attacks","AI voice cloning","deepfake","Identity monitoring services","identity protection","Personal data cleanup"],"articleSection":["Privacy &amp; Identity Protection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/artificial-imposters-cybercriminals-turn-to-ai-voice-cloning-for-a-new-breed-of-scam\/","url":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/artificial-imposters-cybercriminals-turn-to-ai-voice-cloning-for-a-new-breed-of-scam\/","name":"Artificial Imposters\u2014Cybercriminals Turn to AI Voice Cloning for a New Breed of Scam | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/artificial-imposters-cybercriminals-turn-to-ai-voice-cloning-for-a-new-breed-of-scam\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/artificial-imposters-cybercriminals-turn-to-ai-voice-cloning-for-a-new-breed-of-scam\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/04\/300x200_Blog_AI-Artificial-Imposters-Voice.png","datePublished":"2024-05-15T19:23:41+00:00","dateModified":"2025-07-09T01:41:33+00:00","description":"Three seconds of audio is all it takes.\u00a0\u00a0 Cybercriminals have taken up newly forged artificial intelligence (AI) voice cloning tools and created a new","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/artificial-imposters-cybercriminals-turn-to-ai-voice-cloning-for-a-new-breed-of-scam\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/artificial-imposters-cybercriminals-turn-to-ai-voice-cloning-for-a-new-breed-of-scam\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/artificial-imposters-cybercriminals-turn-to-ai-voice-cloning-for-a-new-breed-of-scam\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/04\/300x200_Blog_AI-Artificial-Imposters-Voice.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/04\/300x200_Blog_AI-Artificial-Imposters-Voice.png","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/artificial-imposters-cybercriminals-turn-to-ai-voice-cloning-for-a-new-breed-of-scam\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Privacy &amp; Identity Protection","item":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/"},{"@type":"ListItem","position":3,"name":"Artificial Imposters\u2014Cybercriminals Turn to AI Voice Cloning for a New Breed of Scam"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/15fadfbc1716a6a3d88e22ed09e95fe3","name":"Amy Bunn","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/b58be83668cf2b1de7fb5b8a222bb835","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/Amy-Bunn-96x96.jpeg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/Amy-Bunn-96x96.jpeg","caption":"Amy Bunn"},"description":"Amy Bunn is head of communications at McAfee and has worked in technology and cybersecurity for over 15 years. During this time, Amy has witnessed the changing technology landscape and the critical role that online protection plays today. Amy believes that families and individuals around the world should be free to enjoy all the benefits and advantages that the internet and technology afford and is passionate about making this a reality by discussing the very latest in cybersecurity tips and advice, which, when combined with robust online protection, can help empower people to live their life online with total confidence.","url":"https:\/\/www.mcafee.com\/blogs\/author\/amy-bunn\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/167893","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/1408"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=167893"}],"version-history":[{"count":16,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/167893\/revisions"}],"predecessor-version":[{"id":201899,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/167893\/revisions\/201899"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/169668"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=167893"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=167893"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=167893"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=167893"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}