Express Computer
Home  »  Artificial Intelligence AI  »  47% of Indians have experienced AI Voice Scams

47% of Indians have experienced AI Voice Scams

0 181

Today, McAfee Corp., a global leader in online protection, published a report, The Artificial Imposter, on how artificial intelligence (AI) technology is fueling a rise in online voice scams, with just three seconds of audio required to clone a person’s voice. The survey was conducted with 7,054 people from seven countries, including India.

The survey reveals that more than half (69%) of Indians think they don’t know or cannot tell the difference between an AI voice and real voice. About half (47%) of Indian adults have experienced or know someone who has experienced some kind of AI voice scam, which is almost double the global average (25%). 83% of Indian victims said they had a loss of money- with 48% losing over INR 50,000.

“Artificial Intelligence brings incredible opportunities, but with any technology there is always the potential for it to be used maliciously in the wrong hands. This is what we’re seeing today with the access and ease of use of AI tools helping cybercriminals to scale their efforts in increasingly convincing ways,” said Steve Grobman, McAfee CTO.

In addition, McAfee Labs security researchers have revealed their insights and analysis from an in-depth study of AI voice-cloning technology and cybercriminal use.

Artificial Intelligence Voice Cloning Scams

Everybody’s voice is unique, the spoken equivalent of a biometric fingerprint, which is why hearing somebody speak is such a widely accepted way of establishing trust. But with 86% of Indian adults sharing their voice data online or in recorded notes at least once a week (via social media, voice notes and more.), cloning how somebody sounds is now a powerful tool in the arsenal of a cybercriminal.

With the rise in popularity and adoption of artificial intelligence tools, it is easier than ever to manipulate images, videos, and perhaps most disturbingly, the voices of friends and family members. McAfee’s research reveals scammers are using AI technology to clone voices and then send a fake voicemail or voice note or even call directly the victim’s contacts pretending to be in distress – and with 69% of Indian adults not confident that they could identify the cloned version from the real thing, it’s no surprise that this technique is gaining momentum.

More than half (66%) of the Indian respondents said they would reply to a voicemail or voice note purporting to be from a friend or loved one in need of money. Particularly if they thought the request had come from their parent (46%), partner or spouse (34%), or child (12%). Messages most likely to elicit a response were those claiming that the sender had been robbed (70%), was involved in a car incident (69%), lost their phone or wallet (65%) or needed help while traveling abroad (62%). But the cost of falling for an AI voice scam can be significant, 48% of Indians who’d lost money saying it had cost them over INR 50,000.

The survey also found that the rise of deepfakes and disinformation has led to people being more wary of what they see online, with 27% of Indian adults saying they’re now less trusting of social media than ever before and 43% being concerned over the rise of misinformation or disinformation.

McAfee Labs Research Reveals Voice Cloning Requires Limited Expertise and Just Seconds of Audio

As part of McAfee’s review and assessment of this new trend, McAfee researchers spent three weeks investigating the accessibility, ease of use, and efficacy of AI voice-cloning tools, with the team finding more than a dozen freely available on the internet.

Both free and paid tools are available, with many requiring only a basic level of experience and expertise to use. In one instance, just three seconds of audio was enough to produce an 85% match, but with more investment and effort it’s possible to increase the accuracy. By training the data models, McAfee researchers were able to achieve a 95% voice match based on just a small number of video files.

The more accurate the clone, the better chance a cybercriminal has of duping somebody into handing over their money, and with these hoaxes based on exploiting the emotional vulnerabilities inherent in close relationships, a scammer could net thousands of dollars in just a few hours.

“Advanced artificial intelligence tools are changing the game for cybercriminals. Now, with very little effort, they can clone a person’s voice and deceive a close contact into sending money,” said Grobman. “It’s important to remain vigilant and to take proactive steps to keep you and your loved ones safe. Should you receive a call from your spouse or a family member in distress and asking for money, verify the caller – use a codeword, or ask a question only they would know. Identity and privacy protection services will also help limit the digital footprint of personal information that a criminal can use to develop a compelling narrative when creating a voice clone.”

Using the cloning tools they found, McAfee’s researchers discovered that they had no trouble replicating accents from around the world, whether they were from the US, UK, India or Australia, but more distinctive voices were more challenging to copy. For example, the voice of a person who speaks with an unusual pace, rhythm or style requires more effort to clone accurately and they are less likely to be targeted as a result.

The overriding feeling among the research team, though, was that artificial intelligence has already changed the game for cybercriminals. The barrier to entry has never been lower, which means it has never been easier to commit cybercrime.

How to Protect Yourself from AI Voice Cloning

Set a verbal ‘codeword’ with kids, family members or trusted close friends that only they could know. Make a plan to always ask for it if they call, text or email to ask for help, particularly if they’re older or more vulnerable.

Always question the source – If it’s a call, text or email from an unknown sender, or even if it’s from a number you recognize, stop, pause and think. Does that really sound like them? Hang up and call the person directly or try to verify the information before responding and certainly before sending money.

Think before you click and share – Who is in your social media network? Do you really know and trust them? Be thoughtful about the friends and connections you have online. The wider your connections and the more you share, the more risk you may be opening yourself up to that your identity may be cloned for malicious purposes.

Identity theft protection services can help make sure your personally identifiable information is not accessible or notify you if it makes its way to the Dark Web. Take control of your personal data to avoid a cybercriminal being able to pose as you.

Get real time updates directly on you device, subscribe now.

Leave A Reply

Your email address will not be published.

LIVE Webinar

Digitize your HR practice with extensions to success factors

Join us for a virtual meeting on how organizations can use these extensions to not just provide a better experience to its’ employees, but also to significantly improve the efficiency of the HR processes
REGISTER NOW 

Stay updated with News, Trending Stories & Conferences with Express Computer
Follow us on Linkedin
India's Leading e-Governance Summit is here!!! Attend and Know more.
Register Now!
close-image
Attend Webinar & Enhance Your Organisation's Digital Experience.
Register Now
close-image
Enable A Truly Seamless & Secure Workplace.
Register Now
close-image
Attend Inida's Largest BFSI Technology Conclave!
Register Now
close-image
Know how to protect your company in digital era.
Register Now
close-image
Protect Your Critical Assets From Well-Organized Hackers
Register Now
close-image
Find Solutions to Maintain Productivity
Register Now
close-image
Live Webinar : Improve customer experience with Voice Bots
Register Now
close-image
Live Event: Technology Day- Kerala, E- Governance Champions Awards
Register Now
close-image
Virtual Conference : Learn to Automate complex Business Processes
Register Now
close-image