Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

TwinH: A New Frontier in the Pursuit of Immortality?

How the Green Energy Transfer Will Increase Productivity in the UK

Nighteagle apt exploits Microsoft Exchange flaws to target China’s military and technical sectors

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » AI-powered social engineering: auxiliary tools and techniques
Identity

AI-powered social engineering: auxiliary tools and techniques

userBy userFebruary 14, 2025No Comments6 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

AI-driven social engineering

Social engineering is rapidly advancing at the speed of generating AI. It offers bad actors techniques to research, scop and exploit multiple new tools and techniques. In recent communications, the FBI noted:

In this article, we will explore some of the effects of this genai fuel acceleration. For IT leaders, we look at what it means for IT leaders who are responsible for managing defenses and mitigating vulnerabilities.

More realism, better portrayal, multilingual attack scenarios

Traditional social engineering methods usually involve impersonating someone the target knows. The attacker communicates by hiding behind the email and adding several psychological triggers to increase the likelihood of a successful violation. They probably ask for urgent action, so the target is less likely to pause and question it. Or you want the email to come from the employee’s CEO and you want the respect for employee authority to not question the message.

When using voice, the attacker may instead pretend to be someone whose target is not speaking (and recognizes the voice). You may be pretending from another department or an external partner.

Of course, these methods often fall apart when the target wants to somehow confirm his identity. Want to check their appearance or see how they write in real-time chat?

But now that Genai has joined the conversation, things have changed.

The rise in Deepfake video means that enemies no longer need to hide behind the keyboard. These are blended with authentic recordings to analyze and reproduce human habits and speech. Then, it’s simply when you tell Deepfark to say something, or use it as a digital mask to replicate what the attacker says in front of the camera.

An increase in digital-first work that remote workers are used for virtual meetings means it’s easier to explain possible warning signs. Unnatural movements or sounds with slightly different voices? I blame it for bad connections. By face to face, this adds a layer of credibility that supports our natural instincts and supports thinking that we believe in seeing.

Voice cloning technology means that attackers can speak any voice, and can attack voice phishing, also known as vising. This growing technology’s capabilities are reflected in AI’s open recommendations for banks to “phasise voice-based authentication as a security measure for access to bank accounts and other sensitive information.” .

Text-based communication is also converted in genai. With the rise of LLMS, malicious actors can operate at a speaker level that is closer to natives, and the output can be trained in local dialects for even more fluent flow. This opens the door to a new market for social engineering attacks, and languages ​​are no longer blockers when selecting targets.

Bringing order to unstructured OSINT using Genai

If someone gets online, they leave a digital footprint somewhere. Depending on what they share, this can sometimes be enough to impersonate them or reveal enough information to compromise their identity. They may share their birthdays on Facebook, post their employment locations on LinkedIn, and post photos of their home, family and life on Instagram.

These actions provide a way to build a profile for use in social engineering attacks against connected individuals and organizations. In the past, collecting all this information is a long and manual process. You are searching each social media channel and trying to join the dot between people’s posts and public information.

Now AI can do all this with HyperSpeed, scrutinizing unstructured data into the internet, obtaining, organizing and classifying all possible matches. This includes a facial recognition system that allows you to upload someone’s photos and find all the locations that are displayed online in the search engine.

Furthermore, the information is publicly available, allowing you to access this information and aggregate it anonymously. Even if you’re using paid Genai tools, stolen accounts are still sold on the dark web, giving attackers another way to hide their activity, usage, and queries.

Turn your data into a treasure trove

The massive data leak has released 3 billion 2024 sensitive information from over 533 million Facebook users whose details (including birthdays, phone numbers and locations) were breached in 2021. This is a fact of modern digital life from more than anyone else on Yahoo users. Manually sifting data trobes on these volumes is practical or impossible.

Instead, people can leverage Genai tools to autonomously sort large amounts of content. These can find data that can be used maliciously, such as horror, weaponizing civil debate, stealing intellectual property hidden in documents.

AI maps document creators (using the form of named entity recognition) to establish guilty connections between various parties, such as wire transfers and confidential discussions.

Many tools are open source and can be customized by users with plugins and modules. For example, Recon-NG can be set for use cases such as email harvesting or OSINT collection. Other tools, such as Red Reaper, are not for public use. It is a form of spy AI that can sift through hundreds of thousands of emails to detect sensitive information that can be used against an organization.

Genai Genie is not coming out of the bottle – is your business exposed?

Attackers can now use the Internet as a database. You will need data as a starting point, such as your name, email address, and image. Genai can get to work and run real-time queries to unlock connections and relationships and process them.

Then, it’s often about choosing the right tool for the right exploit at scale and running it autonomously. Whether it’s deepfake video and audio cloning, or LLM-based conversation-driven attacks. These would have been limited to a selection group of experts with the necessary knowledge. Today, the landscape is democratized with the rise of “hacking as a service” that does a lot of work for cybercriminals.

So what kind of information can you find potentially compromised information about your organization?

We have built a threat monitoring tool that will tell you. Crack every corner of the internet, letting you know which data is there, and can be exploited to build an excuse for an effective attack, so attackers take action before they first reach it. You can wake it up.

Did you find this article interesting? This article is a donation from one of our precious partners. Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleWhale.io bids farewell to Telegram and focuses on the web
Next Article Are there any game-changing factors in your meeting venue that motivates and develops your team?
user
  • Website

Related Posts

TwinH: A New Frontier in the Pursuit of Immortality?

July 4, 2025

Nighteagle apt exploits Microsoft Exchange flaws to target China’s military and technical sectors

July 4, 2025

AI Agent may be leaking data – Watch this webinar and learn how to stop it

July 4, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

TwinH: A New Frontier in the Pursuit of Immortality?

How the Green Energy Transfer Will Increase Productivity in the UK

Nighteagle apt exploits Microsoft Exchange flaws to target China’s military and technical sectors

Intestinal bacteria can cleanse the body of toxic PFAS chemicals

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

TwinH: A New Frontier in the Pursuit of Immortality?

Meta’s Secret Weapon: The Superintelligence Unit That Could Change Everything 

Unlocking the Power of Prediction: The Rise of Digital Twins in the IoT World

TwinH: Digital Human Twin Aims for Victory at Break the Gap 2025

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.