Someone Used Ai To Impersonate Marco Rubio - You Or Your Boss Could Be Next

Trending 1 week ago
gettyimages-2223532443
Andrew Harnik/Getty Images

AI has proven itself to beryllium a immense information risk -- moreover US authorities officials aren't safe.

The Washington Post reported Tuesday that an chartless individual utilized AI to airs arsenic Secretary of State Marco Rubio and interaction "at slightest 5 authorities officials, including 3 overseas ministers, a US governor, and a personnel of Congress." The individual utilized nan Signal app to nonstop these officials sound and matter messages crafted pinch AI to mimic Rubio. 

Also: Best information removal services: Delete yourself from nan internet

The Post gained entree to a State Department cablegram dated July 3 that indicated nan impersonator started trying to entree privileged accounts and accusation sometime successful mid-June, erstwhile they created a Signal relationship nether nan sanction "Marco.Rubio@state.gov" -- which is not nan Secretary's email address. 

The State Department did not corroborate to nan Post specifically what AI instrumentality nan impersonator used. 

"The character near voicemails connected Signal for astatine slightest 2 targeted individuals and successful 1 instance, sent a matter connection inviting nan individual to pass connected Signal," nan cablegram clarified, adding that Rubio was not nan only charismatic impersonated. It besides noted that different State Department unit were impersonated utilizing email. 

Also: The champion personality theft protection and in installments monitoring services of 2025

Signal was nan taxable of overmuch scrutiny earlier this twelvemonth erstwhile Defense Secretary Pete Hegseth utilized it to talk classified subject onslaught plans pinch different officials and inadvertently added Jeffrey Goldberg, editor-in-chief of The Atlantic, to nan chat. While Signal is encrypted end-to-end, respective defense officials considered nan chat a superior information breach and noted that Signal is not capable for specified delicate authorities information. 

Protect yourself from AI cyberthreats 

Whether you're utilizing Signal aliases not, what happened to Rubio and different authorities officials is akin to a communal information concern: business email discuss (BEC) -- erstwhile fraudulent actors impersonate known labor aliases institution leaders utilizing their email accounts. 

Passkeys could beryllium a solution to protecting against phishing and BEC attempts, arsenic they limit nan ways hackers could onslaught by reducing opportunities for accusation leaks. Unlike accepted passwords, "passkeys are a shape of Zero Knowledge Authentication," ZDNET's David Berlind explained. "The relying statement has zero knowledge of your secret, and successful bid to motion successful to a relying party, each you person to do is beryllium to nan relying statement that you person nan concealed successful your possession."

Also: How passkeys work: The complete guideline to your inevitable passwordless future

However, nan added furniture of AI sound cloning tin beryllium much convincing than an email and often harder to protect against.

"AI sound cloning scams are dangerously convincing. All it takes is simply a five-second clip of your sound -- usually downloaded from societal media -- and scammers tin clone it to perpetrate fraud," said Michael Scheumack, main invention serviceman astatine IdentityIQ, an personality theft monitoring platform. He said to ZDNET astir really to debar falling unfortunate to an AI sound scam and what you tin do to protect yourself from having your sound cloned.

Also: AI telephone scams sound scary real. Do these 5 things to protect yourself and your family

Here are his apical tips: 

  • For starters, limit what you stock online. "Scammers usage nationalist information and societal media audio to build convincing sound clones," Scheumack noted. "The little they have, nan harder it is to imitate you."
  • Verify a suspicious telephone immediately. "If you person a telephone from a loved 1 asking for money aliases individual information, particularly if nan telephone has a consciousness of urgency and seems suspicious, bent up and telephone them backmost directly," Scheumack advised. "You tin besides found a 'family password' that only you and your loved ones cognize that acts arsenic a verification codification for authentication that you're really speaking to your family member."
  • Invest successful an personality protection service. "They are nan first statement of defense to protect your personality by monitoring for signs of fraud crossed your financial accounts, in installments reports, and individual data," Scheumack noted. These are immoderate of ZDNET's recommended options. 

Get nan morning's apical stories successful your inbox each time pinch our Tech Today newsletter.

Editorial standards
More