Cybercriminals Are Deploying Powerful AI-Powered Tools To Hack You – Are You Prepared For What’s Coming?

Jun 3, 2023 | Blog

An Arizona family was recently in the news warning others about how they were the target of a ransom call in which scammers used AI (artificial intelligence) to clone their daughter’s voice to convince the parents they had kidnapped their daughter, with the apparent goal of extorting money.

DeLynne Bock, the mother of Payton Bock and target of the con, said she feels she can easily spot a fake scam call, but this was on a whole other level.

According to the news story, the scammers called their home, where DeLynne’s husband answered the call. A man on the other end of the line was screaming and using foul language, saying his daughter had caused an accident, hitting his car, and couldn’t find her insurance. From there, he started making threats, saying he had her tied up in the back of his truck.

What made the call so convincing was the deep fake of her daughter’s voice on the other end of the line – pleading for help, crying. Unable to reach her daughter by phone, DeLynne called the police while her husband kept the man on the phone. “I called the police, and they’re saying, ‘This is possibly a scam situation.’ I said, ‘There is no way this is a scam. This is my daughter’s voice,’” DeLynne said. “This wasn’t just some person pretending. As a mother, you know your daughter’s voice, and this was my daughter.”

Apparently, this wasn’t the first time this happened which is how the police were able to suggest it could be a scam. This is just the latest iteration of how hackers are using AI to produce deep fakes to extort money. AI and ChatGPT have been in the news recently for a reason – AI is an extremely powerful tool that, if put in the wrong hands, can do a lot of harm.

It’s not a stretch to imagine the use of AI to fake a CEO’s voice, signature, or writing style in an e-mail, text, call, or instant message to trick an employee into sending money or doing things that would severely harm the organization, such as providing a login or access to the company’s network, data or critical applications. Or similarly use this same type of approach to scam clients or patients into giving up confidential information or payments.

A report released by security experts at Home Security Heroes showed that 51% of common passwords could be cracked in less than one minute using an AI. Both the length and complexity of the passwords factored into the speed of successfully cracking the password, but even a complex password with seven characters using both uppercase and lowercase letters, numbers, and symbols took just minutes to crack.

This means it’s hypercritical for all business owners to no longer rely on strong passwords and simple antivirus to protect their organization.

Today, all businesses should have some type of security awareness training for their employees. For example, simply sharing this article and others we publish like them with them can go a long way toward making sure they’re always on high alert for scams; but sharing the occasional article is not enough. You should have some type of ongoing reminders and formal training so that it’s always top of mind. Employees AREN’T “too smart” to fall for these scams. If someone can trick a mother into believing her daughter has been kidnapped by duping her daughter’s voice, they can trick an employee into clicking on a link, giving them access or transferring funds – and it’s happening right now to a lot of businesses.

Second, you need to work with your IT company to ensure they have implemented robust cyber security tools and protections, as well as disaster recovery protocols so if you are ransomed, you can be sure to recover your data. This is not an area to be cheap about. Most people stubbornly believe it won’t happen to them or that it will be a minor inconvenience, not a costly, business-crippling, and devastating disaster that a cyber or ransomware attack can have. An ounce of prevention goes a long, long way toward minimizing your risk.

I would also recommend especially for government contractors to implement CMMC level 1 ASAP. We have Smarthost Cybershield™, which includes controls that keep our customers protected.

If you want to make sure your IT services provider is protecting you appropriately, click here to request a FREE IT Security Risk Assessment. This assessment is not time-consuming, invasive, or difficult to do, but it will give you the unvarnished truth about your current security situation (pasture) and whether or not you will are properly and brilliantly prepared for a cyber-attack.

Make it a great Smarthost Cybershield™ Secure day!

FREE IT Optimization Plan

Are you completely fed up with chronic computer problems and escalating IT costs? Do you worry that your backups and IT security are lacking? Do you have a sneaking suspicion that your current IT guy doesn’t have a handle on things? Our free IT optimization plan will reveal gaps and oversights in your computer network and show you how to eliminate all your IT problems and never pay for unnecessary IT expenses again.

Complete this form below to get started. We will contact you to discuss next steps to getting your free IT Optimization Plan.


“Savings” That Could Cost You EVERYTHING

“Savings” That Could Cost You EVERYTHING

In today’s digital landscape, free antivirus and firewall software may seem like a cost-effective choice for protecting your business. However, these solutions often come with hidden risks and limitations that could leave your organization vulnerable to cyber threats. Discover why investing in robust cybersecurity solutions is crucial for safeguarding your business against evolving risks.

The Silent Danger: A Powerful Lesson For Every Business From This $1.6 Billion Ransomware Attack

The Silent Danger: A Powerful Lesson For Every Business From This $1.6 Billion Ransomware Attack

In recent months, the alarming cybersecurity breach at Change Healthcare, a health care payment-processing company under UnitedHealth Group, has highlighted a chilling reality: cyberthreats can lurk undetected within our networks, ready to unleash chaos at a moment’s notice. The breach, executed by the notorious ALPHV/BlackCat hacker group, involved the group lying dormant within the company’s environment for nine days before launching a crippling ransomware attack. This incident underscores an urgent message for all business leaders: robust cybersecurity systems and recovery plans are not optional but a fundamental necessity for every business.

How Poor Tech Support Is Slowing Down Your Business

How Poor Tech Support Is Slowing Down Your Business

In this article, we explore the benefits of tough, assertive leadership in business, drawing insights from Steve Jobs and Tony Soprano. Learn why it’s crucial to stand firm, protect your organization, and implement robust security measures to safeguard against cyber threats.