BLOG
Published On: Aug 16, 2024Tags:

Relentless Cybercriminals are Calling: Learning to Fight Against Voice Spoofing

Unknown number calling to represent scammers calling from hidden numbers.
10-100 | IT Support, Services & IT Consultancy in Milton Keynes

While most people think that cybercriminals stay behind the anonymity of just the internet and screens, trying to convince unsuspecting victims into clicking phishing links, there are plenty of them that are branching into old fashioned telephony using advanced tools and AI to try and compromise bank accounts and other details. Voice spoofing is on the rise, and it’s not going anywhere anytime soon.

The National Crime Agency shut down a spoofing ring called Russian Coms over the last couple of months, but many victims report that the refined methods of spoofing had them unaware that they were even falling for a scam. Modern spoofing operations rely on everything from voice changers to pre-recorded, soundboard messages to not only trick users, but also to collect voice recordings from users to then access those user accounts–especially the ones that rely on voice biometrics for accessing accounts via the phone.

Here, we’ve collected a few telltale signs of spoofing attempts, and how you can keep yourself safe.

What is voice spoofing?

Voice spoofing is when someone uses technology to mimic another person’s voice for fraudulent purposes. Here are several ways people can spot voice spoofing, and how to recognize or avoid it:

1. Unusual Requests

  • Unexpected Behavior: If the voice on the other end makes unusual or out-of-character requests, such as asking for sensitive information or urgent financial transactions, it could be a sign of voice spoofing.
  • Verification Questions: Ask specific, personal questions that only the real person would know. Spoofers may struggle to answer accurately.

2. Background Noise or Quality

  • Audio Quality: Spoofed voices might have lower audio quality, noticeable distortion, or a robotic tone due to the technology used to generate them.
  • Inconsistent Background Sounds: Pay attention to background noises. If the background noise changes abruptly or doesn’t match the usual environment of the person, it could be a red flag.

3. Speech Patterns and Timing

  • Inconsistent Speech Patterns: Voice spoofing technology may fail to perfectly mimic natural speech patterns, including pauses, intonation, and speed.
  • Latency: There might be a noticeable delay or awkward timing in the responses, as some voice spoofing methods take time to generate responses.

4. Caller ID and Source Verification

  • Caller ID Spoofing: Even if the caller ID looks legitimate, spoofing can alter this information. Always verify by calling back using a trusted number.
  • Double-Check with Another Method: If suspicious, confirm the communication through another method, such as text, email, or an in-person meeting.

5. Use of Known Phrases or Repetitions

  • Repeated Phrases: Some voice spoofing software relies on pre-recorded phrases. If the voice repeats certain words or phrases exactly the same way, it might be spoofed.
  • Oddly Formal or Scripted Speech: If the speech sounds overly formal or scripted, it could indicate that the voice is being generated or manipulated. Ask more complicated questions, like information on the weather, or the exact address for what business the caller is calling from.

If you think you’re being targeted for voice spoofing, it’s imperative that you don’t provide the caller with any ability to copy responses from your own voice. Keep conversations limited, and don’t reply with simple, easily stolen words like ‘yes,’ ‘no,’ dates or days, or any numerical information. If you wish to report the incident to authorities, record the call if possible, and make a note of the number the person is calling from. Otherwise, keep a close eye on your online accounts for any suspicious activity, and don’t entertain these potential scammers.