{"id":16787,"date":"2019-10-04T15:22:38","date_gmt":"2019-10-04T14:22:38","guid":{"rendered":"https:\/\/www.kaspersky.co.uk\/blog\/machine-learning-fake-voice\/16787\/"},"modified":"2019-11-22T09:57:33","modified_gmt":"2019-11-22T09:57:33","slug":"machine-learning-fake-voice","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/machine-learning-fake-voice\/16787\/","title":{"rendered":"Machine learning\u2013aided scams"},"content":{"rendered":"<p>New technologies are clearly changing the world, but not the human psyche. As a result, evil geniuses are devising new technological innovations to target vulnerabilities in the human brain. One vivid example is the story of how <a href=\"https:\/\/www.wsj.com\/articles\/fraudsters-use-ai-to-mimic-ceos-voice-in-unusual-cybercrime-case-11567157402\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">scammers mimicked the voice of an international CEO<\/a> to trick the head of a subsidiary into transferring money to shady accounts.<\/p>\n<h2>What happened?<\/h2>\n<p>The details of the attack are unknown, but the <em>Wall Street Journal<\/em>, citing insurance firm Euler Hermes Group SA, describes the incident as follows:<\/p>\n<ol>\n<li>Answering a phone call, the CEO of a U.K.-based energy firm thought he was speaking with his boss, the chief executive of the firm\u2019s German parent company, who asked him to send \u20ac220,000 to a (fictitious, as it later turned out) Hungarian supplier within an hour.<\/li>\n<li>The British executive transferred the requested amount.<\/li>\n<li>The attackers called again to say the parent company had transferred money to reimburse the U.K. firm.<\/li>\n<li>They then made a third call later that day, again impersonating the CEO, and asked for a second payment.<\/li>\n<li>Because the transfer reimbursing the funds hadn\u2019t yet arrived and the third call was from an Austrian phone number, not a German one, the executive became suspicious. He didn\u2019t make the second payment.<\/li>\n<\/ol>\n<h2>How was it done?<\/h2>\n<p>Insurers are considering two possibilities. Either the attackers sifted through a vast number of recordings of the CEO and manually pieced together the voice messages, or (more likely) they unleashed a machine-learning algorithm on the recordings. The first method is very time-consuming and unreliable\u00a0\u2014 it is extremely difficult to assemble a cohesive sentence from separate words without jarring the ear. And according to the British victim, the speech was absolutely normal, with a clearly recognizable timbre and a slight German accent. So, the main suspect is AI. But the attack\u2019s success had less to do with the use of new technologies than with cognitive distortion, in this case submission to authority.<\/p>\n<h2>Psychological postmortem<\/h2>\n<p>Social psychologists have conducted many experiments showing that even intelligent, experienced people are prone to obeying authority unquestioningly, even if doing so runs counter to personal convictions, common sense, or security considerations.<\/p>\n<p>In his book <em>The Lucifer Effect: Understanding How Good People Turn Evil, <\/em>Philip Zimbardo describes this type of experiment, in which nurses got a phone call from a doctor asking them to inject a patient with a dose of medicine twice the maximum allowable amount. Out of 22 nurses, 21 filled the syringe as instructed. In fact, almost half of nurses surveyed had followed a doctor\u2019s instructions that, in their opinions, could harm a patient. The obedient nurses believed they had less responsibility for the orders than a doctor with the legal authority to prescribe treatment to a patient.<\/p>\n<p>Psychologist Stanley Milgram likewise explained the unquestioning obedience to authority using the theory of <em>subjectivity,<\/em> the essence of which is that if people perceive themselves as tools for fulfilling the wills of others, they do not feel responsible for their actions.<\/p>\n<h2>What to do?<\/h2>\n<p>You simply cannot know with 100% certainty who you are talking to on the phone\u00a0\u2014 especially if it\u2019s a public figure and recordings of their voice (interviews, speeches) are publicly available. Today it\u2019s rare, but as technology advances, such incidents will become more frequent.<\/p>\n<p>By unquestioningly following instructions, you might be doing the bidding of cybercriminals. It\u2019s normal to obey the boss, of course, but it\u2019s also critical to question strange or illogical managerial decisions.<\/p>\n<p>We can only advise discouraging employees from following instructions blindly. Try not to give orders without explaining the reason. That way, an employee is more likely to query an unusual order if there\u2019s no apparent justification.<\/p>\n<p>From a technical point of view, we recommend:<\/p>\n<ul>\n<li>Prescribing a clear procedure for transferring funds so that even high-ranking employees cannot move money outside of the company unsupervised. Transfers of large sums must be authorized by several managers.<\/li>\n<li>Train employees in the basics of cybersecurity, and teach them to view incoming orders with a healthy dollop of skepticism. Our <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/security-awareness\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">threat awareness programs<\/a> will help with this.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Social engineering augmented with machine-learning algorithms can deceive even high-ranking executives.<\/p>\n","protected":false},"author":2499,"featured_media":16788,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1836,2360,2361],"tags":[80,1695,495],"class_list":{"0":"post-16787","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"category-smb","10":"tag-fraud","11":"tag-machine-learning","12":"tag-social-engineering"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/machine-learning-fake-voice\/16787\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/machine-learning-fake-voice\/16753\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/machine-learning-fake-voice\/14142\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/machine-learning-fake-voice\/18740\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/machine-learning-fake-voice\/15526\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/machine-learning-fake-voice\/19418\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/machine-learning-fake-voice\/23746\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/machine-learning-fake-voice\/6530\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/machine-learning-fake-voice\/28870\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/machine-learning-fake-voice\/12385\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/machine-learning-fake-voice\/12460\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/machine-learning-fake-voice\/11290\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/machine-learning-fake-voice\/21595\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/machine-learning-fake-voice\/24324\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/machine-learning-fake-voice\/24697\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/machine-learning-fake-voice\/19207\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/machine-learning-fake-voice\/23522\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/machine-learning-fake-voice\/23372\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.uk\/blog\/tag\/social-engineering\/","name":"social engineering"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/16787","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/2499"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=16787"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/16787\/revisions"}],"predecessor-version":[{"id":17012,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/16787\/revisions\/17012"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/16788"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=16787"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=16787"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=16787"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}