Tinker ☀️<p>So some of you might remember this post (and the subsequent demonstration on national news) of using a voice cloning tool (AI, Audio Deep Fake) by <span class="h-card" translate="no"><a href="https://infosec.exchange/@racheltobac" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>racheltobac</span></a></span> </p><p>Link to post: <a href="https://infosec.exchange/@racheltobac/110963070495263373" translate="no" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec.exchange/@racheltobac/</span><span class="invisible">110963070495263373</span></a></p><p>(If you haven't seen it, go watch it. Rachel is amazing.)</p><p>I'd never needed to do a similar attack before, but! I was just tasked yesterday with researching it.</p><p>Asked some friends for a turn-key solution to clone voices. Got pointed to a website. Signed up for $1 a month (first month... then it goes to $5 a month thereafter).</p><p>Pulled some audio of my target's voice down from a youtube interview (a podcast works great too). </p><p>Only needed a minute's worth of audio.</p><p>Uploaded it to the website for cloning.</p><p>Typed out a quick script for the voice to read.</p><p>30 seconds later, I had my cloned audio.</p><p>It was so good, that it even included natural voice inflections AND!!! verbal pauses like umm's and uhh's that matched the target's original presentation. I can't tell the difference between the cloned voice and the original person.</p><p>Y'all... voice cloning and audio deep fakes are well past the ease of "script-kiddy" level. Anyone can do it.</p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/socialEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>socialEngineering</span></a> <a href="https://infosec.exchange/tags/scams" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>scams</span></a> <a href="https://infosec.exchange/tags/deepfake" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>deepfake</span></a> <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishing</span></a> <a href="https://infosec.exchange/tags/vishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vishing</span></a></p>