- 17:20Israel foreign minister optimistic about Gaza ceasefire and hostage deal amid ongoing talks
- 16:50US sanctions target firms tied to Iranian oil sales, citing links to Quds Force
- 16:20New Gaza-bound aid mission to challenge Israeli blockade
- 15:50Severe thunderstorms to strike Moroccan regions amid ongoing heatwaves
- 15:20Morocco advances overhaul of criminal procedure code to modernize justice system
- 14:45Congo’s football chief accused of embezzling $1.3 million in FIFA funds
- 14:20Handala mission: Freedom Flotilla launches new humanitarian voyage to Gaza
- 13:30Transfer talks stall as Hamza Igamane's Lille move hits a snag
- 12:20Morocco reduces pre-trial detention rates to historic low
Follow us on Facebook
AI-driven impersonation campaign targets US diplomats and officials
An imposter used artificial intelligence to mimic the voice of US Secretary of State Marco Rubio, deceiving foreign ministers and US politicians in an alarming digital campaign, according to a confidential State Department cable reviewed by Reuters. The incident highlights the growing sophistication of AI in cyber deception.
AI impersonation scheme exposed
In June, the imposter contacted three foreign ministers, a US governor, and a member of Congress through the Signal app. According to the cable, voicemails were left for two individuals, and a text message invited a third target to communicate via Signal. The attacker leveraged AI-generated text and voice messages to manipulate their targets, aiming to extract sensitive information or gain unauthorized access.
The cable, dated July 3, was disseminated to all US diplomatic and consular posts, advising staff to warn external partners about the risks of fake accounts and impersonation. “There is no direct cyber threat to the department from this campaign, but information shared with a third party could be exposed if targeted individuals are compromised,” the cable stated.
Previous Russian-linked campaign
The document also referenced a separate, earlier operation in April, attributed to a Russia-linked hacker associated with the Russian Foreign Intelligence Service. This attack involved spear-phishing emails targeting think tanks, Eastern European activists, dissidents, and former State Department officials.
The hacker used a fake “@state.gov” email address and replicated official logos and branding from the Bureau of Diplomatic Technology. The perpetrator demonstrated detailed knowledge of State Department naming conventions and internal documents, further enhancing the campaign’s credibility.
Industry partners identified the April attack as a coordinated effort by a cyber actor linked to Russian intelligence, emphasizing the ongoing threat posed by state-backed cyber campaigns.
Increasing use of AI in cyberattacks
These incidents underline the risks posed by advanced AI technologies in cyber operations, where impersonation and deception are becoming more sophisticated and difficult to detect. The State Department has urged vigilance, both internally and among its partners, to mitigate the threat of similar campaigns in the future.
Comments (0)