• 2 days ago
An ethical hacker demonstrates how hackers can use AI to hack a company
Transcript
00:00There has been a 60% global increase in AI-driven phishing attacks.
00:05In particular, vishing, spear phishing, and deepfake phishing attacks are on the rise
00:10as attackers use generative AI to amplify social engineering tactics.
00:16According to new research, many businesses don't feel adequately prepared to manage this
00:21rising threat.
00:26With over three decades of cybersecurity experience, Vodafone Business has brought
00:31together a renowned ethical hacker and one of the UK's leading entrepreneurs to put
00:36a spotlight on this challenge and highlight the steps businesses can take to be more secure.
00:41My name is Dr. Katie Paxton-Fair, and I am an ethical hacker.
00:45I hack companies before the bad guys do.
00:48So my name is Chris Donnelly.
00:50I've been an entrepreneur now for 15 years.
00:52I've always taken cybersecurity seriously.
00:54I'm pretty confident my team and I couldn't get scammed.
00:56Today I'm challenging Katie with the idea of hacking my business.
01:00And we'll see just how easy it is for cybercriminals to use AI to attack your business.
01:05So using AI, let's hack Chris's company.
01:08Well, any hack starts out with reconnaissance.
01:11So I'm going to go on to social media, look for Chris, look and see who works for Chris,
01:17what their role is.
01:19Now it's time to do the voice play.
01:21Now it's time to bring in that AI.
01:23All we need to do is visit his social media pages, download some videos, and copy his
01:28speech style.
01:29To do that, we only need three seconds of audio.
01:33So here is the initial voice clone.
01:37Have you managed to pay the invoice I sent over?
01:40Make contact.
01:41A simple text message prompting the victim to accept a call from our cloned Chris.
01:47We can make calls from our computer simply by using a piece of software.
01:52It's crucial.
01:53This gets settled immediately.
01:54The final step is, of course, whether or not the victim has taken an action.
01:59Logging on to something, harvesting credentials.
02:02Most hackers will know if they've been successful by the end of a phone call.
02:09I was obviously able to hack your company.
02:12I mean, it's pretty staggering.
02:14I don't even necessarily blame the staff member because if you listen to the recording, it's
02:17pretty much me.
02:18What can businesses take away from this?
02:21Make cybersecurity a priority.
02:23Provide ongoing training for your employees.
02:25Consider these risks when outlining your budgets for the year.
02:28Proactive security is so key for businesses.
02:31Vodafone Business Cybersecurity Solutions can support you on your proactive security
02:36journey.
02:37And help secure you and your business.

Recommended