By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: AI-Powered Social Engineering: Ancillary Tools and Techniques
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > AI-Powered Social Engineering: Ancillary Tools and Techniques
Tech News

AI-Powered Social Engineering: Ancillary Tools and Techniques

By Viral Trending Content 8 Min Read
Share
SHARE
AI-Powered Social Engineering

Social engineering is advancing fast, at the speed of generative AI. This is offering bad actors multiple new tools and techniques for researching, scoping, and exploiting organizations. In a recent communication, the FBI pointed out: ‘As technology continues to evolve, so do cybercriminals’ tactics.’

Contents
More realism, better pretexting, and multi-lingual attack scenariosBringing order to unstructured OSINT with GenAITurning troves of data into troves of treasureThe GenAI genie is out of the bottle – is your business exposed?

This article explores some of the impacts of this GenAI-fueled acceleration. And examines what it means for IT leaders responsible for managing defenses and mitigating vulnerabilities.

More realism, better pretexting, and multi-lingual attack scenarios

Traditional social engineering methods usually involve impersonating someone the target knows. The attacker may hide behind email to communicate, adding some psychological triggers to boost the chances of a successful breach. Maybe a request to act urgently, so the target is less likely to pause and develop doubts. Or making the email come from an employee’s CEO, hoping the employee’s respect for authority means they won’t question the message.

If using voice, then the attacker may instead pretend to be someone that the target hasn’t spoken to (and would recognize the voice). Maybe pretending to be from another department or external partner.

Of course, these methods often fall apart when the target wants to verify their identity in some way. Whether that’s wanting to check their appearance, or how they write in a real-time chat.

However, now that GenAI has entered the conversation, things have changed.

The rise in deepfake videos means that adversaries no longer need to hide behind keyboards. These blend genuine recordings to analyze and recreate a person’s mannerisms and speech. Then it’s simply a case of directing the deepfake to say anything, or using it as a digital mask that reproduces what the attacker says and does in front of the camera.

The rise in digital-first work, with remote workers used to virtual meetings, means it’s easier to explain away possible warning signs. Unnatural movements, or voice sounding slightly different? Blame it on a bad connection. By speaking face-to-face this adds a layer of authenticity that supports our natural instinct to think that ‘seeing is believing’.

Voice cloning technology means attackers can speak in any voice too, carrying out voice phishing, also known as vishing, attacks. The growing capability of this technology is reflected in Open AI’s recommendation for banks to start ‘Phasing out voice based authentication as a security measure for accessing bank accounts and other sensitive information.’

Text-based communication is also transformed with GenAI. The rise of LLMs allows malicious actors to operate at near-native speaker level, with outputs able to be trained on regional dialects for even greater fluency. This opens the door to new markets for social engineering attacks, with language no longer a blocker when selecting targets.

Bringing order to unstructured OSINT with GenAI

If someone’s ever been online, they’ll have left a digital footprint somewhere. Depending on what they share, this can sometimes be enough to reveal enough information to impersonate them or compromise their identity. They may share their birthday on Facebook, post their place of employment on LinkedIn, and put pictures of their home, family, and life on Instagram.

These actions offer ways to build up profiles to use with social engineering attacks on the individuals and organizations they’re connected to. In the past, gathering all this information would be a long and manual process. Searching each social media channel, trying to join the dots between people’s posts and public information.

Now, AI can do all this at hyperspeed, scouring the internet for unstructured data, to retrieve, organize and classify all possible matches. This includes facial recognition systems, where it’s possible to upload a photo of someone and let the search engine find all the places they appear online.

What’s more, because the information is available publicly, it’s possible to access and aggregate this information anonymously. Even when using paid-for GenAI tools, stolen accounts are for sale on the dark web, giving attackers another way to hide their activity, usage, and queries.

Turning troves of data into troves of treasure

Large-scale data leaks are a fact of modern digital life, from over 533 million Facebook users having details (including birthdays, phone numbers, locations) compromised in 2021, to more than 3 billion Yahoo users having sensitive information exposed in 2024. Of course, manually sifting through these volumes of data troves isn’t practical or possible.

Instead, people can now harness GenAI tools to autonomously sort through high volumes of content. These can find any data that could be used maliciously, such as for extortion, weaponizing private discussions, or stealing Intellectual Property hidden in documents.

The AI also maps the creators of the documents (using a form of Named Entity Recognition), to establish any incriminating connections between different parties including wire transfers and confidential discussions.

Many tools are open source, allowing users to customize with plugins and modules. For example, Recon-ng can be configured for use cases such as email harvesting and OSINT gathering. Other tools aren’t for public use, such as Red Reaper. This is a form of Espionage AI, capable of sifting through hundreds of thousands of emails to detect sensitive information that could be used against organizations.

The GenAI genie is out of the bottle – is your business exposed?

Attackers can now use the internet as a database. They just need a piece of data as a starting point, such as a name, email address, or image. GenAI can get to work, running real-time queries to mine, uncover, and process connections and relationships.

Then it’s about choosing the appropriate tool for exploits, often at scale and running autonomously. Whether that’s deepfake videos and voice cloning, or LLM-based conversation-driven attacks. These would have been limited to a select group of specialists with the necessary knowledge. Now, the landscape is democratized with the rise of ‘hacking as a service’ that does much of the hard work for cybercriminals.

So how can you know what potentially compromising information is available about your organization?

We’ve built a threat monitoring tool that tells you. It crawls every corner of the internet, letting you know what data is out there and could be exploited to build effective attack pretexts, so you can take action before an attacker gets to it first.


Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter  and LinkedIn to read more exclusive content we post.

You Might Also Like

Phomemo PM64D: The New Generation Touchscreen Shipping Label Printer Balancing Speed and Portability

OnePlus 15 vs Pixel 10 Pro Review: Which Phone is Better?

Enterprise Ireland leads Irish Tech Delegation Targets Nordic Growth and VC Funding at Slush 2025

Gemini 3 Is Here—and Google Says It Will Make Search Smarter

Learn How Leading Companies Secure Cloud Workloads and Infrastructure at Scale

TAGGED: artificial intelligence, Cyber Security, Cybercrime, Cybersecurity, data breach, deepfake, identity theft, Internet, OSINT, phishing, social engineering, Threat Intelligence
Share This Article
Facebook Twitter Copy Link
Previous Article Vance Criticizes Europe Over Free Speech, Democracy, and Mass Migration
Next Article Tomb Raider IV-VI Remastered Review – Giving Fans What They Want
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Halo Infinite’s Final Content Update is Now Live As New Trailer Outlines Every “Infinite” Moment
Gaming News
Infosys' Rs 18,000 crore share buyback window to open on Nov 20. 5 things to know
Business
Buy Bitcoin Now? Not Yet, Says Blackbay Capital President
Crypto
Lebanon says Israeli strike killed 13 people near Palestinian refugee camp
World News
Key Epstein files vote passes US House in overwhelming 427–1 majority
World News
Phomemo PM64D: The New Generation Touchscreen Shipping Label Printer Balancing Speed and Portability
Tech News
Internet Computer (ICP) breaks out of a falling wedge pattern, $7 within reach
Crypto

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Halo Infinite’s Final Content Update is Now Live As New Trailer Outlines Every “Infinite” Moment

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Halo Infinite’s Final Content Update is Now Live As New Trailer Outlines Every “Infinite” Moment
November 18, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?