Voice phishing -- known as vishing -- is not new. But artificial intelligence has transformed it from clumsy robocalls into something far more dangerous. Attackers can now clone a person's voice from just a few seconds of audio and use it to impersonate executives, family members, or bank representatives in real-time phone calls. Vishing attacks surged by 442% in 2025, and the scams are only getting harder to detect. Here is how AI-powered vishing works, what real attacks look like, and how to protect yourself.
What Is Vishing?
Vishing, short for "voice phishing," is a social engineering attack conducted over the phone. The goal is the same as any phishing attack: to trick you into revealing sensitive information, transferring money, or granting access to accounts. What makes vishing distinct is that it relies on the immediacy and perceived trustworthiness of a live voice conversation rather than an email or text message.
Traditional vishing attacks often involved a caller pretending to be from your bank, the IRS, or tech support, using pressure and urgency to get you to act before thinking. These calls were usually easy to spot -- the caller sounded generic, the story had obvious holes, and the phone number looked suspicious.
AI has changed the equation entirely.
How AI Is Supercharging Voice Phishing
Modern AI voice cloning technology can produce a convincing replica of someone's voice from as little as three seconds of audio. That audio can come from a public earnings call, a YouTube video, a podcast appearance, a voicemail greeting, or even a short clip posted on social media. Once the voice is cloned, attackers can generate speech in real time, making the cloned voice say anything they want during a live phone call.
The technology has crossed what researchers call the "indistinguishable threshold" -- meaning the average listener cannot reliably tell a cloned voice from the real thing. This is what makes AI-powered vishing so effective: it exploits the fundamental human instinct to trust a familiar voice.
The Three-Second Threat
AI voice cloning now requires as little as three seconds of audio to create a convincing voice replica. That means a short voicemail greeting, a video posted on social media, or even a brief phone call could provide enough material for an attacker to clone your voice or the voice of someone you trust.
What Attackers Can Do With Cloned Voices
- Impersonate your CEO or manager to authorize fraudulent wire transfers
- Pose as a family member in distress to demand emergency money
- Pretend to be your bank to extract account credentials and one-time passcodes
- Create fake conference calls with multiple AI-generated participants to add legitimacy
- Bypass voice-based authentication systems used by some financial institutions
Real-World AI Vishing Attacks
These are not hypothetical scenarios. AI-powered voice attacks have already caused massive financial losses:
The Arup Deepfake Conference Call ($25.6 Million)
In one of the most striking cases, a finance employee at Arup, a British multinational design firm, was invited to a video conference call with what appeared to be the company's CFO and several senior colleagues. Every participant on the call -- their faces, their voices, their mannerisms -- was generated by AI. Convinced the meeting was real, the employee authorized 15 separate wire transfers totaling $25.6 million before the fraud was discovered.
The Singapore Zoom Attack ($499,000)
In March 2025, a finance director at a Singapore-based multinational joined a Zoom call with what appeared to be the company's CFO and other executives discussing an urgent fund transfer. The director authorized a $499,000 payment. Every face and voice on the call was a deepfake, created using publicly available media of the real executives.
AI-Generated Government Impersonation
Since April 2025, the FBI has warned of a campaign in which attackers use AI-generated voice messages to impersonate senior U.S. government officials, sending texts and voice messages to current and former government employees in an attempt to gain access to personal accounts and sensitive information.
The Scale of the Problem
Around 70% of organizations report being victims of vishing attacks. AI impersonation scams grew 148% in 2025. Over 10% of banks have reported deepfake vishing losses exceeding $1 million per individual case. Global AI-driven fraud losses are projected to reach $40 billion by 2027.
How to Protect Yourself From AI Vishing
1. Verify Every Unexpected Call Independently
This is the single most important habit you can develop. If you receive an unexpected call requesting money, sensitive information, or urgent action -- even if the voice sounds exactly like someone you know -- hang up and call that person back using a phone number you already have saved or one you look up independently. Never use a callback number provided during the suspicious call.
2. Establish a Family Safe Word
Set up a code word or phrase with close family members that a scammer would not be able to find online. If someone calls claiming to be a relative in an emergency, ask for the safe word before taking any action. This simple step defeats even the most convincing AI voice clone.
3. Be Skeptical of Urgency and Pressure
Virtually every vishing attack relies on creating a sense of urgency -- you must act now, there is no time to verify, the situation is critical. Legitimate callers from your bank, your employer, or government agencies will not pressure you to make immediate decisions over the phone. If you feel rushed, that itself is a red flag.
4. Do Not Trust Caller ID
Caller ID spoofing is trivial. Scammers can make any number appear on your phone, including numbers from your bank, your employer, or government agencies. Caller ID should never be used as the sole basis for trusting a call.
5. Limit Your Voice Footprint Online
Be thoughtful about how much audio of your voice is publicly available. Consider the privacy settings on social media videos, podcast appearances, and public recordings. The less audio of your voice that exists online, the harder it is for an attacker to clone it.
6. Use Strong Multi-Factor Authentication
Even if a vishing attacker convinces you to reveal a password, multi-factor authentication (MFA) provides an additional barrier. Use an authentication app like Google Authenticator or Microsoft Authenticator rather than SMS-based codes, which can be intercepted through SIM-swapping attacks.
7. Reduce Your Personal Data Exposure
Vishing attacks are far more convincing when the caller already knows your personal details -- your name, address, employer, bank, recent transactions, or family members' names. Much of this information is readily available through data brokers that collect and sell personal data online.
This is where a service like PrivacyOn makes a meaningful difference. By actively removing your personal information from over 100 data broker sites, PrivacyOn reduces the pool of data that attackers can use to make their vishing calls more convincing. The less an attacker knows about you before the call, the easier it is to recognize the call as fraudulent. PrivacyOn's dark web monitoring also alerts you if your personal data appears in criminal marketplaces, giving you early warning that you may be targeted.
What to Do If You Fall Victim to a Vishing Attack
If you suspect you have been scammed by a vishing call, act quickly:
- Contact your bank immediately to freeze or reverse any unauthorized transactions
- Change passwords on any accounts that may have been compromised, and enable MFA if you have not already
- File a report with the FBI's Internet Crime Complaint Center (IC3) at ic3.gov and with the FTC at reportfraud.ftc.gov
- Alert your employer if the attack involved your work accounts or impersonated a colleague
- Document everything -- write down the number that called, what was said, what information you provided, and any actions you took
- Place a fraud alert on your credit reports with Equifax, Experian, and TransUnion
The Bottom Line
AI has given scammers a powerful new weapon: the ability to sound exactly like someone you trust. The old advice of "just listen for a robotic voice" no longer applies. Today's AI-generated voices are fluid, natural, and nearly impossible to distinguish from the real thing in a live conversation.
Your best defense is a combination of healthy skepticism and proactive privacy habits. Verify unexpected calls independently. Use safe words with family. Never act under pressure. And reduce the personal information available about you online so that attackers have less ammunition to make their calls convincing. In a world where hearing is no longer believing, verification is your strongest safeguard.