On the Feasibility of Fully AI-automated Vishing Attacks

João Figueiredo,Afonso Carvalho,Daniel Castro,Daniel Gonçalves,Nuno Santos
2024-09-20
Abstract:A vishing attack is a form of social engineering where attackers use phone calls to deceive individuals into disclosing sensitive information, such as personal data, financial information, or security credentials. Attackers exploit the perceived urgency and authenticity of voice communication to manipulate victims, often posing as legitimate entities like banks or tech support. Vishing is a particularly serious threat as it bypasses security controls designed to protect information. In this work, we study the potential for vishing attacks to escalate with the advent of AI. In theory, AI-powered software bots may have the ability to automate these attacks by initiating conversations with potential victims via phone calls and deceiving them into disclosing sensitive information. To validate this thesis, we introduce ViKing, an AI-powered vishing system developed using publicly available AI technology. It relies on a Large Language Model (LLM) as its core cognitive processor to steer conversations with victims, complemented by a pipeline of speech-to-text and text-to-speech modules that facilitate audio-text conversion in phone calls. Through a controlled social experiment involving 240 participants, we discovered that ViKing has successfully persuaded many participants to reveal sensitive information, even those who had been explicitly warned about the risk of vishing campaigns. Interactions with ViKing's bots were generally considered realistic. From these findings, we conclude that tools like ViKing may already be accessible to potential malicious actors, while also serving as an invaluable resource for cyber awareness programs.
Cryptography and Security,Artificial Intelligence,Audio and Speech Processing
What problem does this paper attempt to address?
The problem that this paper attempts to solve is: **to evaluate whether AI technology can achieve fully - automated voice phishing (vishing) attacks**. Specifically, the researchers developed an AI - driven vishing system named ViKing and verified the potential and effectiveness of such a system in automated social engineering attacks through experiments. ### Problem Background Voice phishing (vishing) is a form of social engineering attack that deceives individuals into disclosing sensitive information (such as personal data, financial information or security credentials) over the phone. Attackers take advantage of the urgency and authenticity of voice communication to manipulate victims, usually disguising themselves as trusted entities such as banks or technical support. With the progress of AI technology, especially the development of large - language models (LLM), researchers are worried that vishing attacks may become more complex and efficient. ### Research Objectives The main research objectives of the paper include: 1. **Verify the effectiveness of the AI - driven vishing system**: The researchers want to evaluate whether the AI system can successfully lead the conversation and obtain specific information from the victims. 2. **Evaluate the credibility of the system**: The researchers hope to determine whether the behavior of the AI system can arouse the trust of the victims, thereby increasing the success rate of the attack. 3. **The ability to simulate real - human conversations**: The researchers want to prove whether the AI system can effectively imitate real - human conversations on the phone. 4. **Calculate the operating cost**: The researchers aim to determine the cost of running an AI - driven vishing system. ### Experimental Design To verify these objectives, the researchers designed a controlled social experiment and recruited 240 participants. Each participant was assigned to four different groups, and each group received different levels of information about vishing risks. The experimental results showed that ViKing successfully persuaded 52% of the participants to disclose sensitive information, and even among those participants who were informed of vishing risks, 33% still disclosed the information. ### Conclusions The research results indicate that the AI - driven vishing system already has a relatively high success rate and a relatively low operating cost, which has raised new concerns about network security. At the same time, the research also emphasizes the importance of increasing public awareness of vishing attacks in order to reduce the success rate of such attacks. ### Formula Representation Although this article does not involve complex mathematical formulas, simple statistical formulas can be used to represent key data when describing experimental results: - Success rate: \[ \text{Success rate}=\frac{\text{The number of participants who successfully obtained sensitive information}}{\text{The total number of participants}}\times100\% \] - Cost range: \[ \text{Cost range} = [\text{Minimum cost}, \text{Maximum cost}] \] Through these formulas, the key data in the experimental results can be expressed more clearly. ### Summary This paper demonstrates the potential threat of AI technology in automated vishing attacks by developing and testing the ViKing system, and calls for further research on new defense mechanisms to meet this challenge.