Unknown voice cloning technology
Incidents involved as Developer
Incident 9428 Reports
Cybercriminals Reportedly Exploited Google’s G.Co Subdomain and Spoofed Caller ID in AI-Driven Phishing Attack on Hack Club Founder
2025-02-20
Hack Club founder Zach Latta was reportedly targeted in an AI-assisted phishing attack exploiting Google’s own systems. Cybercriminals allegedly spoofed a legitimate Google Assistant number and used voice cloning to impersonate support staff, claiming unusual login activity from Frankfurt. They reinforced the deception by sending a real email from Google’s Workspace domain. The attack, which relied on Google’s g.co subdomain, was thwarted when inconsistencies raised Latta’s suspicions.
MoreIncidents implicated systems
Incident 70136 Reports
American Asylum Seeker John Mark Dougan in Russia Reportedly Spreads Disinformation via AI Tools and Fake News Network
2024-05-29
John Mark Dougan, a former Florida sheriff's deputy granted asylum in Russia, has been implicated in spreading disinformation. Utilizing AI tools like OpenAI's ChatGPT and DALL-E 3, Dougan created over 160 fake news sites, disseminating false narratives to millions worldwide. His actions align with Russian disinformation strategies targeting Western democracies. See also Incident 734.
MoreIncident 92725 Reports
Fraudsters Allegedly Use AI-Generated Voice of Italian Defense Minister Guido Crosetto to Scam Business Leaders
2025-02-04
In February 2025, scammers allegedly used AI voice cloning to impersonate Italian Defense Minister Guido Crosetto, calling top business leaders and reportedly claiming to need funds to free kidnapped journalists. Massimo Moratti was allegedly the only confirmed victim to send nearly €1M, wiring it to accounts in the Netherlands and Hong Kong before realizing the fraud. The scam involved spoofed government numbers, deepfake audio, and international money laundering networks. Police reportedly froze the funds.
MoreIncident 82416 Reports
Fake Video Allegedly Misattributes False Claims to Former Student in Attack on Vice-Presidential Candidate Tim Walz
2024-10-16
A viral video falsely accused Democratic vice-presidential nominee Tim Walz of misconduct by using the stolen identity of former student Matthew Metro. Circulated on X and other platforms, the video reached millions before being flagged for manipulation. U.S. intelligence later revealed it and three other similar events were part of the Russian disinformation campaign Storm-1516, whose aim is to disrupt the 2024 elections.
MoreIncident 92916 Reports
Sustained AI-Driven Russian Disinformation Campaigns Doppelgänger, Storm-1516, and Matryoshka Reportedly Disrupting German Federal Elections
2024-12-06
Leading up to Germany’s February 23, 2025, federal election, the alleged Russian Doppelgänger, Storm-1516, and Matryoshka (Operation Overload) disinformation campaigns have reportedly been deploying AI-generated deepfake videos and fake news sites to spread false claims about German politicians and public figures. AI-powered bots have allegedly been amplifying the content across social media. Researchers suggest the campaign sought to erode trust in Germany’s democratic process. Germany's domestic intelligence agency (BfV) described the scale as unprecedented.
MoreRelated Entities
Other entities that are related to the same incident. For example, if the developer of an incident is this entity but the deployer is another entity, they are marked as related entities.
Related Entities
John Mark Dougan
Incidents involved as Deployer
- Incident 70136 Reports
American Asylum Seeker John Mark Dougan in Russia Reportedly Spreads Disinformation via AI Tools and Fake News Network
- Incident 92916 Reports
Sustained AI-Driven Russian Disinformation Campaigns Doppelgänger, Storm-1516, and Matryoshka Reportedly Disrupting German Federal Elections
Incidents implicated systems
- Incident 92916 Reports
Sustained AI-Driven Russian Disinformation Campaigns Doppelgänger, Storm-1516, and Matryoshka Reportedly Disrupting German Federal Elections
- Incident 9374 Reports
Bolivian Criminal Network Allegedly Used Deepfake of Education Minister to Defraud at Least 19 Victims in Employment Scam
Scammers impersonating Robert Abela and Mark Laurence Zammit
Incidents involved as Deployer
Voice phishers
Incidents involved as Deployer
- Incident 9428 Reports
Cybercriminals Reportedly Exploited Google’s G.Co Subdomain and Spoofed Caller ID in AI-Driven Phishing Attack on Hack Club Founder
- Incident 9428 Reports
Cybercriminals Reportedly Exploited Google’s G.Co Subdomain and Spoofed Caller ID in AI-Driven Phishing Attack on Hack Club Founder
Scammers impersonating Google staff
Incidents involved as Deployer
- Incident 9428 Reports
Cybercriminals Reportedly Exploited Google’s G.Co Subdomain and Spoofed Caller ID in AI-Driven Phishing Attack on Hack Club Founder
- Incident 9428 Reports
Cybercriminals Reportedly Exploited Google’s G.Co Subdomain and Spoofed Caller ID in AI-Driven Phishing Attack on Hack Club Founder
Zach Latta
Incidents Harmed By
- Incident 9428 Reports
Cybercriminals Reportedly Exploited Google’s G.Co Subdomain and Spoofed Caller ID in AI-Driven Phishing Attack on Hack Club Founder
- Incident 9428 Reports
Cybercriminals Reportedly Exploited Google’s G.Co Subdomain and Spoofed Caller ID in AI-Driven Phishing Attack on Hack Club Founder
Google users
Incidents Harmed By
- Incident 9428 Reports
Cybercriminals Reportedly Exploited Google’s G.Co Subdomain and Spoofed Caller ID in AI-Driven Phishing Attack on Hack Club Founder
- Incident 9428 Reports
Cybercriminals Reportedly Exploited Google’s G.Co Subdomain and Spoofed Caller ID in AI-Driven Phishing Attack on Hack Club Founder
Google Workspace
Incidents implicated systems
- Incident 9428 Reports
Cybercriminals Reportedly Exploited Google’s G.Co Subdomain and Spoofed Caller ID in AI-Driven Phishing Attack on Hack Club Founder
- Incident 9428 Reports
Cybercriminals Reportedly Exploited Google’s G.Co Subdomain and Spoofed Caller ID in AI-Driven Phishing Attack on Hack Club Founder
Google authentication system
Incidents implicated systems
- Incident 9428 Reports
Cybercriminals Reportedly Exploited Google’s G.Co Subdomain and Spoofed Caller ID in AI-Driven Phishing Attack on Hack Club Founder
- Incident 9428 Reports
Cybercriminals Reportedly Exploited Google’s G.Co Subdomain and Spoofed Caller ID in AI-Driven Phishing Attack on Hack Club Founder
Google Assistant
Incidents implicated systems
- Incident 9428 Reports
Cybercriminals Reportedly Exploited Google’s G.Co Subdomain and Spoofed Caller ID in AI-Driven Phishing Attack on Hack Club Founder
- Incident 9428 Reports
Cybercriminals Reportedly Exploited Google’s G.Co Subdomain and Spoofed Caller ID in AI-Driven Phishing Attack on Hack Club Founder
Google's g.co subdomain
Incidents implicated systems
- Incident 9428 Reports
Cybercriminals Reportedly Exploited Google’s G.Co Subdomain and Spoofed Caller ID in AI-Driven Phishing Attack on Hack Club Founder
- Incident 9428 Reports
Cybercriminals Reportedly Exploited Google’s G.Co Subdomain and Spoofed Caller ID in AI-Driven Phishing Attack on Hack Club Founder