AI-Powered Social Engineering

Overview

LLMs enable personalized social engineering at unprecedented scale. What required a human operator spending 30 minutes per target can now be automated to generate thousands of tailored phishing messages per hour.

Capabilities

Automated Reconnaissance

Feed an LLM target information from LinkedIn, social media, company websites, and press releases. The model produces:

  • Organizational context (reporting structure, recent events)
  • Communication style analysis (formal vs. casual, jargon used)
  • Personalized pretexts based on the target's role and interests
  • Multi-language support without human translators

Phishing Generation

Traditional PhishingAI-Powered Phishing
Generic templatesPersonalized per target
Obvious grammatical errorsFluent, natural prose
One languageAny language
Static contentDynamic, contextual
Manual effort per emailAutomated at scale

Voice Cloning (Vishing)

Modern voice cloning requires only 3-15 seconds of sample audio:

  1. Obtain target executive's voice sample (earnings call, YouTube, podcast)
  2. Clone the voice using tools like ElevenLabs, Tortoise-TTS, or VALL-E
  3. Generate real-time or pre-recorded audio for phone calls
  4. Impersonate executive to authorize wire transfers, credential resets, etc.

Deepfake Video

Real-time face swapping for video calls. Used to impersonate executives in live meetings. Quality has reached the point where casual observation won't catch it.

Detection Challenges

  • AI-generated text has no consistent stylistic tells
  • Voice clones pass human perception tests
  • Volume makes manual review impossible
  • Detection tools lag behind generation capabilities