Skip to content
Back to Security Center

Voice Cloning Scams

How Voice Cloning Works

Voice cloning technology uses artificial intelligence to analyse a sample of someone's voice and generate new speech that sounds virtually identical to the original speaker. What makes this technology particularly alarming is how little source material is needed. Modern AI voice cloning tools can create a convincing replica from as little as three seconds of recorded audio.

These audio samples are not difficult to obtain. Voicemail greetings, social media videos, podcast appearances, YouTube clips, and even brief phone conversations can all provide sufficient material. Once a voice model has been created, the attacker can type any text and have it spoken aloud in the cloned voice, in real time or as a pre-recorded message.

The "Mum, I Have Been in an Accident" Scam

One of the most emotionally manipulative applications of voice cloning is the family emergency scam. A criminal calls a parent using a cloned version of their child's voice, claiming to have been in an accident, arrested, or otherwise in urgent need of money. The emotional shock of hearing what sounds exactly like your child in distress overrides rational thinking, and victims often transfer money before they have time to verify the situation.

Variations of this scam target other family relationships as well. Grandparents receive calls from "grandchildren", spouses receive urgent calls from "partners", and colleagues receive calls from "managers" authorising payments. The common thread is a familiar voice combined with a high-pressure, time-sensitive scenario designed to prevent the victim from pausing to think critically.

Vishing: Voice Phishing Attacks

Voice phishing, commonly known as vishing, encompasses any phone-based scam designed to extract personal information, financial details, or money from the recipient. Voice cloning has made vishing dramatically more effective. Where previously a scammer would rely on a convincing act and social engineering skills, they can now use a cloned voice that the victim genuinely recognises and trusts.

Common vishing scenarios enhanced by voice cloning include:

  • Bank impersonation: A cloned voice of a known contact tells you your bank account has been compromised and urges you to transfer funds to a "safe" account.
  • Business email compromise by phone: An employee receives a call that sounds like their CEO or finance director, instructing them to make an urgent wire transfer.
  • Tech support scams: Cloned voices impersonate customer service representatives from trusted companies.
  • Romance and friendship scams: On platforms like KF.Social, a scammer might use a cloned voice in a voice note or call to impersonate someone the victim has been communicating with.

Establishing a Family Safe Word

One of the simplest and most effective defences against voice cloning scams is establishing a family safe word or phrase. Choose a word or short phrase that is known only to your immediate family members. It should be something unusual, unrelated to your family's public information, and easy to remember.

Agree that in any emergency situation where someone calls asking for money or sensitive information, the caller must provide the safe word. If they cannot, the call should be treated as fraudulent regardless of how convincing the voice sounds. Review and update your safe word periodically, and never share it through digital channels where it could be intercepted.

Verifying Caller Identity

Beyond safe words, adopt these verification practices:

  • Call them back: If you receive an unexpected call from a family member or friend requesting money, hang up and call them back on their known number. If the original call was a scam, the real person will have no knowledge of it.
  • Ask personal questions: Pose questions that only the real person would know the answer to. Ask about specific, private details that would not be available publicly.
  • Be sceptical of urgency: Legitimate emergencies can wait two minutes for you to verify the situation. If the caller insists you must act immediately without checking, that pressure itself is a red flag.
  • Involve another family member: Before taking any action, contact another trusted family member or friend to confirm the situation.

Reducing Your Voice Footprint

Whilst it is impractical to eliminate your voice from the internet entirely, you can reduce the amount of material available for cloning:

  • Review the privacy settings on social media accounts where you have posted videos or voice recordings.
  • Be selective about participating in voice-based interactions with unknown parties online.
  • Consider whether public voicemail greetings need to include your voice, or whether a generic greeting would suffice.

Reporting Voice Cloning Scams

If you are targeted by a voice cloning scam, report it to Action Fraud immediately. Your report contributes to intelligence gathering and can support law enforcement investigations into organised fraud networks. If money was transferred, contact your bank as quickly as possible; rapid reporting gives financial institutions the best chance of recovering funds.

Voice cloning technology will continue to improve, making detection increasingly difficult. Building verification habits now, before you are targeted, is the most reliable way to protect yourself and your family from this evolving threat.

Back to Security Center