Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 1208

Voice Cloning Attack

What is Voice Cloning Attack?

Voice Cloning AttackAn attack that uses AI-generated speech mimicking a real person to bypass voice authentication or trick victims into authorising payments or actions.


A voice cloning attack uses a deep-learning model trained on a few seconds of a target's audio to synthesise convincing speech in that person's voice. Modern systems such as ElevenLabs, Resemble, and open-source tools have made high-quality cloning available with minutes of training data scraped from public videos or voicemail. Attackers leverage cloned voices for CEO fraud and 'grandparent scams' where a relative is impersonated in distress, for bypassing voice-biometric authentication at banks and call centres, and for social engineering helpdesks. Defences include liveness detection, out-of-band callback to a known number, code words shared inside families, and replacing voiceprint as a primary authentication factor.

Examples

  1. 01

    An attacker clones a CFO's voice from a conference talk and phones the accounting team to demand an urgent wire transfer.

  2. 02

    A parent receives a panicked call from what sounds like their child asking for bail money - in reality a cloned voice.

Frequently asked questions

What is Voice Cloning Attack?

An attack that uses AI-generated speech mimicking a real person to bypass voice authentication or trick victims into authorising payments or actions. It belongs to the AI & ML Security category of cybersecurity.

What does Voice Cloning Attack mean?

An attack that uses AI-generated speech mimicking a real person to bypass voice authentication or trick victims into authorising payments or actions.

How does Voice Cloning Attack work?

A voice cloning attack uses a deep-learning model trained on a few seconds of a target's audio to synthesise convincing speech in that person's voice. Modern systems such as ElevenLabs, Resemble, and open-source tools have made high-quality cloning available with minutes of training data scraped from public videos or voicemail. Attackers leverage cloned voices for CEO fraud and 'grandparent scams' where a relative is impersonated in distress, for bypassing voice-biometric authentication at banks and call centres, and for social engineering helpdesks. Defences include liveness detection, out-of-band callback to a known number, code words shared inside families, and replacing voiceprint as a primary authentication factor.

How do you defend against Voice Cloning Attack?

Defences for Voice Cloning Attack typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Voice Cloning Attack?

Common alternative names include: Audio deepfake, AI voice fraud, Vishing 2.0.

Related terms