The FBI is issuing an urgent warning to the public about an ongoing malicious campaign targeting individuals through text and voice messages.
Since April 2025, cybercriminals have been impersonating senior U.S. officials in an effort to gain access to personal and official accounts. Many of the victims so far have been current or former high-ranking U.S. federal or state officials.
The malicious actors are using a combination of “smishing” (text message phishing) and “vishing” (voice phishing), including AI-generated voice messages, to deceive their targets. If you receive a message claiming to be from a senior U.S. official, do not assume its authenticity.
How the Scam Operates
These cybercriminals first establish contact with the target by sending SMS or voice messages, often pretending to be a trusted figure in the government. They often include a malicious link disguised as a way to switch to a different messaging platform. Once clicked, these links can lead to phishing websites or malware designed to steal login credentials and other sensitive data.
Smishing and vishing are common tactics used to extract confidential information. While smishing typically involves sending fraudulent SMS or MMS text messages, vishing uses voice messages to impersonate well-known figures. These attacks rely on social engineering to trick individuals into revealing personal information.
Phishing Techniques in Detail
The use of smishing, vishing, and spear phishing allows these actors to transition their targets to secondary platforms where they can introduce malware or gain access to sensitive information. For example, smishing often uses software to create fake phone numbers to engage victims, while vishing employs AI-generated voices to sound like public figures or personal contacts. These tactics make the scams harder to detect and more convincing.
Spotting Suspicious Messages: Tips for Identifying Fraud
Here are some helpful strategies to identify suspicious messages and protect yourself:
Verify the Sender: Always verify the identity of the person contacting you. Research the number, organization, or person, and call them through independently confirmed contact details to ensure authenticity.
Examine Communication Closely: Scrutinize any email, text, or voice message for small inconsistencies, such as slight variations in contact information or unusual spelling. Scammers may also use AI-generated voices or images to create a false sense of familiarity.
Look for Imperfections in AI Content: Pay attention to any flaws in images, voice recordings, or videos. Look for unnatural features like distorted body parts, irregular faces, or inconsistent shadows. AI-generated content may also have voice lag or unnatural movements.
Listen Carefully to Voice Messages: Listen closely to voice messages for any signs of AI generation. The tone, pacing, and choice of words may differ from what a legitimate person would typically say.
Protecting Yourself from Fraud and Data Theft
To safeguard yourself from potential fraud and the loss of sensitive information, follow these guidelines:
Do Not Share Sensitive Information: Never share personal or financial information with people you’ve only met online or over the phone. If you are contacted by someone you know but through a new phone number or platform, verify their identity through a trusted source.
Be Cautious with Financial Requests: Avoid sending money, gift cards, or cryptocurrency to unfamiliar contacts. If someone you know requests funds, independently verify their contact details before acting. Always assess the situation’s context and plausibility.
Be Careful with Links and Attachments: Do not click on links or open attachments in unsolicited emails or texts. Always confirm the sender’s identity first.
Enable Multi-Factor Authentication (MFA): Activate MFA on your accounts whenever possible and avoid disabling it. Be cautious of social engineering attempts to acquire authentication codes, as this can allow hackers to take over your accounts.
Create a Family Code: Set up a secret code or phrase with family members to verify their identity if you receive unusual requests.
Source
Source: https://coindoo.com/how-to-protect-yourself-from-potential-crypto-fraud-according-to-fbi/