⚠️
AWARENESS PURPOSE ONLY

Every technique described here is documented from real-world incidents and threat intelligence research. We explain how these attacks work so your team recognises them — not to enable them. The best defence against social engineering is always an informed human.

The Rules of Phishing Just Got Rewritten

For twenty years, we taught people to spot phishing by looking for the same things: bad grammar, generic greetings, suspicious sender addresses, unusual links. That training still matters. But the attack landscape has moved so far, so fast, that the old indicators are now table stakes — and the new techniques operate on an entirely different level.

The shift is AI. Not AI as a vague concept, but specific, accessible, cheap tools that let an attacker sound exactly like your CEO, appear on a video call as your IT manager, bypass every email security filter you have, and have a live, convincing conversation in real time. The technology that makes this possible costs less than a monthly gym membership and requires no technical expertise to use.

This article covers seven techniques that are either already active in the wild or have been demonstrated in controlled environments with realistic deployment potential. Some will make you uncomfortable. That's the point.

Technique 01 — AI Voice Cloning Vishing

01
AI Voice Cloning
3 Seconds of Audio · Real-Time Synthesis · Undetectable by Ear

Modern voice cloning tools — several of which are free or low-cost — can produce a convincing clone of any person's voice from as little as three seconds of audio. LinkedIn videos, YouTube interviews, podcast appearances, company website videos, recorded Teams calls leaked by an insider — all of these are viable source material. The attacker feeds the clip into the tool, and within minutes has a voice model they can type text into and have spoken aloud in the target's voice, in real time, on a phone call.

The attack vector most commonly deployed is the urgent wire transfer scenario. The attacker, posing as the CEO or a senior director, calls the financial controller or accounts payable staff member. The voice is the CEO's. The tone is familiar. The request is for an urgent payment to a new beneficiary — a supplier, a legal settlement, an acquisition deposit — and it needs to happen before close of business today. Don't email. Just do it. I'll explain later.

This attack has cost South African businesses tens of millions of rands. It works because it bypasses every technical control you have — it's a phone call, and the voice sounds exactly like someone your staff trusts implicitly.

BYPASSES ALL EMAIL FILTERS REAL-TIME SYNTHESIS 3-SEC CLONE FROM PUBLIC AUDIO

Here's a reconstructed example of how such a call sounds — based on a documented incident pattern:

AI-CEO "Hi Sarah, it's Michael. Listen, I need a quick favour — I'm heading into a board session in five minutes. We're closing the Durban acquisition today and the solicitors need a deposit by 3pm. R480,000 to the account I'm sending you on WhatsApp now. Mark it as legal services."
SARAH "Should I get sign-off from finance first? It's a new beneficiary—"
AI-CEO "Sarah, I'm literally walking in now. You have full authority on this. I'll ratify it in writing tonight. The deal falls through if we miss the window."
⚠ This is a synthetic reconstruction for awareness purposes. The voice heard by "Sarah" is indistinguishable from her CEO's real voice.
🛡️
HOW TO STOP IT: THE CALLBACK PROTOCOL

Establish a verbal safe word with your leadership team — a short, random word that must be included in any urgent financial instruction. If the caller doesn't know it, the call is fraudulent. Separately, implement a strict policy: no payment to a new beneficiary without a callback to a pre-verified number — not a number the caller gives you, but the number in your phone book. One extra call is all it takes.

Technique 02 — Deepfake Video Calls

02
Deepfake Video Calls
Real-Time Face Swap · Teams / Zoom / Meet · Free Tools Available

In early 2024, a finance employee at a multinational firm in Hong Kong was convinced to transfer the equivalent of R390 million after a video call in which every participant — including the CFO — was a deepfake. The technology has only become cheaper and more accessible since then. Tools like Deep-Live-Cam can run real-time face and voice replacement on consumer-grade hardware, requiring only a reference photo of the target and a short video clip for the voice.

The attack typically unfolds as follows: the target receives a meeting invitation for an urgent call. On the call, they see a familiar face — their manager, an IT helpdesk technician, an external auditor. The deepfake is plausible enough to pass a quick visual check, particularly on a lower-resolution video call. The attacker then uses the call to request credential resets, MFA bypass approvals, wire transfers, or access to sensitive systems.

A particularly effective variant targets IT helpdesk staff: the attacker poses as a senior executive in an emergency, requesting an immediate password reset without following standard verification procedure. Under the visual authority of a familiar face and an urgent tone, helpdesk staff frequently comply.

REAL-TIME FACE SWAP TARGETS CREDENTIAL RESETS WORKS ON LOW RES CALLS
💡
SPOT THE DEEPFAKE — WHAT TO LOOK FOR

Deepfakes still struggle with: edge blur around hair and ears, especially when the person moves quickly; unnatural blinking patterns (too frequent or too infrequent); misaligned lighting — the face is lit differently to the background; and slight audio/visual sync issues when the person moves their head. Ask the caller to turn sideways briefly — profile views are consistently harder for real-time deepfakes to render convincingly. Better yet: require all sensitive video-based authorisations to be followed up with an out-of-band confirmation via a separate channel.

Technique 03 — Quishing (QR Code Phishing)

03
Quishing
QR Code Phishing · Bypasses Every Email URL Filter

Your email security gateway scans every link in every email you receive. It detonates attachments in sandboxes. It checks URLs against threat intelligence feeds. It does all of this automatically. It cannot read a QR code.

Quishing — phishing via QR code — exploits this gap completely. The attacker sends an email with no suspicious links, no malicious attachments, and no URL for any filter to evaluate. Just a QR code embedded as an image. The email passes through every layer of your email security. The target scans the code with their phone — which is almost certainly outside your corporate security perimeter, unmanaged, and without any email security context — and is taken directly to a credential-harvesting page or malware download.

Common pretexts include: Microsoft MFA re-enrolment ("scan to verify your account"), parking fine payment notices, parcel delivery confirmation, and HR document signing. Physical quishing — where QR code stickers are placed over legitimate codes on parking meters, restaurant menus, or office printer instructions — brings this attack entirely offline and into physical spaces.

QUISHING EMAIL · EXAMPLE PRETEXT
From: it-helpdesk@[company-name]-support.co.za
Subject: ACTION REQUIRED: Microsoft Authenticator re-enrolment

Your MFA device registration expires in 24 hours.
Scan the QR code below to re-enrol and maintain access.

[ QR CODE IMAGE — links to: microsoft-auth-portal-za.com/renew ]

If you do not complete this within 24 hours,
your account will be suspended.

IT Support · Greyhat Industries
BYPASSES EMAIL URL SCANNING TARGETS PERSONAL PHONES WORKS PHYSICALLY TOO
🔑
STOP QUISHING IN YOUR ORGANISATION

Train staff to never scan a QR code in an email without first hovering to preview the URL (desktop) or using a QR scanner app that shows the destination URL before opening it. Your IT team should configure email gateways to flag or quarantine emails containing embedded QR code images. And establish a rule: your company will never send an MFA or account action via a QR code — so any email that does is automatically suspicious.

Technique 04 — AI-Personalised Smishing

04
AI-Personalised Smishing
SMS + OSINT + LLM = Hyper-Targeted Text Attacks

Old smishing was obvious: "SARS refund available, click here." Current smishing is something else entirely. Attackers now combine open-source intelligence (OSINT) with large language models to generate SMS messages that are personalised to the individual target using publicly available information — their name, employer, recent LinkedIn activity, area of residence, and even recent news events relevant to their industry.

The result is a text message that feels like it came from someone with inside knowledge. A dental practice owner might receive: "Hi Dr Sykes, following up on the POPIA compliance consultation we discussed — your submitted documents need a digital signature before Friday. Reply CONFIRM to receive the secure link." The attacker has harvested your name, profession, and a topical compliance concern from public sources, then crafted a message that sounds like a vendor follow-up.

At scale, this is now automated. Tools exist that take a list of phone numbers, scrape OSINT data for each one, and generate personalised phishing SMS messages in bulk using an LLM. What used to require a skilled social engineer hours of manual research now takes minutes per thousand targets.

AI-GENERATED PERSONALISATION OSINT-ENRICHED TARGETING AUTOMATED AT SCALE

Technique 05 — Adversary-in-the-Middle (AiTM) Phishing

05
AiTM — Adversary in the Middle
Steals Sessions Tokens · Defeats MFA · Invisible to the Victim

You've rolled out MFA. You've trained your team not to click suspicious links. Then an adversary-in-the-middle attack walks straight past both of those defences and steals an authenticated session anyway — without ever needing your password or your MFA code.

Here's how it works. The attacker sets up a reverse proxy — a server that sits between the victim and the legitimate site (say, your Microsoft 365 login). The victim receives a phishing link and visits what appears to be the genuine Microsoft login page — because it effectively is, just proxied through the attacker's server. The victim enters their credentials. The victim completes MFA. The session token is issued by Microsoft. The attacker's proxy silently copies that session token. The victim logs in successfully and notices nothing. The attacker replays the stolen session token from their own machine and is now authenticated as the victim — with full access — without ever triggering an MFA prompt.

Toolkits like Evilginx make this deployable by anyone with basic server skills. It is one of the reasons MFA alone is no longer a complete answer to account takeover — and why phishing-resistant MFA (hardware tokens, passkeys) is the next required step.

DEFEATS STANDARD MFA SESSION TOKEN THEFT REVERSE PROXY TECHNIQUE VICTIM SEES NOTHING WRONG
🔐
WHY THIS MAKES HARDWARE KEYS WORTH IT

FIDO2 hardware security keys (like a YubiKey) and passkeys are phishing-resistant by design — they bind authentication cryptographically to the legitimate domain. An AiTM proxy cannot capture a FIDO2 assertion because the key checks the actual origin URL before signing. For your highest-value accounts — CEO, CFO, IT admin, anyone with privileged access — phishing-resistant MFA is no longer optional. It's the gap between "we have MFA" and "we're actually protected."

Technique 06 — Phantom IT Helpdesk

06
Phantom Helpdesk Attack
Inbound Call from "IT" · Engineered Urgency · MFA Bypass

This one is subtle because the attacker calls you — not the other way around. The attack begins with a spoofed caller ID showing your IT support team's number. The caller claims to be from IT and says they've detected a problem with your account: a failed login from an unusual location, a virus alert, a compliance issue. They need to walk you through a fix right now.

The "fix" involves one of several things: approving an MFA push notification that the attacker is simultaneously triggering from their own login attempt; installing remote access software ("just download this tool so I can fix it for you"); or reading back a code sent to your phone — which is actually an account recovery code. Each of these gives the attacker exactly what they need while the victim believes they're following legitimate IT instructions.

This technique is called MFA fatigue bombing when it involves rapid successive MFA push notifications designed to frustrate the target into approving one just to stop them. Microsoft 365 and Duo users have lost accounts to exactly this. The attacker just keeps triggering pushes until, at 2am or mid-meeting, the target approves one to make it stop.

INBOUND "IT" CALL MFA FATIGUE BOMBING REMOTE ACCESS INSTALL

Technique 07 — AI-Powered Spearphishing at Scale

07
AI Spearphishing
LLM-Written · OSINT-Enriched · Flawless Language · Mass Deployed

Traditional spearphishing required significant manual effort per target — researching the person, crafting a convincing pretext, writing plausible email copy. That friction kept it targeted to high-value individuals. AI has removed that friction entirely.

Current attack pipelines work like this: automated OSINT tools scrape LinkedIn, company websites, news articles, and social media to build a profile of every employee at a target organisation. An LLM then generates a highly personalised email for each individual, referencing their specific role, recent activity, current events in their industry, and mimicking the communication style of their organisation. The emails are grammatically flawless, contextually plausible, and free of every traditional phishing indicator.

One particularly dangerous variant is the internal thread hijack. Having compromised one inbox, the attacker injects a reply into an existing email thread — continuing an active conversation between real colleagues — with a malicious link or attachment. The recipient sees a conversation they've been part of for days, a name they recognise, a topic they were already discussing, and a plausible next step. Click rates on this technique are dramatically higher than cold phishing.

LLM-GENERATED COPY THREAD HIJACKING NO GRAMMAR TELLS SCALES TO ENTIRE ORG

Your Practical Defence Playbook

These attacks are sophisticated. Your defences don't need to be complicated — they need to be consistent. The majority of social engineering attacks succeed not because they're technically unstoppable, but because the human target was never given a clear rule to follow when it happened.

Callback Protocol
Any urgent financial or access request by phone or video must be verified by calling back on a pre-stored number — not a number provided by the caller. No exceptions.
Safe Word System
Agree on a shared verbal safe word with leadership. Any urgent request that doesn't include it — even from a voice you recognise — gets verified before action is taken.
No QR in Email
Company policy: we never send QR codes in emails for account actions. Any email doing this is fraudulent. Train this rule explicitly — it removes the QR attack surface entirely.
Phishing-Resistant MFA
Hardware keys or passkeys for privileged accounts. Standard TOTP and push MFA can be defeated by AiTM and fatigue attacks. Phishing-resistant MFA cannot.
Helpdesk Verification
Your IT team should never call you and ask you to approve an MFA push. If this happens, hang up and call IT directly. This rule, communicated clearly, kills the phantom helpdesk attack.
Regular Simulations
Run phishing simulations quarterly — including voice and SMS, not just email. The only way to know your team can recognise these attacks is to test them safely in a controlled environment first.
🧠
THE MOST IMPORTANT THING TO UNDERSTAND

Every one of these techniques is designed to exploit trust and urgency simultaneously. Trust in a familiar voice, a known face, an ongoing conversation. Urgency that bypasses the pause-and-verify instinct. The single most effective defence you can install in your organisation is a culture where slowing down to verify is explicitly rewarded — not treated as an inconvenience or a sign of distrust. The two-minute delay to call back is not paranoia. It's the control.

How Would Your Team Actually Perform?

Greyhat4Hire runs controlled social engineering simulations — including vishing, smishing, and spearphishing — to show you exactly where your human defences break down before a real attacker finds out first.

Dr David Sykes
Dr David Sykes

Independent cybersecurity practitioner and practicing dentist based in Umhlanga, South Africa. Founder of Greyhat4Hire. Conducts social engineering assessments — including voice-based and physical attacks — as part of comprehensive penetration testing engagements.

About Dr Sykes
Vishing Voice Cloning Deepfake Quishing AiTM Social Engineering Awareness Training