Imagine receiving a call with the voice of someone you know, down to the identical pauses.
On the other end, the person urgently asks for help, money, or a password. You recognize the voice and believe them.
But in reality, it's artificial intelligence talking to you.

This is the new digital scam that is gaining traction in Brazil and around the world: AI voice cloning, one of the most sophisticated forms of social engineering already registered.
What is AI-powered voice cloning?
THE voice cloning using artificial intelligence uses machine learning models to to reproduce the speech of a real person.
With just a few seconds of audio, it's possible to train an algorithm to replicate speech timbre, intonation, and rhythm—with a high level of realism.
What once required studios and advanced technology can now be done by anyone with access to... free voice generation tools available on the internet.
How criminals use AI in scams
Criminals take advantage of this technology to commit crimes. fraud using cloned voices, generally with three main objectives:
- Deceiving family members or work colleagues, pretending to be someone close to them asking for money or help.
- Simulate corporate connections, posing as executives or suppliers to approve transactions and grant access.
- Stealing confidential information, inducing employees to share passwords, codes, or authorizations.
These scams are highly effective because they exploit the Emotional factor and trust — pillars of social engineering.
How the scam reaches you
The recordings used to clone voices can come from:
- Audio messages in chat applications;
- Recorded virtual meetings;
- Videos posted on social media;
- Common telephone support services.
In other words, any voice content can become raw material for a scam.
And the more evidence the criminal has, The more realistic the copy, the better..
Why is this scam so dangerous for businesses?
In corporate environments, the risk goes far beyond improper transfers.
A criminal with access to a manager's voice can:
- Request fake payments to finance departments;
- Deceiving support teams and obtaining administrative access;
- Recording fake messages to cause harm the company's reputation.
All of this without directly hacking into systems — simply manipulating people with an artificially convincing voice.
How to protect yourself from voice impersonation scams
Prevention starts with awareness and well-defined internal processes.
Check out the main best practices recommended by BNF:
- Confirm information through more than one channel.If you receive a suspicious call, confirm it via text message, email, or video.
- Train teams regularly. about new forms of fraud and social engineering.
- Establish validation protocols. for financial authorizations or access to systems.
- Avoid publicly sharing professional audio recordings., especially in non-corporate environments.
The role of technology and continuous surveillance
Tools 24/7 monitoring, vulnerability management and security policies They help identify suspicious behavior and prevent social engineering attacks from causing real harm.
In the BNF Technologywe agreed human intelligence and advanced technology To protect businesses from emerging threats, including AI-based scams.
Conclusion
Voice cloning shows that the boundary between the real and the digital is becoming increasingly blurred.
But it also reinforces a simple truth:
Information security starts with people.
With attention, training, and the right support, it's possible to transform the most vulnerable link in security—the human element—into... your greatest defense.