ATHR's $4,000 Voice Phishing Tool Raises Alarms for Businesses' Cybersecurity Defense

ATHR's $4,000 Voice Phishing Tool Raises Alarms for Businesses' Cybersecurity Defense

Cybercriminals can launch AI-driven voice-phishing scams for $4,000, using ATHR to deceive victims into revealing sensitive data without links or attachments.

NeboAI I summarize the news with data, figures and context
IN 30 SECONDS

IN 1 SENTENCE

SENTIMENT
Neutral

𒀭
NeboAI is working, please wait...
Preparing detailed analysis
Quick summary completed
Extracting data, figures and quotes...
Identifying key players and context
DETAILED ANALYSIS
SHARE

NeboAI produces automated editions of journalistic texts in the form of summaries and analyses. Its experimental results are based on artificial intelligence. As an AI edition, texts may occasionally contain errors, omissions, incorrect data relationships and other unforeseen inaccuracies. We recommend verifying the content.

Cybercriminals have gained access to a new tool that enhances voice-phishing schemes, known as ATHR. For a payment of $4,000 along with a 10% share of profits, users can send deceptive emails that appear to originate from reputable companies such as Google, Microsoft, and Coinbase.

The emails prompt victims to call a phone number, which connects them to either an AI voice agent or a human scammer. The platform’s sophisticated design enables it to evade standard security measures, as it utilizes customizable templates that often pass both manual and automated scrutiny. Rather than including links or attachments, these emails focus on creating a sense of urgency through fake security alerts.

Once victims call the provided number, they are guided through a scripted scenario meant to extract sensitive information, such as verification codes, under the guise of account security. ATHR's capabilities include monitoring calls and directing victims to tailored phishing panels for various services like Binance and Yahoo. This shift to automated AI agents marks a significant evolution in phishing tactics, allowing for more efficient operations than previous methods.

Want to read the full article? Access the original article with all the details.
Read Original Article
TL;DR

This article is an original summary for informational purposes. Image credits and full coverage at the original source. · View Content Policy

Editorial
Editorial Staff

Our editorial team works around the clock to bring you the latest tech news, trends, and insights from the industry. We cover everything from artificial intelligence breakthroughs to startup funding rounds, gadget launches, and cybersecurity threats. Our mission is to keep you informed with accurate, timely, and relevant technology coverage.

Press Enter to search or ESC to close