Security researchers at Proofpoint have uncovered a highly advanced phishing campaign, dubbed 'SilentVoice', that leverages AI-generated deepfake audio to bypass multi-factor authentication (MFA). Attackers are targeting corporate employees by impersonating senior executives over the phone using cloned voices. The goal is to socially engineer the employee into approving an MFA push notification, thereby granting the attackers access to critical corporate accounts. The campaign starts with public audio clips of an executive, which are used to train an AI voice model. The attacker then calls an employee, using the deepfake voice to create a convincing and urgent scenario that manipulates the target into compromising their account. This attack vector demonstrates a significant evolution in social engineering, effectively neutralizing common forms of MFA and leading to successful, high-impact breaches.
The SilentVoice campaign represents a new level of sophistication in social engineering. It combines reconnaissance, AI technology, and real-time interaction to defeat both human vigilance and technical controls.
T1591.002 - Business Relationships).T1566.004 - Spearphishing Voice).T1621 - Multi-Factor Authentication Request Generation).This attack is less about technical exploits and more about the masterful manipulation of human psychology, augmented by technology. The use of a convincing, AI-generated voice of a known authority figure (a CEO or CFO) dramatically increases the likelihood of success. It bypasses the typical visual cues that might reveal an email phishing attempt and preys on an employee's willingness to help a superior, especially in a seemingly urgent situation. The primary technical component is the AI voice cloning, which has become increasingly accessible and realistic. The rest of the attack relies on standard credential harvesting and real-time interaction. The key TTP is the social engineering aspect of tricking a legitimate user into completing the authentication loop on the attacker's behalf.
The impact of a successful SilentVoice attack is severe. By gaining access to a legitimate, authenticated session, attackers bypass many traditional security controls. If they compromise a financial or ERP account, they can initiate fraudulent transactions, leading to direct financial loss. Access to a cloud administrator account could lead to a widespread data breach or infrastructure compromise. The success of these attacks undermines confidence in MFA as a panacea and demonstrates that even robust security postures can be defeated by targeting the human element. Proofpoint has already linked this campaign to multiple successful breaches, confirming its real-world effectiveness.
Detection is challenging as the attack manipulates legitimate processes. Focus should be on anomalies and user-reported events.
| Type | Value | Description | Context |
|---|---|---|---|
log_source |
Authentication Logs | A successful MFA-authenticated login from an unfamiliar IP address, location, or device immediately following a report of a suspicious phone call. | SIEM, Cloud Provider Logs (e.g., Azure AD Sign-in Logs) |
other |
User-reported suspicious phone call | An employee reporting a strange or urgent call from someone claiming to be an executive. This is the most likely early warning sign. | Help Desk ticketing system, Security team reporting channels |
url_pattern |
Lookalike domains for corporate login portals | The credential harvesting site used in the first stage of the attack. | Web proxy logs, DNS logs |
User Geolocation Logon Pattern Analysis (D3-UGLPA).Authentication Event Thresholding (D3-ANET).The primary defense is to train users to recognize social engineering and to independently verify urgent requests before acting.
While the attack bypasses some MFA, using phishing-resistant MFA (FIDO2) or MFA with number matching would mitigate this specific technique.
Mapped D3FEND Techniques:
Using identity protection tools to detect and block logins from anomalous locations can prevent the account takeover.
Mapped D3FEND Techniques:
To defend against MFA bypass attacks like SilentVoice, organizations must evolve their MFA implementation. The highest level of defense is to adopt phishing-resistant MFA, such as FIDO2/WebAuthn security keys. This method cryptographically binds the user's login to the legitimate website, making it impossible for an attacker to capture credentials on a fake site and relay them. If deploying hardware keys is not feasible, the next best step is to enable 'number matching' or 'code matching' on existing push-based MFA solutions (like Microsoft Authenticator or Okta Verify). This forces the user to enter a number displayed on the login screen into their app, preventing accidental or coerced approval of a prompt they did not initiate. Standard, one-tap push notifications are no longer sufficient against these advanced social engineering attacks.
The human element is the primary target of the SilentVoice campaign, making user training the most critical line of defense. Organizations must immediately update their security awareness programs to include specific modules on AI-powered vishing and deepfake threats. Training should explicitly instruct employees on a 'Zero Trust' approach to urgent requests: never approve an MFA prompt you did not personally initiate, and always verify unusual requests from executives using a secondary, out-of-band communication channel (e.g., calling them back on their known number, or sending a direct message via a trusted corporate chat platform). Role-playing exercises and phishing simulations that include voice-based scenarios can help build muscle memory. A clear, non-punitive process for reporting suspicious calls must be established and promoted, empowering employees to be the first line of detection.
Implement and configure advanced identity protection features in your identity provider (e.g., Azure AD Identity Protection, Okta Risk-Based Authentication). These tools can detect and block logins that exhibit risky behavior, which is a key component of the SilentVoice attack. Specifically, enable and tune 'impossible travel' and 'anomalous location' policies. In this attack, the attacker's login attempt will originate from a different location than the legitimate user. A properly configured policy should flag this as a high-risk sign-in, block the authentication, and/or force a password reset. This provides an automated, technical backstop that can prevent the account takeover even if the social engineering is successful in tricking the user.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats