AI Voice Cloning Scams: How to Protect Your Family and Business
AI voice cloning scams are targeting high-net-worth individuals and businesses. Learn how these attacks work and the practical steps to protect yourself.
Nerdster Team
18 December 2025
A three-second audio clip is all that modern AI needs to clone a voice convincingly enough to fool family members, colleagues, and even close friends. In 2025, UK Finance reported that AI-enabled voice scams cost UK victims over GBP 120 million, with high-net-worth individuals and business executives disproportionately targeted. This threat sits at the intersection of personal and corporate security, and it demands attention from both angles.
How Voice Cloning Scams Work
The Technology
AI voice cloning has advanced rapidly. Tools that were research projects two years ago are now commercially available, some for under $5 per month. The process is straightforward:
- The attacker obtains a sample of the target’s voice — from social media videos, podcast appearances, conference recordings, voicemail greetings, or even a brief phone call where the attacker poses as a recruiter or survey caller.
- The AI model trains on the sample and produces a voice clone that captures tone, cadence, accent, and speech patterns.
- The cloned voice is used in real-time phone calls or to generate pre-recorded audio messages.
The quality of modern voice clones is remarkable. In controlled tests, listeners correctly identified AI-generated speech only 50% of the time — equivalent to a coin flip.
Common Attack Scenarios
The family emergency scam. A call that appears to come from a family member — often a child or grandchild — claiming to be in an emergency situation and needing immediate financial help. The voice sounds exactly right. The emotional urgency suppresses critical thinking. This is the most common variant and disproportionately targets high-net-worth families.
The CEO fraud call. A finance team member receives a call from what sounds like their CEO or CFO, instructing them to process an urgent payment. The call may be followed by an email (also fraudulent) confirming the instruction. The combination of a familiar voice and a written trail can be extremely convincing.
The vendor payment redirect. A call purporting to be from a known vendor or supplier, informing your accounts team that their bank details have changed. The voice matches someone your team has spoken with before.
The private banker impersonation. For HNWI and family offices, attackers clone the voice of a known private banker or wealth manager to request transfers or share fraudulent investment opportunities.
Why High-Net-Worth Individuals Are Primary Targets
Several factors make HNWI particularly vulnerable:
- Public exposure. Interviews, charity events, industry conferences, and social media provide abundant voice samples.
- High-value targets. A single successful scam can yield tens or hundreds of thousands of pounds.
- Domestic staff and family offices. Personal assistants, household staff, and family office employees may be less security-aware than corporate finance teams.
- Family dynamics. The urgency of a perceived family emergency overrides security training.
- Complex financial lives. Multiple bank accounts, investment platforms, and financial advisors create more potential attack vectors.
Protecting Your Family
Establish a Family Code Word
Agree on a code word or phrase that any family member must use when making an urgent financial request by phone. The code word should be:
- Known only to family members
- Not something that could be guessed from social media
- Changed periodically
- Never written down in digital form
If someone calls claiming to be a family member and cannot provide the code word, treat the call as fraudulent regardless of how convincing the voice sounds.
Limit Public Voice Exposure
Consider how much of your voice exists in publicly accessible recordings. Review:
- Social media videos on Instagram, TikTok, LinkedIn, and YouTube
- Podcast appearances
- Conference or event recordings
- Voicemail greetings (keep them generic rather than using your name and full greeting)
You do not need to eliminate all public presence, but be conscious of the material you are providing to potential attackers.
Brief Your Household and Family Office
Anyone with the ability to act on your behalf or make financial decisions needs to understand this threat. Conduct a briefing covering:
- How voice cloning works
- The family code word protocol
- Verification procedures for any financial instruction received by phone
- How to report a suspected scam attempt
Verify Before Acting
Make it a household rule: any phone call requesting money, account changes, or sensitive information must be verified through a separate channel. Hang up and call back on a known number. This single habit prevents the vast majority of voice cloning scams.
Protecting Your Business
Implement Callback Verification for Payments
No payment above a defined threshold should be processed based solely on a phone call, regardless of who appears to be calling. Require callback verification to a pre-registered number before processing.
Use Secure Communication for Sensitive Instructions
Move sensitive financial communications to authenticated channels. A Microsoft Teams call from a verified corporate account is significantly harder to spoof than a regular phone call.
Train Specifically on Voice Cloning
General phishing awareness training is not sufficient. Run specific training scenarios that address voice-based social engineering, including:
- Playing examples of AI-cloned voices
- Running simulated voice phishing exercises
- Reinforcing the callback verification protocol
- Creating a no-blame reporting culture
Review Publicly Available Information
Conduct an audit of executive voice and video content that is publicly accessible. Consider whether conference recordings, earnings calls, and marketing videos need to remain indefinitely available.
What to Do If You Are Targeted
- Do not send money or share information. Hang up immediately.
- Call the real person using a number you know is legitimate. Verify whether they made the call.
- Report to Action Fraud (0300 123 2040 or actionfraud.police.uk).
- Alert your bank if any financial information was shared.
- Inform your IT provider so they can check for broader compromise indicators.
- Document everything you can remember about the call for law enforcement.
How Nerdster Helps
We work with business leaders and high-net-worth families to implement comprehensive security that covers both corporate and personal attack surfaces. From secure communication infrastructure to awareness training and incident response, we build defences that address the full spectrum of AI-enabled threats.
Contact Nerdster for a free IT assessment that includes an evaluation of your exposure to voice cloning and other AI-powered attack vectors.