• Technologies
    • Networking
    • Cybersecurity
    • Collaboration
    • Edge Cloud
    • Managed & Professional Services
    • SASE
  • Customer Stories
  • Insights
    • Business Continuity & Disaster Recovery (BCDR)
    • Customer Experience
    • Data-Driven Business
    • Operational Efficiency
    • Tech Trends
  • Industries
    • Financial Services
    • Gaming
    • Healthcare
    • Manufacturing
    • Media & Entertainment
    • Public Sector
    • Higher Education
    • Retail
    • Technology
  • About Lumen
    • Black Lotus Labs
    • Leadership Perspectives
    • Newsroom
    • News Spotlights
  • Technologies
    • Networking
    • Cybersecurity
    • Collaboration
    • Edge Cloud
    • Managed & Professional Services
    • SASE
  • Customer Stories
  • Insights
    • Business Continuity & Disaster Recovery (BCDR)
    • Customer Experience
    • Data-Driven Business
    • Operational Efficiency
    • Tech Trends
  • Industries
    • Financial Services
    • Gaming
    • Healthcare
    • Manufacturing
    • Media & Entertainment
    • Public Sector
    • Higher Education
    • Retail
    • Technology
  • About Lumen
    • Black Lotus Labs
    • Leadership Perspectives
    • Newsroom
    • News Spotlights

The Evolution Of Social Engineering And Phishing In The Age Of Artificial Intelligence

Mayuri Samala Posted On August 5, 2024
0
15.4K Views


0
Shares
  • Share On Facebook
  • Tweet It

Four individuals are gathered around a table in orange chairs with a staircase in the background as one talks to the group while the other three listen

Imagine this: A world where a well-known casino resort, a beacon of entertainment and luxury, became the latest prey for the dark art of social engineering. On September 11, 2023, a digital heist unfolded, stripping away layers of security to reveal the fragile core of personal data. An unauthorized third party obtained sensitive customer information, including names, contact details, and in some cases, social security and passport numbers.1 This is not fiction; it’s the chilling reality of social engineering and phishing in the AI era.

This real-life incident highlights not only the vulnerability of individuals, but also that of the largest organizations. It is a sobering reminder that, in the age of digital technology, even seemingly innocuous emails can pose serious threats.

The Evolution Of Deception

Social engineering has always been about exploiting human psychology. In its early days, it involved tactics like impersonation or dumpster diving to gather sensitive information. Phishing, the act of deceiving someone into disclosing confidential information, remains a significant issue in cybersecurity.

How AI Is Evolving Social Engineering And Phishing

As we have become more aware of the warning signs of these scams, the bad actors have upped their game by using AI. The days of poorly written emails with grammatical errors are long gone; instead, phishing attempts nowadays are smart, targeted and frighteningly convincing.

  1. Spear phishing with AI: While phishing typically involves mass emails meant to trick recipients into divulging sensitive information, spear phishing is a more insidious variant, targeting specific individuals with tailored messages. AI amplifies the threat by enabling cybercriminals to personalize these attacks on a large scale, using data mined from online activities to craft convincing deceptions that are much harder to detect and resist.
  2. Deepfakes: AI-generated deepfakes can create realistic images or videos of trusted figures, such as executives or celebrities, making it harder for individuals to distinguish between real and fake requests.2
  3. AI-powered chatbots: Modern chatbots can engage with multiple targets simultaneously, initiating conversations that can lead to the disclosure of sensitive information or the clicking of malicious links.
  4. Voice cloning: Advanced voice cloning technologies allow for realistic voice phishing (i.e., vishing) attacks, tricking victims into believing they are speaking with a trusted individual.2

AI algorithms, fueled by machine learning, have turned social engineering and phishing into a highly personalized attack. These systems may create messages that imitate the tone, style and content of genuine communications by analyzing vast amounts of data. They can impersonate colleagues, superiors or trusted organizations with alarming accuracy, making it increasingly difficult to discern real from fake.

The Cost Of Convincing Lies

The stakes are high. Millions of dollars can be lost in a single successful phishing attack. In 2023, phishing attacks were one of the top vectors in cybercrime, resulting in an average breach cost of $4.76 million USD.3 The use of generative AI has made it easier for attackers to bypass the defenses of even the most cautious employees.

Defending Against AI-Powered Attacks

For growing organizations, the threat of AI-enhanced phishing scams is not just a nuisance—it’s a direct challenge to their operational integrity. These organizations often find themselves in a precarious position. They possess significant assets worth protecting, yet may lack the comprehensive security infrastructure of larger corporations. Organizations must invest in security awareness training, implement robust cybersecurity measures, and stay abreast of the latest AI developments to anticipate and counteract these threats.

Pull quote stating, "60% of participants from a research study fell victim to AI-automated phishing"

How Lumen Can Help

Our security capabilities are designed to provide comprehensive defense against the evolving landscape of cyberthreats, particularly those enhanced by AI, such as sophisticated phishing attacks. Lumen® Professional Security Services include expert advice and assistance to businesses in identifying vulnerabilities, formulating security strategies and deploying the necessary technologies to defend against advanced threats. Our certified in-house experts and engineers can provide a suite of services, including risk and compliance management, vulnerability management, and penetration testing to secure your critical applications and confidential data.

Discover how your organization can lead with security and find out how to cultivate an environment where predictability, reliability and innovation thrive.

Ready to help protect your business from cyberthreats?

LEARN MORE 

1MGM Resorts International, MGM Resorts Update on Recent Cybersecurity Issue, Oct. 5, 2023.
2Forbes, How AI Is Changing Social Engineering Forever, May 26, 2023.
3IBM, Cost of a Data Breach Report 2023, July 2023.
4Harvard Business Review, AI Will Increase the Quantity—and Quality—of Phishing Scams, May 30, 2024.

This content is provided for informational purposes only and may require additional research and substantiation by the end user. In addition, the information is provided “as is” without any warranty or condition of any kind, either express or implied. Use of this information is at the end user’s own risk. Lumen does not warrant that the information will meet the end user’s requirements or that the implementation or usage of this information will result in the desired outcome of the end user. All third-party company and product or service names referenced in this article are for identification purposes only and do not imply endorsement or affiliation with Lumen. This document represents Lumen products and offerings as of the date of issue.

 

Post Views: 15,395

Related posts:

  1. What is Managed Endpoint Detection and Response (MEDR)?
  2. Secure Your Future: The Benefits of Ethical AI Governance
  3. The SOC Journey
  4. What is API Protection?
0
Shares
  • Share On Facebook
  • Tweet It


Artificial Intelligence (AI)CyberthreatsVoice


Author

Mayuri Samala

Mayuri Samala is an intern in Solutions Marketing at Lumen, specializing in Cybersecurity. Mayuri is a senior at Virginia Commonwealth University pursuing her bachelor’s degree in marketing with a concentration in Product and Brand Management. Mayuri’s strong academic background and diverse marketing experiences enable her to bring a unique perspective to generating customer value through Lumen Security Solutions.

Trending Now
Beyond the Finish Line: How Churchill Downs Racetrack Harnesses Advanced Network Solutions for Seamless Kentucky Derby® Operations
Lumen Customer Stories Team April 23, 2025
Announcing the Lumen strategic partnership with Google Cloud: Transforming the future of cloud and network solutions
Lumen April 9, 2025
You may also like
Modernizing IT Operations with AIOPS: A Comprehensive Guide
May 5, 2025
Say Goodbye to Communication Barriers: How DIPS is Transforming the DOD
May 1, 2025
Donor Network West Relies on Critical Communications to Deliver Hope on Time
March 19, 2025
What are the key components of UC&C platforms?
Read Next

What are the key components of UC&C platforms?

  • Categories

    Adaptive Networking

    Connected Security

    Hybrid Cloud

    Communications and Collaboration

    Edge Computing

    SASE


  • Lumen is unleashing the world’s digital potential. We ignite business growth by connecting people, data, and applications – quickly, securely, and effortlessly. As the trusted network for AI, Lumen uses the scale of our network to help companies realize AI’s full potential. From metro connectivity to long-haul data transport to our edge cloud, security, managed service, and digital platform capabilities, we meet our customers’ needs today and as they build for tomorrow.

Services not available everywhere. ©2025 Lumen Technologies. All Rights Reserved.
Press enter/return to begin your search