The Rise Of AI-Powered Voice Cloning: How To Stop Deepfake Vishing Attacks

Expert Insights interviews Charles Henderson, EVP of Cybersecurity at Coalfire.

Last updated on Jun 5, 2025
Caitlin Harris
Written by Caitlin Harris
Expert Insights Interview with Charles Henderson of Coalfire

With the rise of genAI, vishing attacks are becoming more realistic and, as a result, more successful than ever before. But there are ways for organizations to protect their employees—and their data—against these attacks. 

The Big Picture: The second half of 2024 saw a huge surge in vishing (“voice phishing”) attacks, which rose by 442%. But vishing today doesn’t look like it did a few years ago; genAI-powered voice cloning and deepfakes are making these attacks more realistic—and, as a result, more difficult to identify—than ever before. Additionally, the use of AI is making it much easier for threat actors to carry out vishing attacks. This means AI-powered vishing is not only enabling these attacks to become more targeted, but it’s also enabling attackers to carry out more of them. 

Driving The Issue: Quite simply, deepfake vishing attacks are very difficult to identify, and threat actors are already using it in the wild. Charles Henderson, EVP of Cybersecurity at Coalfire, tells Expert Insights: 

  • “The impersonation capabilities of AI betray what we think of as possible. When you see someone’s face and hear their voice, you don’t have that skepticism. That means you’re far more likely to fall for these types of attacks.” 

Deepfake attacks are not only feasible, but very effective as well, Henderson says.  

  • “You’re already seeing cases where threat actors are using this in the wild. It’s not some sort of weird Hollywood plot. Early adopters in the threat actor space are demonstrating that it works. And now you’re starting to see the more established threat actors say, ‘Hey, if this works, let’s bring this attack vector up to the big leagues.’” 

What’s The Solution? There isn’t a single point solution that can solve the deepfake problem, says Henderson. Instead, organizations need to develop a defensive strategy that safeguards against human error. 

  • “Simulating these attacks safely is something that we do, but that’s not the be-all and end-all. It’s also important to set up processes and procedures such that, even if these attacks are successful, there’s something on the back end that safeguards your systems and processes, and you’re not relying on a lack of human error.” 
      
  • “Look at defensive strategies like threat hunting to see if something already occurred. It’s one thing to close the barn door; it’s another thing to close the barn door when the horse is already out. So, looking around the environment to find out whether there are indicators of compromise or evidence of data leakage.” 

The Bottom Line: “It’s really important that you start thinking about the fact that this can affect anyone in your company; regardless of how intelligent or amazing you feel an employee is, they can still make mistakes. You need to make sure that, if they make a mistake, it’s not catastrophic for the company.” 

Listen to our interview with Charles Henderson, EVP of Cybersecurity at Coalfire here. 


Expert Insights provides leading research, reviews, and interviews to help organizations make the right IT purchasing decisions with confidence. 

For more interviews with industry experts, visit our podcast page here

Written By Written By

Caitlin Harris is the Deputy Head of Content at Expert Insights. As an experienced content writer and editor, Caitlin helps cybersecurity leaders to cut through the noise in the cybersecurity space with expert analysis and insightful recommendations. Prior to Expert Insights, Caitlin worked at QA Ltd, where she produced award-winning technical training materials, and she has also produced journalistic content over the course of her career. Caitlin has 8 years of experience in the cybersecurity and technology space, helping technical teams, CISOs, and security professionals find clarity on complex, mission critical topics like security awareness training, backup and recovery, and endpoint protection. Caitlin also hosts the Expert Insights Podcast and co-writes the weekly newsletter, Decrypted.