{"id":113822,"date":"2025-05-19T08:00:11","date_gmt":"2025-05-19T08:00:11","guid":{"rendered":"https:\/\/www.europesays.com\/uk\/113822\/"},"modified":"2025-05-19T08:00:11","modified_gmt":"2025-05-19T08:00:11","slug":"fbi-warns-iphone-android-users-do-not-reply-to-these-messages-2","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/uk\/113822\/","title":{"rendered":"FBI Warns iPhone, Android Users\u2014Do Not Reply To These Messages"},"content":{"rendered":"<p class=\"color-body light-text\" role=\"button\">You have been warned \u2014 this nightmare is now real.<\/p>\n<p>NurPhoto via Getty Images<\/p>\n<p>Republished on May 18 with additional commentary, advice and resources on defending against these dangerous messages, where normal detection is impossible.<\/p>\n<p><a class=\"color-link\" href=\"https:\/\/www.forbes.com\/sites\/zakdoffman\/2025\/01\/03\/new-gmail-outlook-apple-mail-warning-2025-hacking-nightmare-is-coming-true\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/zakdoffman\/2025\/01\/03\/new-gmail-outlook-apple-mail-warning-2025-hacking-nightmare-is-coming-true\/\" target=\"_self\" aria-label=\"We were warned\" rel=\"noopener\">We were warned<\/a>. Forget looking for telltale signs, the latest set of AI-fueled attacks are so sophisticated you need to check everything to ensure you\u2019re not being attacked. In the last 24-hours, we have seen Gmail and Outlook users warned that malicious emails are now so \u201c<a class=\"color-link\" href=\"https:\/\/www.forbes.com\/sites\/zakdoffman\/2025\/05\/15\/alarming-gmail-outlook-attacks-do-not-use-your-password\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/zakdoffman\/2025\/05\/15\/alarming-gmail-outlook-attacks-do-not-use-your-password\/\" target=\"_self\" aria-label=\"perfect\" rel=\"noopener\">perfect<\/a>&#8221; that they\u2019re impossible to detect, and that calls which seem to come from people we know, could be a dangerous deception.<\/p>\n<p>That\u2019s the latest warning to come from the <a class=\"color-link\" href=\"https:\/\/www.ic3.gov\/PSA\/2025\/PSA250515\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/www.ic3.gov\/PSA\/2025\/PSA250515\" aria-label=\"FBI\">FBI<\/a>, after the discovery of \u201can ongoing malicious text and voice messaging campaign.\u201d This has used texts and voice messages purporting to come from \u201csenior U.S. officials,&#8221; tricking victims, many of who are also \u201ccurrent or former senior U.S. federal or state government officials and their contacts.\u201d<\/p>\n<p>The bureau\u2019s warning is serious enough that you are now being told: \u201cIf you receive a message claiming to be from a senior U.S. official, do not assume it is authentic.\u201d The goal of the attacks is to steal credentials through links that seem to be message related.<\/p>\n<p>According to Cofense\u2019s Max Gannon, \u201cit is important to note that threat actors can also spoof known phone numbers of trusted organizations or people, adding an extra layer of deception to the attack. Threat actors are increasingly turning to AI to execute phishing attacks, making these scams more convincing and nearly indistinguishable.&#8221;<\/p>\n<p><a class=\"embed-base color-body color-body-border link-embed embed-1\" href=\"https:\/\/www.forbes.com\/sites\/zakdoffman\/2025\/05\/17\/google-is-deleting-all-your-location-data-do-not-miss-deadline\/\" target=\"_blank\" aria-label=\"Google Is Deleting All Your Location Data\u2014Do Not Miss Deadline\" rel=\"noopener noreferrer\" data-ga-track=\"forbesEmbedly:https:\/\/www.forbes.com\/sites\/zakdoffman\/2025\/05\/17\/google-is-deleting-all-your-location-data-do-not-miss-deadline\/\">ForbesGoogle Is Deleting All Your Location Data\u2014Do Not Miss DeadlineBy Zak Doffman<\/a><\/p>\n<p>The FBI\u2019s advice is wider ranging than just this latest attack, and links back to its <a class=\"color-link\" href=\"https:\/\/www.ic3.gov\/PSA\/2024\/PSA241203\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/www.ic3.gov\/PSA\/2024\/PSA241203\" aria-label=\"recent warnings\">recent warnings<\/a> on the proliferation of AI attacks.<\/p>\n<ul>\n<li>Before answering calls or responding to messages, \u201cverify the identity of the person calling you or sending text or voice messages.\u201d<\/li>\n<li>Check email addresses, contact details and URLs for any telltale mistakes \u2014 albeit AI means such slips are rare and replicas can be near perfect.<\/li>\n<li>Obviously be wary of any \u201csubtle imperfections in images and videos, such as distorted hands or feet, unrealistic facial features, indistinct or irregular faces, unrealistic accessories such as glasses or jewelry, inaccurate shadows, watermarks, voice call lag time, voice matching, and unnatural movements.\u201d<\/li>\n<li>The same goes for voices. \u201cListen closely to the tone and word choice to distinguish between a legitimate phone call or voice message from a known contact and AI-generated voice cloning, as they can sound nearly identical.\u201d<\/li>\n<\/ul>\n<p>All that said, the FBI acknowledges that \u201cAI-generated content has advanced to the point that it is often difficult to identify.\u201d Sometimes it will just come down to common sense. Is this a call I could reasonably expect, and am I being asked to do something that would advantage a cybercriminal or scammer. Can I deduce what their take might be. How can I hang up and call back using normal channels. How do I verify the caller.<\/p>\n<p><a class=\"embed-base color-body color-body-border link-embed embed-2\" href=\"https:\/\/www.forbes.com\/sites\/zakdoffman\/2025\/05\/17\/apples-iphone-update-why-you-need-to-change-your-messaging-app\/\" target=\"_blank\" aria-label=\"Apple\u2019s iPhone Update\u2014Why You Need To Change Your Messaging App\" rel=\"noopener noreferrer\" data-ga-track=\"forbesEmbedly:https:\/\/www.forbes.com\/sites\/zakdoffman\/2025\/05\/17\/apples-iphone-update-why-you-need-to-change-your-messaging-app\/\">ForbesApple\u2019s iPhone Update\u2014Why You Need To Change Your Messaging AppBy Zak Doffman<\/a><\/p>\n<p>Ryan Sherstobitoff from SecurityScorecard told me \u201cto mitigate these risks, individuals must adopt a heightened sense of skepticism towards unsolicited communications, especially those requesting sensitive information or urging immediate action.\u201d<\/p>\n<p>Often these texts, calls and voice messages lead to a link. This is the attack, which will phish for credentials or trick you into installing malware. \u201cDo not click on any links in an email or text message until you independently confirm the sender\u2019s identity,&#8221; the bureau warns. And &#8220;never open an email attachment, click on links in messages, or download applications at the request of or from someone you have not verified.\u201d<\/p>\n<p>In the wake of the FBI\u2019s latest warning, ESET\u2019s Jake Moore told me \u201cit\u2019s vital people think with a clear head before responding to messages from unknown sources claiming to be someone they know. But with newer, impressive and evolving technology, it is understandable why people are quicker to let down their guard and assume that seeing is believing. Deepfake technology is now at an incredible level which can even produce flawless videos and audio clips cleverly designed to manipulate victims.\u201d<\/p>\n<p>BeyondTrust\u2019s CTO, Marc Maiffret, told me the latest FBI warning flags the risk that \u201cAI-driven impersonation attacks are rising, targeting both individuals and organizations.\u201d To combat these escalating threats, Maiffret says, \u201crequires human vigilance and strong identity security. Businesses should continue enforcing the principle of least privilege, identity infrastructure monitoring, and securing access to sensitive accounts, you limit what attackers can do\u2014even with stolen credentials.\u201d<\/p>\n<p><a class=\"embed-base color-body color-body-border link-embed embed-3\" href=\"https:\/\/www.forbes.com\/sites\/zakdoffman\/2025\/05\/16\/hacking-disaster-warning-delete-all-these-emails-on-your-pc\/\" target=\"_blank\" aria-label=\"Hacking Disaster Warning\u2014Delete All These Emails On Your PC\" rel=\"noopener noreferrer\" data-ga-track=\"forbesEmbedly:https:\/\/www.forbes.com\/sites\/zakdoffman\/2025\/05\/16\/hacking-disaster-warning-delete-all-these-emails-on-your-pc\/\">ForbesHacking Disaster Warning\u2014Delete All These Emails On Your PCBy Zak Doffman<\/a><\/p>\n<p>Darktrace SVP Nicole Carignan told me \u201cthe fact that attackers are using generative AI to produce deepfake audio, imagery, text messages, and video is a growing concern, as attackers are increasingly using deepfakes to start sophisticated social engineering attacks.\u201d While the FBI has generated headlines given the nature of the deepfakes and the targets, the greater risk \u2014 as also flagged by the bureau \u2014 is financial crime.<\/p>\n<p>A new and perfectly timed report from <a class=\"color-link\" href=\"https:\/\/www.helpnetsecurity.com\/2025\/05\/16\/camellia-chan-x-phy-defending-against-deepfakes\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/www.helpnetsecurity.com\/2025\/05\/16\/camellia-chan-x-phy-defending-against-deepfakes\/\" aria-label=\"Help Net Security\">Help Net Security<\/a> warns \u201cdon\u2019t assume anything is real just because it looks or sounds convincing\u2026 Remember the saying, seeing is believing? We can\u2019t even say that anymore. As long as people rely on what they see and hear as evidence, these attacks will be both effective and difficult to detect.&#8221;<\/p>\n<p>With equally apt timing, <a class=\"color-link\" href=\"https:\/\/www.realitydefender.com\/insights\/who-owns-ai-fraud-how-to-build-a-deepfake-response-framework\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/www.realitydefender.com\/insights\/who-owns-ai-fraud-how-to-build-a-deepfake-response-framework\" aria-label=\"Reality Defender\">Reality Defender<\/a> had put out a new deepfake guide just 72 hours before the FBI issued its warning. \u201cDeepfake threats targeting communications don\u2019t behave like traditional cyberattacks\u2026 Instead, they exploit trust. A cloned voice can pass legacy voice biometric systems. A fake video call can impersonate a company executive with enough accuracy to trigger a wire transfer or password reset.\u201d<\/p>\n<p>Deepwatch CISO Chad Cragle has provided some useful pointers to help smartphone users stay safe, given &#8220;AI-powered impersonation attempts, whether via email, phone calls, text, or even deepfake video, are now harder than ever to distinguish from legitimate communication:<\/p>\n<ul>\n<li>Validate unexpected requests \u2013 If you receive an urgent tax-related message, verify it through a trusted, separate channel before taking action.<\/li>\n<li>Look for inconsistencies \u2013 AI-generated content may include unnatural phrasing, overly generic greetings, or delayed responses in real-time conversations.<\/li>\n<li>Call official numbers directly \u2013 If someone claims to be from the IRS or your tax preparer\u2019s office, hang up and call back using the official number from their website.&#8221;<\/li>\n<\/ul>\n<p>Moore\u2019s advice is more straightforward: \u201cTo protect yourself from smishing scams and deepfake content avoid clicking on links in unexpected or suspicious text messages \u2014 especially those that create a sense of urgency, even when it looks or sounds like the real deal. Never share personal or financial information via text messages and always verify via trusted communication channels.\u201d<\/p>\n<p><a class=\"embed-base color-body color-body-border link-embed embed-4\" href=\"https:\/\/www.forbes.com\/sites\/zakdoffman\/2025\/05\/16\/google-warns-android-phone-thieves-we-will-shut-you-down\/\" target=\"_blank\" aria-label=\"Google Warns Android Phone Thieves\u2014We Will Shut You Down\" rel=\"noopener noreferrer\" data-ga-track=\"forbesEmbedly:https:\/\/www.forbes.com\/sites\/zakdoffman\/2025\/05\/16\/google-warns-android-phone-thieves-we-will-shut-you-down\/\">ForbesGoogle Warns Android Phone Thieves\u2014We Will Shut You DownBy Zak Doffman<\/a><\/p>\n<p>Cybercriminals are now exploiting generative AI and deepfake technology \u201cat an unprecedented scale to execute highly convincing impersonation scams,\u201d Cragle warns. \u201cFrom low-level attackers to sophisticated nation-state actors, adversaries are leveraging AI-generated voice cloning to manipulate victims over the phone and via text messages. AI-enhanced phishing emails are now so advanced that they mimic corporate language, making it difficult to rely on traditional red flags like poor grammar or generic formatting.\u201d Which is exactly why the FBI has issued this stark a warning.<\/p>\n<p>Six months ago, the FBI advised that \u201cCriminals can use AI-generated audio to impersonate well-known, public figures or personal relations to elicit payments. Criminals generate short audio clips containing a loved one\u2019s voice to impersonate a close relative in a crisis situation, asking for immediate financial assistance or demanding a ransom. Criminals obtain access to bank accounts using AI-generated audio clips of individuals and impersonating them.\u201d Exactly that we now see here.<\/p>\n<p>As Maiffret says, \u201cAI-based social engineering attacks highlight why identity is one of the most important domains for businesses to secure. Deepfakes, like these, are a great example of the need to treat identity as the new perimeter.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"You have been warned \u2014 this nightmare is now real. NurPhoto via Getty Images Republished on May 18&hellip;\n","protected":false},"author":2,"featured_media":110847,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3159],"tags":[50320,35057,50319,50317,50318,50316,24779,35058,547,53,16,15],"class_list":{"0":"post-113822","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-mobile","8":"tag-ai-attack","9":"tag-android-attack","10":"tag-fbi-android-warning","11":"tag-fbi-delete-texts","12":"tag-fbi-iphone-warning","13":"tag-fbi-stop-texting","14":"tag-gmail-attack","15":"tag-iphone-attack","16":"tag-mobile","17":"tag-technology","18":"tag-uk","19":"tag-united-kingdom"},"share_on_mastodon":{"url":"https:\/\/pubeurope.com\/@uk\/114533447922726243","error":""},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts\/113822","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/comments?post=113822"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts\/113822\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/media\/110847"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/media?parent=113822"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/categories?post=113822"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/tags?post=113822"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}