News

In an AI World, Every Attack is a Social Engineering Attack

  • Dr. Charles Herder--securityboulevard.com
  • published date: 2025-11-05 00:00:00 UTC

None

<p><span data-contrast="none">An on-call IT worker receives an urgent call from the CEO requesting an MFA reset. The IT worker grants access – only to find out later that the voice they heard was not the CEO. The fraudulent access was used to initiate a ransomware attack and tens of millions of dollars in damages.</span><span data-ccp-props='{"201341983":0,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">An open-source contribution from a developer with three years of productive and helpful contributions includes an innocuous configuration script missed by other maintainers. The script installs a DLL that grants remote code access to developer machines and infects thousands of machines before discovery.</span><span data-ccp-props='{"201341983":0,"335559739":0,"335559740":240}'> </span></p><div class="code-block code-block-13" style="margin: 8px 0; clear: both;"> <style> .ai-rotate {position: relative;} .ai-rotate-hidden {visibility: hidden;} .ai-rotate-hidden-2 {position: absolute; top: 0; left: 0; width: 100%; height: 100%;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback, .ai-list-block, .ai-list-block-ip, .ai-list-block-filter {visibility: hidden; position: absolute; width: 50%; height: 1px; top: -1000px; z-index: -9999; margin: 0px!important;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback {min-width: 1px;} </style> <div class="ai-rotate ai-unprocessed ai-timed-rotation ai-13-1" data-info="WyIxMy0xIiwxXQ==" style="position: relative;"> <div class="ai-rotate-option" style="visibility: hidden;" data-index="1" data-name="U2hvcnQ=" data-time="MTA="> <div class="custom-ad"> <div style="margin: auto; text-align: center;"><a href="https://www.techstrongevents.com/cruisecon-virtual-west-2025/home?ref=in-article-ad-2&amp;utm_source=sb&amp;utm_medium=referral&amp;utm_campaign=in-article-ad-2" target="_blank"><img src="https://securityboulevard.com/wp-content/uploads/2025/10/Banner-770x330-social-1.png" alt="Cruise Con 2025"></a></div> <div class="clear-custom-ad"></div> </div></div> </div> </div><p><span data-contrast="none">Today, these scenarios require dedicated and organized attackers who methodically pick and research targets, exploiting public information to credibly impersonate or prioritize potential victims. These types of focused attacks are far more effective than older, “spray and pray” phishing schemes, but are expensive in terms of personnel and time. High-cost, high-reward, non-scalable.</span><span data-ccp-props='{"201341983":0,"335559739":0,"335559740":240}'> </span></p><h3><b><span data-contrast="none">AI is About to Change This</span></b><span data-ccp-props='{"201341983":0,"335559739":0,"335559740":240}'> </span></h3><p><span data-contrast="none">With the emergence of large language models (LLMs) and Generative AI, tasks that previously required significant investments in human capital and training are about to become completely automatable and turnkey. The same script kiddies who helped scale botnets, DDoS (distributed denial of service), and phishing attacks are about to gain access to social engineering as a service.</span><span data-ccp-props='{"201341983":0,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">Rather than a profit-motivated or state-sponsored hacking group picking one or two targets at a time, in a world of cheaply scalable, multi-channel attacks, this style of attack is going to radically expand. Instead of a single IT worker or executive assistant, attackers will now target all of them. Sophisticated attacks that become cheap will move “down-market,” to target multiple small and medium-sized businesses. For state actors pursuing strategic aims, why carefully infect one open-source project when bot contributors with synthetic identities can try to build trust in hundreds of thousands of them?</span><span data-ccp-props='{"201341983":0,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">When every phishing attack at scale is targeted and multichannel, every human interaction that isn’t face-to-face becomes a threat surface. When the cost gets cheap enough, the attack surface broadens horizontally and vertically, exposing far more companies, institutions, and individuals to attacks. We are already starting to see the beginnings of this trend, with attackers using AI to automate the identification of vulnerable companies and individuals.</span></p><p><span data-contrast="none">Neither our institutions nor personal relationships are prepared for this.  The inherent trust of human-to-human interaction over voice calls, text messages, video conferences, social media, etc., is so ingrained into our business processes today that it will take years if not decades for our institutions to meaningfully respond to such a threat. </span><span data-ccp-props='{"201341983":0,"335559739":0,"335559740":240}'> </span></p><h3><b><span data-contrast="none">As Terrifying as This Sounds, It is, In Fact, Significantly Worse </span></b><span data-ccp-props='{"201341983":0,"335559739":0,"335559740":240}'> </span></h3><p><span data-contrast="none">The same AI that is being used today to generate fraudulent content and influence discussions on the internet is also capable of generating synthetic accounts that are increasingly indistinguishable from real, human accounts.  It is now becoming economical to completely automate the process of operating millions of accounts for years to emulate human behavior and build trust.</span><span data-ccp-props='{"201341983":0,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">Therefore, in a few years, looking at an account’s activity will no longer be a valid signal of whether that account is human or machine. Even if we stop naively trusting voice or video calls, the follow-up methods for filtering out bots or false identities we rely on today will also fail us. </span><span data-ccp-props='{"201341983":0,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">This is a far more immediate and substantial threat than quantum computing. AI botnets capable of credible social engineering attacks at scale are a certainty within months or years. Quantum-resistant encryption is meaningless if people and organizations can’t distinguish staff or customers from AI attackers. </span><span data-ccp-props='{"201341983":0,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">For identity security and social engineering, LLMs and Generative AI have effectively passed the Turing test. Therefore, any security paradigm relying on user behavior to distinguish humans from bots will fail. AIs are too good at credibly imitating and replaying human interactions online. The only answer is to provide people with a stronger form of identity, specifically a cryptographic solution without stored secrets.</span><span data-ccp-props='{"201341983":0,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">Avoiding <a href="https://securityboulevard.com/2025/10/reclaiming-control-over-secrets-correlating-credentials-to-nhis-for-safe-and-automated-remediation/" target="_blank" rel="noopener">stored secrets</a> – eliminating the complexity and replay threats inherent to key management – is the only path forward to truly enable identity to enable authentication of you and not a proxy of you. Stored secrets will inevitably be compromised, so we must instead pick identity systems where the assertions of identity cannot be stolen or replayed.</span><span data-ccp-props='{"201341983":0,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">AI is forcing our hand. Unless and until we can empower humans to securely possess their own cryptographic keys, we face a world where AI advantages the attackers far more than the rest of us.</span><span data-ccp-props='{"201341983":0,"335559739":0,"335559740":240}'> </span></p><hr><p>This article was co-written by <a href="https://securityboulevard.com/author/cory-ondrejka/" target="_blank" rel="noopener">Cory Ondrejka</a>, Creator of Second Life and a consumer tech executive who has held senior technical roles at the world’s largest companies.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2025/11/in-an-ai-world-every-attack-is-a-social-engineering-attack/" data-a2a-title="In an AI World, Every Attack is a Social Engineering Attack    "><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F11%2Fin-an-ai-world-every-attack-is-a-social-engineering-attack%2F&amp;linkname=In%20an%20AI%20World%2C%20Every%20Attack%20is%20a%20Social%20Engineering%20Attack%C2%A0%C2%A0%C2%A0%C2%A0" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F11%2Fin-an-ai-world-every-attack-is-a-social-engineering-attack%2F&amp;linkname=In%20an%20AI%20World%2C%20Every%20Attack%20is%20a%20Social%20Engineering%20Attack%C2%A0%C2%A0%C2%A0%C2%A0" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F11%2Fin-an-ai-world-every-attack-is-a-social-engineering-attack%2F&amp;linkname=In%20an%20AI%20World%2C%20Every%20Attack%20is%20a%20Social%20Engineering%20Attack%C2%A0%C2%A0%C2%A0%C2%A0" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F11%2Fin-an-ai-world-every-attack-is-a-social-engineering-attack%2F&amp;linkname=In%20an%20AI%20World%2C%20Every%20Attack%20is%20a%20Social%20Engineering%20Attack%C2%A0%C2%A0%C2%A0%C2%A0" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F11%2Fin-an-ai-world-every-attack-is-a-social-engineering-attack%2F&amp;linkname=In%20an%20AI%20World%2C%20Every%20Attack%20is%20a%20Social%20Engineering%20Attack%C2%A0%C2%A0%C2%A0%C2%A0" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div>