AI-Driven Phishing Scam Uses Deepfake Robocalls to Target Gmail Users in Credential Theft Campaign

February 17, 2025

A highly sophisticated, AI-enhanced phishing campaign is reportedly targeting between 1.8 to 2.5 billion Gmail users through deepfake robocalls and fraudulent emails. The scammers impersonate Google security personnel, alleging suspicious account activity and directing victims to fake login pages in an attempt to steal credentials.

The stolen data has been used for identity theft, banking fraud, and session hijacking, underscoring the need for vigilance in the era of increasing AI-driven threats. The FBI emphasizes the importance of safe and secure AI practices, particularly as AI technology raises the scale and effectiveness of such attacks.

For those interested in shaping responsible AI governance, join us at HISPI Project Cerebellum to map, measure, manage, and ultimately govern such incidents through our TAIM framework.

JOIN US

Matched TAIM controls

Suggested mapping from embedding similarity (not a formal assessment). Browse all TAIM controls

Alleged deployer
unknown-scammers, unknown-cybercriminals, scammers-impersonating-google-employees
Alleged developer
unknown-ai-tool-providers, unknown-deepfake-technology-developers
Alleged harmed parties
google-users, gmail-users

Source

Data from the AI Incident Database (AIID). Cite this incident: https://incidentdatabase.ai/cite/941

Data source

Incident data is from the AI Incident Database (AIID).

When citing the database as a whole, please use:

McGregor, S. (2021) Preventing Repeated Real World AI Failures by Cataloging Incidents: The AI Incident Database. In Proceedings of the Thirty-Third Annual Conference on Innovative Applications of Artificial Intelligence (IAAI-21). Virtual Conference.

Pre-print on arXiv · Database snapshots & citation guide

We use weekly snapshots of the AIID for stable reference. For the official suggested citation of a specific incident, use the “Cite this incident” link on each incident page.