BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
Cyera Acquires Data Loss Prevention Firm Trail Security for $162 Million
/in General NewsData security company Cyera has acquired stealth mode startup Trail Security for its data loss prevention (DLP) technology.
The post Cyera Acquires Data Loss Prevention Firm Trail Security for $162 Million appeared first on SecurityWeek.
SecurityWeek – Read More
Voice Cloning with Deep Learning Models
/in General NewsGiven the explosion of development and interest in deep learning models in the past year, we decided to research on the topic to increase our know-how and find applications where these technologies can be leveraged in offensive security engagements.
One of the golden rules of machine learning is to apply it to stable data distributions. Amongst the different data modalities, such as text, audio and images, audio applied for voice cloning is one of the most concerning.
Human voice has a stable distribution, at least for the majority of a person’s adulthood. Once cloned, unlike credentials, it cannot be changed. Voice cloning is therefore a perfect candidate to apply machine learning for phishing or social engineering purposes.
Despite voice cloning not being a new topic we nevertheless wanted to cover the gap between hearing existing deep fakes and creating them on our own, determining which level of effort is required and which results can be obtained.
Methodology
Voice cloning essentially requires three steps: gathering audio recordings of the target, processing them and finally providing the data in input to a deep learning model.
Gathering data is quite straightforward: it consists of finding audio clips from interviews and podcasts, with the only challenge of finding good audio quality with no background noise, music or reverb.
The audio clips then need to be pre-processed to be fit for the model.
The model can be an open source one which can be executed locally, provided that the minimum hardware requirements are met, or an online service.
We did use existing models as black-box as we believe it is a far assumptions that, except for Nation state adversaries, criminals will also use off-the-shelf products.
Choosing the Model
Under the assumption that voice cloning providers should require some form of voice verification, to ensure that users are cloning their own voice, and not somebody’s else, we chose to run an open-source model locally, namely tortoise-tts, where no restrictions are applied. Given the stunning text to speech capabilities of tortoise-tts with pre-packaged voices, we deemed it as a solid model to experiment with custom voices.
Trivia: tortoise-tts is named after a tortoise for being slow. The fact that it implements a transformer architecture provided inspiration for the cover art.
Data Processing
Data processing has some dependencies on the chosen model, while other steps are generally applicable.
In order to perform text to speech with a custom voice, tortoise-tts requires the following:
Gather audio clips of your speaker(s). Good sources are YouTube interviews (you can use youtube-dl to fetch the audio), audiobooks or podcasts. Guidelines for good clips are in the next section.
Cut your clips into ~10 second segments. You want at least 3 clips. More is better, but I only experimented with up to 5 in my testing.
Save the clips as a WAV file with floating point format and a 22,050 sample rate.
Create a subdirectory in voices/
Put your clips in that subdirectory.
Run tortoise utilities with –voice=<your_subdirectory_name>
The first step consists of cutting clips into ~10 second segments. It should be obvious that a clip cannot be cut in a for loop every 10 seconds, instead it should be cut when there is silence. In addition, this operation must be scriptable (i.e. no manual work in an editing tool like Audacity).
There exists a tool that handles the job: sox. It is sufficient to experiment with the different thresholds until the clip is correctly cut corresponding to the moments of silence.
One of the three thresholds we experimented with:
sox input.wav output.wav silence -l 1 0.1 1% -1 2.0 1% : newfile : restart
At this stage, the audio is split without truncation during speaking. However, there is another issue: people do not pause every 10 seconds, as a matter of fact the chunks have different lengths:
Created chunk001.wav with duration 3.310476
Created chunk002.wav with duration 0.627438
Created chunk003.wav with duration 5.030567
Created chunk004.wav with duration 2.359819
Created chunk005.wav with duration 4.707120
Created chunk006.wav with duration 2.240544
Created chunk007.wav with duration 1.187574
Created chunk008.wav with duration 1.568345
Created chunk009.wav with duration 3.405034
Created chunk010.wav with duration 2.573333
Created chunk011.wav with duration 4.042993
Created chunk012.wav with duration 1.219184
Created chunk013.wav with duration 2.434875
This can be solved with FFMPEG and some scripting around it to merge small chunks into bigger chunks that are around 10 seconds long.
Are we now ready to feed the data to the model? Not quite.
Good audio sources are interviews, and of course an interviewer is present, polluting the input data, and must be removed from the audio.
This problem is less trivial and must be automated. Luckily there exists a technique called “speaker diarisation” which, given an audio, identifies the number of speakers and marks in seconds the start-end segments for each speaker.
We identified an open-source project which worked particularly well for this purpose: pyannote. With some scripting around pyannote’s output we could automatically identify the segments during which the target is speaking, crop them and merge them into a clean audio with the target only.
If the reader were to reproduce our steps we have two recommendations: first a GPU is required as pyannote is yet another deep learning model. Secondly, a quite hidden github issue solved a huge blocker: the GPU was no longer being used with long audios in input, and the solution was to load audios not from the disk but directly from memory.
Voice Cloning with models
The pre-processed data can now be fed to tortoise-tts with the –voice switch. Despite having used good samples in terms of audio quality and length, the results were poor.
Only one attempt yielded an acceptable result, namely this audio track for Edward Snowden.
Using the model as a black box we could not determine if and how the results could be improved.
Therefore, we went back to online providers trying out one and, with great surprise, realized that the identity validation was required only for the high tier offering, while only a self-validation checkbox was required for the low tier one which nevertheless performed very well.
Now good results were consistent. Here is one example where we cloned the voice of our colleague Sylvain Heiniger, using as input an audio clip from his talk at BlackAlps.
Given the samples above, one may argue that they are not real time voice clones. Indeed, they are not. In addition, these clones can not be modulated in terms of intonation (e.g. assertion vs question), emotion or emphasis.
Therefore we deemed necessary to move away from TTS (text-to-speech) models, in favor of speech-to-speech model, where the model preserves intonation, emotion, emphasis and “just” alters the timbre of the person.
After some further experimentation, we identified an open source model which performed very well, namely so-vits-svc-fork.
As proof of concept, we cloned the voice of our colleague Ivano Somaini, describing the next course on OSINT.
Attacks and Defenses
Despite the limitations of non-real-time voice clones, we believe that the results above, coupled with the right excuse, can be very effective.
For instance, an audio clip could be sent via any instant messaging apps where the victim claims they lost their phone and they are now writing from a new number.
It is natural to ask how can one defend from such powerful technology?
For enterprises a process must be in place to ensure that even a CEO cannot demand a payment just on the authority of their role, but instead some additional form of authentication via a different channel is required. If such process is implemented, all employees should feel comfortable in not executing actions without such authentication completed.
For individuals instead, the most effective advice would be to call back. As soon as a request may be suspicious, calling back the person from the trusted number stored in the contacts is a safe option.
Compass Security Blog – Read More
Microsoft Reveals macOS Vulnerability that Bypasses Privacy Controls in Safari Browser
/in General NewsMicrosoft has disclosed details about a now-patched security flaw in Apple’s Transparency, Consent, and Control (TCC) framework in macOS that has likely come under exploitation to get around a user’s privacy preferences and access data.
The shortcoming, codenamed HM Surf by the tech giant, is tracked as CVE-2024-44133. It was addressed by Apple as part of macOS Sequoia 15 by removing the
The Hacker News – Read More
Singapore releases guidelines for securing AI systems and prohibiting deepfakes in elections
/in General NewsThe security guidelines cover five stages of the AI lifecycle to help mitigate varying risks of AI implementation.
Latest stories for ZDNET in Security – Read More
Microsoft: Ransomware Attacks Growing More Dangerous, Complex
/in General NewsAttackers launched 600 million cybercriminal and nation-state threats on Microsoft customers daily, including ransomware attacks, in the last year, according to the tech giant.
Security | TechRepublic – Read More
Ex-Oracle, Google Engineers Raise $7m From Accel for Public Launch of Simplismart to Empower AI Adoption
/in General NewsPost Content
darkreading – Read More
Illinois Joins CoSN’s Trusted Learning Environment (TLE) State Partnership Program for Student Data Privacy
/in General NewsPost Content
darkreading – Read More
Fake North Korean IT Workers Infiltrate Western Firms, Demand Ransom
/in General NewsNorth Korean hackers are infiltrating Western companies using fraudulent IT workers to steal sensitive data and extort ransom.…
Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – Read More
Hong Kong Crime Ring Swindles Victims Out of $46M
/in General NewsThe scammers used real-time deepfakes in online dating video calls to convince the victims of their legitimacy.
darkreading – Read More
Be Aware of These Eight Underrated Phishing Techniques
/in General NewsThere are a number of lesser-known phishing techniques that are often overlooked or underestimated yet increasingly being employed by attackers.
The post Be Aware of These Eight Underrated Phishing Techniques appeared first on SecurityWeek.
SecurityWeek – Read More