It started long before any email was sent

Publicerat March 20, 2026

email-security external attack surface email spoofing protection SPF DKIM DMARC phishing and impersonation attacks cyber attack prevention external exposure monitoring Phone number spoofing Vishing business cybersecurity strategy AI voice training continuous security monitoring reduce cyber risk

what-hackers-look-for

A CEO approves a routine financial transfer after receiving an email and a follow-up call from the CFO.

  • The email looks legitimate.
  • The phone number matches.
  • The voice sounds exactly right.

The request is urgent—but not unusual.

Minutes later, €240,000 is gone.

No systems were hacked. No malware was involved. Nothing was “broken.”

Instead, the attacker exploited something far more powerful: trust.

By combining email spoofing, phone number spoofing, and AI-generated voice cloning, they created a perfectly believable scenario—one that bypassed both technology and human intuition.

This type of attack is no longer theoretical. And while you can’t fully control voice cloning or phone spoofing, you can control one critical piece:

Whether your domain can be used against you.


What Really Happened Under the Surface

It started long before the email was sent.

From the outside, the company looked like any other. No obvious vulnerabilities. No signs of compromise. But to someone scanning for opportunities, a different picture emerged.

The attacker began with the domain.

A quick check of the company’s email security revealed small but significant gaps. SPF was configured, but permissive. DMARC existed, but only in monitoring mode. DKIM was missing entirely. Individually, these might seem like minor oversights. Together, they meant one thing:

Emails could be sent that appeared to come from the company—without being reliably stopped.

That was enough to move forward.


Next came reconnaissance.

The attacker mapped the organization using publicly available information. Names, roles, reporting lines—everything needed to understand how communication typically flowed inside the company.

The CFO stood out. Visible. Credible. Frequently appearing in webinars, interviews, and short video clips online.

More than enough material.


Using that content, the attacker generated a voice model.

Today’s tools don’t require hours of audio. A few clean samples are enough to create something that captures tone, pacing, and key vocal traits. It doesn’t need to be perfect—it just needs to sound real in context.

And in the right moment, it does.


The email itself was straightforward.

Once the domain could be spoofed, the technical challenge disappeared. What remained was writing something believable. A short message. Slight urgency. Familiar tone.

The kind of request that fits into a normal workday.


The phone call completed the illusion.

Caller ID matched the CFO’s number. The voice matched expectations. The timing aligned perfectly with the email. Each element reinforced the others, leaving no clear reason to question what was happening.

By the time the request was approved, there had been no single point of failure—only a seamless sequence of trust signals.


This is why these attacks are so effective.

They don’t rely on exploiting software vulnerabilities. They rely on replicating the patterns people trust: identity, familiarity, and routine.

And they only need one thing to get started:

A domain that can be impersonated.


While companies cannot fully prevent voice cloning or phone spoofing, they are not powerless.

Securing the email infrastructure—properly enforcing SPF, DKIM, and DMARC—removes one of the attacker’s most effective tools. It introduces friction. It creates doubt. And often, that’s enough to stop the attack before it begins.

Combined with clear internal processes—especially around financial approvals and identity verification—this turns a seamless attack into a failed attempt.


The reality is simple.

From the inside, everything in this company looked normal.

From the outside, it looked exposed.

And that difference is exactly where attackers operate.


If you can’t see what attackers see, you can’t stop what they do next.


← Tillbaka till bloggen

Är din attackyta exponerad?

ExposureIndex övervakar kontinuerligt din externa attackyta — domäner, e-postsäkerhet, öppna portar och mer. Starta din kostnadsfria pilot idag.

Starta kostnadsfri pilot