Netitude Blog | News & Insights

How AI Voice Scams Are Targeting UK Businesses in 2026

Written by Daniel Strain | 27-Mar-2026 16:03:15

By now, most people have heard of phishing: the classic email-based scam. But fewer are familiar with vishing, or voice phishing — an increasingly common and highly sophisticated attack method targeting UK businesses in 2026.

In the past week alone, we’ve seen a new type of cyber attack emerge on our service desk — one that doesn’t rely on links, malware, or even immediate access to systems.

It starts with a simple phone call.

What’s changing, however, is how these attacks are being carried out.

Attackers are now using AI-driven techniques to capture and replicate employee voices — a tactic often referred to as AI voice scraping.

 What is Vishing and How Does It Work?

Traditional phishing attacks target your inbox. Vishing targets the person.

Attackers use phone calls to:

  • Build trust
  • Create urgency
  • Impersonate known organisations (banks, suppliers, IT providers)

Historically, these attacks relied solely on social engineering.

Now, Artificial Intelligence (AI) is changing the game.

Cybercriminals are increasingly using AI tools to:

  • Generate human-like voices
  • Hold realistic, real-time conversations
  • Clone and imitate real employees
  • Capture speech patterns for future impersonation

This means a single phone call today could enable a far more convincing attack tomorrow.

AI Voice Scraping in Action

In the past week alone, our service desk has reported multiple suspicious calls that appear to follow a similar pattern.

In each case, the caller:

  • Asked employees to repeat phone numbers multiple times
  • Requested the spelling of internal staff names
  • Avoided giving clear answers when questioned
  • Prolonged conversations without a clear outcome

Individually, these requests seemed harmless.

But taken together, they strongly suggest an attempt to capture voice samples for AI training purposes.

This is what we now refer to as AI voice scraping — the process by which attackers gather small snippets of speech that can later be used to clone a person’s voice.

 

A First-Hand Account of Vishing

 
This kind of attack isn’t theoretical for us – it’s already happening on our service desk.
 
Recently, one of our First Line Engineers took a call from someone asking to speak directly with one of our directors. As with any new or unknown contact, they followed our normal process and redirected the caller to our general enquiries email address. However, the caller became increasingly pushy.
 
They insisted that our engineer repeat the company name and the email subject line back to them, to “make sure the message would reach [Director’s name] correctly”. After that, they asked for the engineer’s name and had them spell it out before confirming our main phone number.
 
 
 

Now, let's hear from one of our First Line Engineers as they reveal how they were targeted in a recent encounter:

 

 
“They were very insistent about me repeating things back – the company name, the email subject, even my own name. I even considered giving them a fake name because of how pushy they were, but my honesty got the better of me.”

 

At the time, it felt like a slightly pushy sales call – something service desks deal with regularly.
“It was frustrating. They weren’t a customer, but if it was legitimate, it could have been a potential client, and first impressions are critical. I didn’t want to be rude or risk losing business.”
It was only later, when similar calls started targeting colleagues, that the pattern became clear.
“I didn’t think it was anything more than a hard‑sell call at first. It wasn’t until my colleagues mentioned the same kind of pushy behaviour that we realised this could be voice scraping. Then the internal warning went out, and I had to put my hand up and say, ‘I’ve already had that call.’”
Once the engineer recognised what had happened, they did exactly the right thing: they flagged it to their manager and shared details so the wider team could be warned.
“After the call, I messaged my manager because I suspected I’d be name-dropped in whatever email they sent. When we realised they’d tried my colleagues too, it opened up a wider discussion – and I was honest that I’d already spoken to them and fallen for it.”
The emotional impact is an important part of this story, too.
“Afterwards, when they started targeting my colleagues, I felt shaken and honestly quite awful – like I’d opened our company and our clients up to attacks. That’s exactly what these scammers exploit: people trying to be helpful.”
From the experience, they’ve taken away some clear lessons:
“Unfortunately, being too nice can mean being taken advantage of – that’s what the scammers rely on: the kindness and ignorance of others. Going forward, I’m going to be much less patient with rudeness or hostility on the phone. If something feels off, I’m going to challenge it or just hang up.”
This incident underlines a crucial point: good customer service should never come at the expense of security. Your team need to know that it’s OK to say no, to slow things down, and to end a call if it doesn’t feel right.

Why AI Voice Scams Are More Dangerous Than Traditional Vishing Methods

Unlike traditional vishing attacks, AI-driven scams don’t always aim for immediate results.

Instead, they often happen in two stages:

1. Voice data collection: Attackers gather recordings of employees speaking naturally.

2. Voice cloning & impersonation: Those recordings are then used to:

  • Impersonate staff in calls to customers
  • Bypass identity verification checks
  • Request password resets or access changes
  • Initiate fraudulent financial activity

Because the voice sounds real, these attacks are significantly harder to detect — especially for external contacts or customers.

What Attackers Want From You

During a vishing attack, you may be asked to:

  • Repeat phone numbers
  • Spell out employee names
  • Confirm internal structures
  • Read out MFA or verification codes
  • Share customer or technical information

While these requests may seem low-risk, they can contribute to a much larger attack.

How to Prevent Vishing Attacks in Your Business

As vishing attacks become more sophisticated, businesses need to adapt their security approach.

1. Train Your People

  • Be cautious of unsolicited calls
  • Avoid repeating sensitive information
  • Challenge unknown or vague requests
  • Report suspicious behaviour immediately

2. Strengthen Your Processes

  • Introduce call verification procedures
  • Avoid processing sensitive requests via inbound calls
  • Require secondary verification for critical actions

3. Use the Right Technology

  • Enforce multi-factor authentication (MFA)
  • Monitor and log suspicious call activity
  • Invest in regular security awareness training

Why Businesses Need to Act Now

Vishing is no longer just a social engineering tactic — it’s becoming an AI-powered threat that's finding new, cleverer, and cruder ways to infiltrate personal information and business-critical data. 

As a society, we have to do more to combat the seemingly endless wave of threats that are emerging year on year. The rise of AI voice scraping means that even seemingly harmless phone interactions can have serious consequences down the line.

Businesses that recognise and respond to this shift early will be far better positioned to protect their people, their customers, and their data. If you'd like to take the time to discuss vishing, AI voice scraping, or any other cybersecurity threat that's playing on your mind, please do give us a call.