Was this helpful?
Thumbs UP Thumbs Down

AI deepfake of Marco Rubio targets foreign officials in bold scam

Man uses a laptop with AI assistant to graphic design, translate language, chat bot, generate images, write code, and advertising.
Marco Rubio campaigns for president

Fake Rubio voice fools top officials

A strange voice pretending to be Marco Rubio reached out to government leaders using AI. It sounded real enough to get their attention. Some of the people contacted were surprised by how natural and convincing the messages felt.

The person behind it knew how to mimic Rubio’s tone perfectly. They used voicemails and texts to make the trick believable. This shows how easily advanced technology can fool even experienced officials when it’s used in the wrong hands for manipulation.

Voice recognition concept

A mystery voice targets foreign leaders

The fake Rubio didn’t just stop with one message. At least three foreign ministers, a U.S. governor, and a member of Congress received voice or text communications from this impostor in mid-June using a secure chat app.

These messages weren’t spam or random. Each one was crafted to sound like a real request from the Secretary of State. By reaching out on a trusted app, the sender added an extra layer of realism that made it even harder to detect.

Girl typing message on Whatsapp

Messages came from a fake government ID

To make things more believable, the imposter created a fake Signal account using the name [email protected]. Even though that address wasn’t real, it looked official enough to pass at first glance. That’s what helped fool the recipients.

This kind of trick relies on people being too busy or trusting. When someone sees a government-style name, they may not stop to question it. That tiny detail can make all the difference in a successful digital impersonation scheme like this one.

AI chatbot smart digital customer service application on laptop.

AI made it sound eerily real

Artificial intelligence created a voice that matched Rubio’s tone, speed, and speaking style. Even seasoned officials couldn’t immediately tell the difference. It wasn’t just the words that were convincing but also the familiar rhythm of his speech.

This kind of tech is getting better fast. It doesn’t need much audio to learn someone’s voice. Once trained, it can create new words that person never actually said, and it can do it with almost perfect accuracy in tone and delivery.

Facade flags robert kennedy justice department building washington dc

State Department launches an investigation

The State Department confirmed it knows about the impersonation and is looking into it. A message was sent out to embassies around the world, asking diplomats to be cautious of fake accounts pretending to be U.S. officials using chat apps.

Officials are reviewing how these accounts slipped through. They’re also focusing on improving digital safety so that this doesn’t happen again. The situation shows how even top-level agencies are vulnerable to fake messages created by advanced tools and clever tactics.

Cyberattack concept with faceless hooded hacker.

No direct cyberattack but risks remain

There’s no sign that the State Department’s systems were hacked. But if people replied to the fake messages or shared sensitive info, that could create a new set of problems. Digital trust can be just as dangerous when it’s misused.

One slip from a well-meaning official could open the door to private data being leaked. That’s why experts are reminding people that the real threat often comes from trickery, not just direct hacking into protected government networks and official systems.

Smartphone screen with logo of fbi cyber

The FBI has stayed quiet on the case

The FBI hasn’t said anything publicly about this case so far. While they’re likely aware and involved, their silence has raised curiosity. It’s unclear how deep the investigation goes or who they might suspect behind the impersonation effort.

Some U.S. officials think the scam wasn’t very advanced but still recognize the risks it presented. Even simple tricks can lead to serious consequences when they reach the phones or inboxes of people trusted with national or global decisions.

Concept of a hacker using cellphone.

Another hacking attempt surfaced in spring

Earlier this year, another digital attack happened. This one tried to trick think tank experts, journalists, and activists into clicking a link sent in a fake email. That email looked like a harmless invitation from the State Department.

Clicking the link would have given hackers access to the victim’s Gmail account. That means every email, draft, and contact could have been compromised. It’s a dangerous type of attack because it relies on trust, not complex coding or brute force.

Spam message in folder

A bold hacker copied official branding

The attacker behind that spring campaign made their emails look real by copying the State Department’s design. They used logos, names, and email styles that matched official documents and messages to make their targets believe the email was genuine.

Even the fake address ended with state.gov, which helped it appear official. That kind of detail can make someone think they’re dealing with the real government, especially when everything from the wording to the layout mirrors actual diplomatic messages.

Russian flag and blue sky over Kremlin in Moscow

Experts blame a Russia-linked group

Researchers say the earlier Gmail attacks came from hackers tied to a Russian intelligence service. These cyber actors didn’t move fast or loud. They studied their targets, learned how to talk to them, and carefully built trust before acting.

Instead of mass emails, they took their time. This patient strategy made their attack harder to notice. Experts say this slower method is becoming more common because it works better when the targets are influential or aware of traditional hacking risks.

Google logo displayed on a computer screen

Google helped uncover the sneaky plan

Google’s security team worked alongside university researchers to spot and stop the spring phishing campaign. Their investigation connected fake email accounts, links, and chat records that were all designed to gather private information.

They discovered that the hackers targeted personal Gmail addresses instead of work emails. That made it easier to get around government firewalls and security tools. These outside accounts are often less protected and more likely to be overlooked during official monitoring.

A person is chatting via iMessage

One expert became a top target

Keir Giles, a researcher known for writing about Russian influence, was one of the targets. He received messages from multiple fake state.gov email accounts that tried to get him to attend a made-up diplomatic event.

The goal was to build a sense of legitimacy. By contacting him more than once and using different fake accounts, the attackers hoped he would eventually lower his guard and click on a link that would give them access to his inbox.

Closeup shot of using keyboard there is coffee cups

Old attacks used wide net tactics

In earlier years, hackers would send out thousands of identical messages hoping someone would bite. These attacks were easy to spot because they looked generic and impersonal, often filled with odd phrasing or strange requests.

That strategy has changed. Today’s cyber threats focus on fewer people and use more personalized approaches. They do research, copy real styles, and wait longer. That makes it much harder for experts and targets to catch the scam before damage is done.

What to expect written on cubes.

Rubio hasn’t commented publicly

Even though his name and voice were used, Marco Rubio hasn’t said anything yet. There’s been no statement from him or his team about the impersonation attempt, which has only added to public curiosity.

Some believe staying quiet might be part of the security response. Speaking out could draw attention or give away details that investigators want to keep private. For now, the focus remains on tracking the person behind the messages and preventing a repeat.

Man uses a laptop with AI assistant to graphic design, translate language, chat bot, generate images, write code, and advertising.

AI robocalls tricked voters last year

This isn’t the first time artificial intelligence was used to impersonate someone in power. Last year, voters in New Hampshire got phone calls that sounded like President Biden, telling them not to vote in the primary election.

Those calls turned out to be completely fake. Officials called it an illegal effort to influence the election. It shows how AI voices are now part of political games, and how easily they can mislead everyday people when used without limits.

If you wonder how far scammers will go, you might want to see how they’re catching people off guard, like this one, where FBI alerts millions as viral phone scam drains US bank accounts.

Cropped view of young couple chatting with smartphones while sitting

A group chat once leaked real secrets

A few months ago, a private group chat between high-level government officials accidentally included a journalist. That chat included details about possible U.S. military strikes and later led to a shake-up in national security leadership.

The app they used was the same one the fake Rubio account used. That earlier slip showed how even trusted platforms can become weak spots. It also reminded officials that not every conversation is as secure as they may believe.

As global scrutiny around AI exports continues to grow, especially in regions with tight tech controls, like the Singapore AI chip trial over alleged Nvidia exports to DeepSeek postponed to August adds another twist to the unfolding story.

Have you ever received a message that felt suspicious or off? Share your story in the comments; we’d love to hear how you spotted it.

Read More From This Brand:

Don’t forget to follow us for more exclusive content right here on MSN.

If you like this story, you’ll LOVE our Free email newsletter. Join today and be the first to receive stories like these.

This slideshow was made with AI assistance and human editing.

This content is exclusive for our subscribers.

Get instant FREE access to ALL of our articles.

Was this helpful?
Thumbs UP Thumbs Down
Prev Next
Share this post

Lucky you! This thread is empty,
which means you've got dibs on the first comment.
Go for it!

Send feedback to ComputerUser



    We appreciate you taking the time to share your feedback about this page with us.

    Whether it's praise for something good, or ideas to improve something that isn't quite right, we're excited to hear from you.