Crime ❯ Cybercrime ❯ Fraud ❯ Identity Theft
Attackers mine victims' social posts, using voice cloning to demand deposits for supposed recoveries.