2026-03-22 | Auto-Generated 2026-03-22 | Oracle-42 Intelligence Research
```html

Threat Actors Exploit AI Voice Cloning in Vishing Attacks: A Case Study of CVE-2026-4187 in Twilio's Verify Authy

Executive Summary: A critical vulnerability in Twilio’s Verify Authy service—CVE-2026-4187—has enabled advanced threat actors to weaponize AI voice cloning in vishing (voice phishing) campaigns. By combining leaked SIM data from the 2025 SK Telecom breach with AI-generated synthetic voices, attackers can bypass multi-factor authentication (MFA) systems, intercept OTPs, and execute high-value account takeovers. Oracle-42 Intelligence has identified evidence of this technique in live campaigns targeting financial institutions in APAC and North America. This report analyzes the attack chain, highlights key risk factors, and provides actionable recommendations for defenders.

Key Findings

Background: The Convergence of SIM Cloning and AI Voice Synthesis

In April 2025, SK Telecom disclosed a catastrophic breach exposing millions of subscribers’ IMSI, IMEI, and authentication keys—critical identifiers used in SIM card provisioning and network authentication. This data enables SIM cloning, where an attacker impersonates a victim’s device at the network level, receiving calls and SMS intended for the original user.

Concurrently, AI voice cloning technology has matured, enabling the generation of realistic speech from as little as three seconds of audio. Threat actors now combine SIM cloning with AI voice synthesis to create multi-layered impersonation attacks—first cloning the device, then the voice—allowing them to bypass even biometric or behavioral MFA controls.

CVE-2026-4187: Exploiting Authy’s Trust Model

Twilio’s Verify Authy service relies on phone number ownership as a proxy for identity. While it supports MFA via OTP or push approvals, it also allows device enrollment via SMS or voice call under certain conditions. CVE-2026-4187—discovered by Oracle-42 in February 2026—exploits a race condition in device enrollment when:

This flaw enables silent enrollment of attacker-controlled devices, even when the legitimate user is online. Once enrolled, the attacker can receive push approvals and intercept OTPs delivered via SMS—rendering traditional MFA ineffective.

Attack Chain: From SIM Cloning to Account Takeover

The full attack unfolds in five stages:

  1. Data Acquisition: Attackers purchase or exfiltrate IMSI/IMEI pairs from dark web markets or compromised telco databases (e.g., SK Telecom leak).
  2. SIM Cloning: Using software-defined radio (SDR) tools or rogue base stations, the attacker clones the victim’s SIM into a programmable eSIM or physical SIM.
  3. Device Enrollment: The cloned SIM is inserted into a device under attacker control. The attacker initiates an Authy enrollment request via SMS or voice call.
  4. AI Voice Cloning: The attacker uses a short voice sample (e.g., from social media or a previous support call) to generate a synthetic voice that mimics the victim.
  5. Social Engineering: The attacker contacts the bank or service provider, using the cloned voice and number to request password resets or transaction approvals.

In one documented case (March 2026), a threat actor used this method to hijack a South Korean bank executive’s account, initiating a $120,000 wire transfer to a mule account in Singapore.

Defense Evasion and Persistence

Threat actors employ several techniques to evade detection:

Mitigation Strategies for Organizations

Organizations using Twilio Verify Authy must implement layered controls:

Recommendations for Users

End users should take the following precautions:

Future Outlook and Threat Evolution

Oracle-42 Intelligence assesses with high confidence that this technique will proliferate across other MFA systems, particularly those relying on phone-based authentication. AI voice cloning models are becoming commoditized, with open-source tools like OpenVoice and ElevenLabs reducing the barrier to entry. We anticipate the emergence of “voice ransomware,” where attackers encrypt accounts using AI voice authentication challenges.

Additionally, the proliferation of 5G and eSIM technology will further enable SIM cloning, as eSIM profiles can be remotely provisioned without physical access. This dual threat—AI voice synthesis and eSIM cloning—pos