3 min read
[AI Minor News]

【4TB Breach】40,000 AI Contractors' Voices and IDs Stolen. The Weaponization of Voice Cloning Accelerates


  • Massive Data Breach: In April 2026, the hacking group "Lapsus$" announced it had stolen approximately 4TB of data from the AI contractor platform Mercor. ...
※この記事はアフィリエイト広告を含みます

【4TB Breach】40,000 AI Contractors’ Voices and IDs Stolen. The Weaponization of Voice Cloning Accelerates

📰 News Summary

  • Massive Data Breach: In April 2026, the hacking group “Lapsus$” announced it had stolen around 4TB of data from the AI contractor platform Mercor.
  • Unique Aspects of the Breach: The leak included “high-quality voice recordings (2-5 minutes)” of over 40,000 contractors, paired with “scanned government-issued identification.”
  • Legal and Social Implications: Within 10 days of the breach being discovered, five class-action lawsuits were filed. Concerns have been raised regarding the permanent storage of voice data as biometric identifiers.

💡 Key Points

  • The “Golden Set” of Voice Cloning: Unlike typical breaches, the combination of “studio-quality audio” and “verified ID” makes it ripe for immediate exploitation in bypassing bank voice authentication and executing sophisticated impersonation scams (vishing).
  • Collapse of Voice Authentication: Reports have emerged of voice authorization breaches using cloned voices at banks in the U.S. and U.K., as well as a $25 million deepfake video conference scam.
  • Irreversible Damage: Unlike passwords, “voices” cannot be changed. Once high-quality data is leaked, it remains a weapon for attackers indefinitely.

🦈 Shark’s Eye (Curator’s Perspective)

This breach is a whole new level compared to previous personal data leaks! What’s particularly terrifying is the “2 to 5 minutes of noise-free clean audio” recorded for AI training. With current voice cloning technology, just 15 seconds is usually enough, yet attackers got many times that amount tied to IDs. It’s like handing a master key to break into banks’ phone verification systems! If you think this is just a harmless email leak, you’re flirting with a future where someone could issue transfer commands in your own voice!

🚀 What’s Next?

  • Accelerated Phase-Out of Voice Authentication: Banks and critical infrastructure will completely lose trust in voice-only verification, forcing a shift to hardware keys and app-based multi-factor authentication (MFA).
  • Mandatory “Family Passwords”: With a surge in impersonation calls pretending to be relatives in emergencies, offline “passwords that can’t be replicated by voice cloning” will become a common defense strategy.

💬 One Shark’s Take

The idea of my “voice” drifting through the online ocean sends chills down my spine! Everyone, switch off your bank’s voice settings right now! 🦈🔥

📚 Terminology

  • Voice Biometrics: A biometric authentication technology that uses voice frequency and characteristics to identify and verify individuals.

  • Vishing: A portmanteau of Voice and Phishing, referring to scams that use phone calls or voice cloning to convey false information and steal money or data.

  • Lapsus$: A hacker group known for sophisticated attack techniques. As of 2026, they continue to conduct large-scale data thefts targeting major tech companies.

  • Source: 4TB of voice samples just stolen from 40k AI contractors at Mercor

【免責事項 / Disclaimer / 免责声明】
JP: 本記事はAIによって構成され、運営者が内容の確認・管理を行っています。情報の正確性は保証せず、外部サイトのコンテンツには一切の責任を負いません。
EN: This article was structured by AI and is verified and managed by the operator. Accuracy is not guaranteed, and we assume no responsibility for external content.
ZH: 本文由AI构建,并由运营者进行内容确认与管理。不保证准确性,也不对外部网站的内容承担任何责任。
🦈