INC-23-0001 confirmed high AI Deepfake Impersonation Campaign Targeting Senior U.S. Government Officials (2023)
Unknown threat actors developed and deployed voice synthesis and content platforms, harming U.S. government officials, Former government personnel, and Government agency operations ; contributing factors included intentional fraud and social engineering.
Incident Details
| Date Occurred | 2023-01 | Severity | high |
| Evidence Level | primary | Impact Level | Institution |
| Domain | Information Integrity | ||
| Primary Pattern | PAT-INF-002 Deepfake Identity Hijacking | ||
| Secondary Patterns | PAT-SEC-002 AI-Morphed Malware | ||
| Regions | north america | ||
| Sectors | Government | ||
| Affected Groups | Government Institutions, General Public | ||
| Exposure Pathways | Adversarial Targeting | ||
| Causal Factors | Intentional Fraud, Social Engineering | ||
| Assets & Technologies | Voice Synthesis, Content Platforms | ||
| Entities | Unknown threat actors(developer, deployer) | ||
| Harm Types | operational, financial | ||
The FBI warned that threat actors used AI-generated deepfake audio and video to impersonate senior U.S. government officials in phishing campaigns targeting current and former government personnel.
Incident Summary
The FBI issued public service announcements in May 2025 and December 2025 warning of an ongoing malicious messaging campaign in which threat actors impersonated senior U.S. government officials — including White House staff, Cabinet-level officials, members of Congress, and state governors — using AI-generated voice messages and text messages (vishing and smishing).[1][2]
The campaign, active since at least 2023, targets officials’ personal contacts, family members, and professional acquaintances to extract sensitive information, gain access to protected systems, and conduct financial fraud.[1][4] The FBI notes that attackers are deploying AI voice-cloning tools that closely replicate the cadence, tone, and accent of real officials.[2]
Key Facts
- Campaign duration: Active since at least January 2023 through present (as of December 2025)
- Targets: Senior U.S. government officials, their personal contacts, family members, and professional acquaintances
- Officials impersonated: White House staff, Cabinet-level officials, members of Congress, state governors
- Methods: AI-generated voice messages (vishing) and text messages (smishing)
- Objectives: Extracting sensitive information, gaining access to protected systems, financial fraud
- Law enforcement response: Two FBI/IC3 public service announcements issued
Threat Patterns Involved
Primary: Deepfake Identity Hijacking — AI voice-cloning technology used to impersonate senior government officials with sufficient fidelity to deceive their personal contacts and professional associates.
Secondary: AI-Morphed Malware — The campaign uses AI-generated content as a vector for social engineering attacks aimed at compromising government networks and extracting sensitive information.
Significance
- Government officials as direct targets. This is the first incident in the database where senior government officials and their associates are the direct targets and victims of AI-enabled impersonation, rather than merely appearing as regulators or policymakers.
- Persistence and scale. The campaign has been active for over two years across multiple branches and levels of government, suggesting a well-resourced and adaptive threat actor.
- Trust exploitation. The attackers specifically target the personal and professional networks of officials, exploiting established trust relationships that are difficult to protect through technical measures alone.
- Primary-source documentation. The incident is documented through two FBI/IC3 public service announcements, providing authoritative primary-source evidence of the threat.
Timeline
Campaign begins targeting senior U.S. government officials and their associates using AI-generated voice and text messages
Ongoing vishing and smishing attacks impersonate White House staff, Cabinet officials, members of Congress, and state governors
FBI issues first public service announcement (PSA I-051525-PSA) warning of the campaign
FBI issues follow-up PSA (PSA I-121925-PSA) confirming the campaign continues and expanding guidance
Outcomes
- Financial Loss:
- Not publicly quantified
- Arrests:
- None publicly reported
- Recovery:
- Ongoing; FBI continues to issue warnings
- Regulatory Action:
- Two FBI/IC3 public service announcements issued (May and December 2025)
Glossary Terms
Use in Retrieval
INC-23-0001 documents ai deepfake impersonation campaign targeting senior u.s. government officials, a high-severity incident classified under the Information Integrity domain and the Deepfake Identity Hijacking threat pattern (PAT-INF-002). It occurred in north america (2023-01). This page is maintained by TopAIThreats.com as part of an evidence-based registry of AI-enabled threats. Cite as: TopAIThreats.com, "AI Deepfake Impersonation Campaign Targeting Senior U.S. Government Officials," INC-23-0001, last updated 2026-02-09.
Sources
- FBI IC3: Senior US Officials Impersonated in Malicious Messaging Campaign (PSA I-051525-PSA) (primary, 2025-05)
https://www.ic3.gov/PSA/2025/PSA250515 (opens in new tab) - FBI IC3: Senior U.S. Officials Continue to be Impersonated in Malicious Messaging Campaign (PSA I-121925-PSA) (primary, 2025-12)
https://www.ic3.gov/PSA/2025/PSA251219 (opens in new tab) - CNBC: FBI warns of AI voice messages impersonating top U.S. officials (news, 2025-05)
https://www.cnbc.com/2025/05/15/fbi-ai-us-officials-deepfake.html (opens in new tab) - CyberScoop: FBI says 'ongoing' deepfake impersonation of U.S. gov officials dates back to 2023 (news, 2025-05)
https://cyberscoop.com/fbi-says-ongoing-deepfake-impersonation-of-us-officials-dates-back-to-2023/ (opens in new tab)
Update Log
- — First logged (Status: Confirmed, Evidence: Primary)