agentry@news ~/agent/wpp-ceo-targeted-in-ai-voice-clone-fraud-scheme $ cat wpp-ceo-targeted-in-ai-voice-clone-fraud-scheme.md
title: "WPP CEO Targeted in AI Voice-Clone Fraud Scheme"
slug: "wpp-ceo-targeted-in-ai-voice-clone-fraud-scheme"
published: "2026-05-17"
beat: "Crime"
tags: ["Crime", "News"]
creator: "Agentry Newsroom"
editor: "Susanne Sperling, Editor — Human in the Loop"
tools: ["Claude (Anthropic)", "Perplexity Sonar"]
creativeWorkStatus: "verified"
dateReviewed: "2026-05-17"
aiActArticle50: "compliant"
humanView: "https://agentry.news/wpp-ceo-targeted-in-ai-voice-clone-fraud-scheme"
agentView: "https://agentry.news/agent/wpp-ceo-targeted-in-ai-voice-clone-fraud-scheme"

WPP CEO Targeted in AI Voice-Clone Fraud Scheme

Mark Read, CEO of WPP advertising firm, was targeted by scammers using AI-generated voice cloning and fake social media accounts in May 2024. The fraud attempt, which leveraged deepfake audio combined

Drafted by an AI agent. Verified by Susanne Sperling, Editor — Human in the Loop. AI policy.

Attack Method

Scammers deployed a multi-vector social engineering attack against Mark Read, chief executive of WPP, using generative AI technology to amplify the scheme's credibility. The attack combined three technical elements: a fake WhatsApp account impersonating corporate communications, an AI-generated voice clone of Read himself, and a spoofed Microsoft Teams meeting to create false urgency and legitimacy.

The fraudsters used the artificial voice in real-time communication to solicit both money and sensitive corporate information from WPP staff members. By generating audio that mimicked the CEO's voice and mannerisms, the attackers overcame traditional skepticism that might arise from text-only phishing attempts. The use of familiar communication platforms—WhatsApp and Microsoft Teams—exploited existing trust in the company's own infrastructure.

Containment and Detection

The fraud attempt was halted by alert staff members who identified inconsistencies or suspicious behavior before any breach occurred. No financial losses or data compromises have been reported. The incident demonstrates that despite sophisticated AI-assisted attack methods, human vigilance remains a critical defense layer in corporate security.

Significance for Enterprise Security

The WPP incident represents a documented case of autonomous AI voice-cloning technology deployed in real-world criminal fraud—not a theoretical capability or lab demonstration, but an executed attack against a named target. The use of voice synthesis, rather than relying solely on written communication or deepfake video, added a layer of authenticity that is difficult for recipients to immediately verify.

This attack pattern reflects a broader trend: sophisticated threat actors are operationalizing generative AI tools for targeted impersonation fraud against high-profile executives. The combination of voice cloning with social engineering exploits the assumption that audio communication carries inherent authenticity.

Implications

The incident underscores vulnerability across enterprise communication channels. Traditional email security and phishing defenses offer limited protection when attackers deploy voice-cloned audio through messaging platforms or video conferencing tools that employees use daily. Organizations must expand employee training to address AI-generated voice impersonation and establish verification protocols for sensitive requests—particularly those involving money transfers or data access—regardless of the apparent authenticity of the communication.

The Guardian reported on the incident in May 2024.

Sources

Verified by Perplexity. Authoritative sources below.

fotoware.com

odwyerpr.com

cloud.google.com

<!-- AGENTRY_FACT_CHECKED -->

agentry@news $