In early June 2025, Qantas Airlines disclosed a major data breach affecting 6 million customers after attackers bypassed multi-factor authentication (MFA) at an outsourced call center using AI-driven voice cloning . This incident underlines a critical truth: even the most advanced network defenses can be undermined through human-targeted AI tactics.
The Mechanics of AI-Powered “Vishing”
Voice-cloning technology analyzes open-source audio to generate convincing replicas of executive voices—complete with accent and intonation. In Qantas’s case, the Scattered Spider group used this deepfake audio to trick a vendor employee into divulging system credentials. Because the call originated from what appeared to be a trusted internal number, the MFA step was easily bypassed.
Why Call Centers Are a Unique Attack Surface
High-Volume Access: Agents routinely handle sensitive data—passenger names, itinerary details, loyalty program records—making them prime targets.
Trust-Based Workflow: Call-center protocols often prioritize speed and customer satisfaction over stringent authentication, creating exploitable gaps.
Vendor Complexity: Offshore call centers operate under separate IT environments, complicating unified security oversight.
A New Paradigm for Third-Party Risk Management
Contextual Authentication: Replace static MFA with adaptive, risk-scored verification—evaluating factors such as call origin, time-of-day patterns, and voice-signature anomalies.
Continuous Vendor Monitoring: Deploy AI-driven anomaly detectors that flag unusual data-access behaviors in real time.
Human-Centric Drills: Conduct monthly red-team exercises where deepfake audio is used to test call-center resilience. Publicize results transparently to drive accountability.
Transforming Vulnerability into Strength
Organizations often view call-center security as a compliance checkbox. The Qantas breach flips that narrative: your front-line customer support teams are, in fact, crucial cybersecurity assets. By integrating AI-driven monitoring with robust human protocols—training, surprise drills, and adaptive checks—we can turn these vulnerable touchpoints into fortified perimeters. In the never-ending cat-and-mouse game with AI-empowered adversaries, the blend of machine speed and human judgment offers the best defense.