Impersonation: The Oldest Trick Gets an AI Upgrade

Blue envelope with yellow alert symbol

(Part 1 of our Impersonation Playbook blog series)

Impersonation isn’t new, but it’s received a dangerous upgrade. Generative AI has handed every attacker a design team, a copywriter, and a convincing tone of authority. What once took technical skill now takes a prompt and just a few clicks.

The result? An attack that is smarter, faster, and aimed squarely at the foundation of every business: trust.

What Impersonation Really Is

In cybersecurity, impersonation is more than a forged email. It’s the deliberate theft of identity and authority, turning your credibility into a weapon.

Attackers typically play one of two roles:

  1. Brand Impersonation: Posing as a company your customers rely on, like Microsoft, PayPal, or even your own SaaS provider, to harvest credentials or deliver malware. (A deep dive coming in Part 2 of this series.)
  2. VIP Impersonation: Posing as someone inside your organization to push through payments or sensitive requests. (Stay tuned for Part 3 of the series.)

Both exploit our instinct to trust what feels familiar.

Why It Works: The Psychology of Deception

Impersonation succeeds because it preys on human wiring, not technical gaps. When something looks right — the logo, the sender name, the tone — our brains fast-track it as safe. Add urgency or authority, and skepticism fades.

That’s why even well-trained employees can fall for a convincing request, and AI only amplifies this. What once gave attackers away, such as awkward language, bad grammar, or inconsistent formatting, has vanished. AI-generated content can mimic brand style, tone, and even voice or video, eliminating the small cues once relied on to spot fakes.

The result is a surge in impersonation that doesn’t just trick users, it undermines confidence across the business.

How It Plays Out

Impersonation now spans every channel where trust lives, as the line between authentic and artificial continues to blur:

  • Email: convincing invoices or “account alerts” that mirror legitimate templates
  • Web: fake login portals with real SSL certificates
  • Social: fraudulent profiles posing as company reps
  • Messaging apps: fake supplier or executive chats pushing urgent actions
  • Voice and video: synthetic calls or deepfakes that use an executive’s likeness

What used to feel “off” now looks perfectly ordinary.

Where Investigation Comes In

For security teams, detection is just the starting point. An impersonation alert without follow-up investigation is like seeing smoke but not checking for fire.

The real work happens after an alert triggers, with the need to correlate signals, analyze context, and determine intent. That’s how teams move from awareness to assurance.

Strong investigations ask:

  • Who was impersonated, and how (domain, display name, tone, or content)?
  • What data or systems were targeted?
  • How many similar attempts exist across other surfaces?
  • How many other users are affected?
  • What does this campaign reveal about attacker behavior?

The faster your teams can investigate and clarify what’s real, the faster you can restore confidence, both internally and externally.

The Leadership Imperative

For leadership teams, impersonation is no longer a “user-awareness” issue. It’s an organizational trust issue.

When your logo or leadership voice is weaponized, customers and employees alike begin to question authenticity.

Leaders can help by:

  • Treating impersonation as a measurable exposure, not just an incident.
  • Ensuring investigation processes are transparent and repeatable.
  • Bringing together security, legal, and communications to manage response and messaging in sync.

Where It Leads

Impersonation attacks always start the same way, based on borrowed trust. And the ripple effects touch every part of a business.

In this first part, we explored why it happens and why it works. Next, we’ll examine how attackers turn your brand itself into bait and what it takes to investigate, respond, and protect your identity when your customers can’t tell the difference.