AI Impersonator Posed as Marco Rubio, Contacted Foreign Ministers in Sophisticated Deception

An individual using AI-generated voice technology impersonated U.S. Secretary of State Marco Rubio in June, contacting at least three foreign ministers, two U.S. officials, a governor, and a member of Congress, according to a classified State Department cable seen by Reuters.

The impersonator reached out through the Signal messaging app, sending voice messages and at least one text inviting recipients to connect further. The AI-driven impersonation is suspected to be part of a broader attempt to extract information or access government accounts, the July 3 cable warned.

“The actor likely aimed to manipulate targeted individuals using AI-generated text and voice messages,” it stated.

The State Department has launched an investigation into the incident. A senior official, speaking anonymously, confirmed the government is taking steps to improve cybersecurity protocols and mitigate future threats. While no immediate cyber breach was reported, the department noted that if individuals engaged with the impersonator, sensitive information could have been compromised.

This follows a string of recent digital security incidents. In a separate situation, President Donald Trump’s former National Security Adviser Mike Waltz accidentally added a journalist to a Signal group chat, where classified discussions on military operations in Yemen were exposed.

The State Department is now instructing diplomatic and consular staff to warn external partners about impersonation tactics and fake accounts. While the cable didn’t disclose which foreign ministers were contacted, it linked this attempt to earlier AI-related phishing campaigns.

Russia Connection Suspected in Prior Campaign

The cable also referenced a April impersonation campaign attributed to a Russia-linked hacker, who mimicked a @state.gov email address and replicated branding from the Bureau of Diplomatic Technology. That campaign targeted think tanks, Eastern European activists, and former State Department officials, showing “extensive knowledge of internal naming conventions and documentation.”

That operation was publicly tied to the Russian Foreign Intelligence Service by cybersecurity experts.

FBI Confirms Broader AI Threat

In May, the FBI issued a warning about malicious actors using AI-generated voice and text messages to impersonate senior U.S. officials. These schemes aim to gain access to personal or professional accounts, and potentially to manipulate additional targets once access is gained.

While the FBI declined to comment on the Rubio impersonation, it has previously said such tactics can be used to elicit sensitive information or financial transfers under false pretenses.

The impersonation episode also follows recent reporting from the Wall Street Journal that White House Chief of Staff Susie Wiles was also the subject of a similar impersonation attempt, now under federal investigation.

As AI-generated content becomes more convincing and accessible, national security experts warn that the threat of deepfake diplomacy and synthetic political manipulation is rapidly escalating.

M&S Urges Mandatory Reporting of Major Cyberattacks by UK Firms

Marks & Spencer (M&S) chairman Archie Norman has called for new legislation requiring large UK companies to report material cyberattacks to national authorities. Speaking before Parliament’s Business and Trade Committee on Tuesday, Norman said the current voluntary system leads to significant underreporting of serious breaches.

Citing the April 17 cyberattack that forced M&S to suspend its online operations for 46 days, Norman said the company had since learned of two major cyberattacks on large British firms within the past four months that were never reported to the National Cyber Security Centre (NCSC).

“We believe there’s a big deficit in knowledge,” Norman said. “So I don’t think it would be regulatory overkill to require companies of a certain size to report material cyber incidents to the NCSC within a fixed timeframe.”

While Norman declined to say whether M&S paid a ransom, he noted that the matter was “fully shared” with the National Crime Agency and other authorities. He also revealed that the attack likely involved multiple parties, including the ransomware group DragonForce, believed to be operating from Asia. Media reports have linked the Scattered Spider hacking collective to the breach.

Describing the cyberattack’s mechanics, Norman said it began with a “social engineering” operation. M&S reportedly had no contact from the threat actors for about a week following the breach. The attack is expected to result in an estimated £300 million ($409 million) in lost operating profit.

Norman added that M&S had been “fortunate” to have doubled its cyber insurance coverage last year, though the company expects the claims process to take up to 18 months. The online clothing store reopened on June 10, but click-and-collect services remain offline.

Nick Folland, General Counsel at M&S, told lawmakers that a key takeaway for other businesses was to maintain the ability to operate offline using pen and paper: “That’s what you need to be able to do for a period of time whilst all of your systems are down.”

CEO Stuart Machin previously said that the company expected to be past the worst of the incident’s impact by August.

Norman’s remarks underline the growing push for stronger cybersecurity regulation in the UK, amid rising concerns about corporate transparency and resilience in the face of increasingly sophisticated cyber threats.

One-Third of Global Chip Production at Risk from Copper Supply Disruptions by 2035 — PwC

A new report by PricewaterhouseCoopers (PwC) has warned that 32% of global semiconductor production could face copper supply disruptions due to climate change by 2035, a sharp rise from current levels. The findings highlight a growing vulnerability in the global chipmaking supply chain, particularly as copper is essential for producing the billions of micro-wires in every chip.

The study flags climate-related droughts as the primary threat, particularly in Chile, the world’s top copper producer, which is already experiencing water shortages that are slowing mining operations. By 2035, PwC estimates that most of the 17 countries critical to copper supply for semiconductors will be at risk of severe droughts.

The impact could be severe, PwC project lead Glenn Burm noted, referencing the 2020–2021 global chip shortage that halted automotive and electronics production and shaved 1% off U.S. GDP and 2.4% off Germany’s, according to U.S. Department of Commerce data.

Copper-producing countries such as China, Australia, Peru, Brazil, the U.S., DR Congo, Mexico, Zambia, and Mongolia are all expected to be affected, leaving no chip-producing region spared from climate risks.

While research into copper alternatives is ongoing, the report warns that no substitute currently matches copper’s performance and cost-efficiency, making the material indispensable in the near term. PwC emphasized that unless innovation adapts rapidly and more reliable water supply systems are developed, the risks will grow more acute over time.

By 2050, PwC forecasts that half of each country’s copper supply will be at risk, even under optimistic climate scenarios. For Chile, 25% of copper output is already considered vulnerable; this figure could climb to 75% by 2035 and reach as high as 100% by mid-century.

Some countries, notably Chile and Peru, have taken preemptive action by boosting mining efficiency and investing in desalination plants to secure water access. However, PwC notes that such measures may not be viable for landlocked countries or those without access to seawater, making global coordination and innovation critical.

PwC’s report urges business leaders and governments to prioritize copper supply chain resilience as they plan future semiconductor strategies, warning that without action, climate-driven resource constraints could become the next major shock to the global tech economy.