
Image by Jonathan Velasquez, from Unsplash
AI Host Went Live for Six Months, Listeners Thought It Was A Real Person
- Written by Kiara Fabbri Former Tech News Writer
- Fact-Checked by Sarah Frazier Former Content Manager
A Sydney radio station aired an AI-generated host for months, deceiving listeners and reigniting debate over transparency in Australian media.
In a rush? Here are the quick facts:
- CADA aired an AI radio host, Thy, for six months without disclosure.
- Thy’s voice was cloned from a real ARN finance team employee.
- The show reached over 72,000 listeners monthly, many unaware she wasn’t real.
An Australian radio station has come under fire after secretly airing an AI-generated host for six months, without ever telling its audience.
Sydney’s CADA station, owned by ARN Media, introduced “Thy,” a digital voice created using ElevenLabs AI software, back in November 2024, as first reported by The Sydney Morning Herald (SMH) . Thy hosted the Workdays with Thy segment every weekday from 11am to 3pm, playing hip-hop, R&B, and pop hits. But there was no public mention that Thy wasn’t a real person.
The Independent reported that listeners only found out recently, after journalist Stephanie Coombes raised questions online. “What is Thy’s last name? Who is she? Where did she come from?” she wrote in a blog post. “There is no biography, or further information about the woman who is supposedly presenting this show.”
Eventually, ARN admitted Thy’s voice had been cloned from an actual finance team employee. One project lead wrote in a deleted LinkedIn post:
Despite the show reaching over 72,000 people, CADA never disclosed Thy’s artificial nature on-air or online. “If your day is looking a bit bleh, let Thy and CADA be the energy and vibe,” the show’s page still reads, as reported by The Independent.
While there are currently no rules in Australia requiring media companies to label AI use, the incident has sparked debate over transparency.
“They should have been upfront and completely honest,” said Teresa Lim, vice president of the Australian Association of Voice Actors, as reported by The Independent. “People have been deceived into thinking it’s a real person because there’s no AI labelling,” she added.
Lim noted that the issue also touches on fair representation. “When we found out she was just a cardboard cut-out, it cemented the disappointment. There are a limited number of Asian-Australian female presenters who are available for the job, so just give it to one of them,” as reported by the SMH.
CADA defended the trial, saying it was part of exploring new technologies in broadcasting. “This is a space being explored by broadcasters globally,” an ARN spokesperson said, as reported by the SMH. “This is a space being explored by broadcasters globally, and the trial has offered valuable insights”
The Australian Communications and Media Authority said that AI policy is still being developed, and discussions around transparency and regulation are ongoing.

Image by Nubelson Fernandes, From Unsplash
Hackers Use Fake Crypto Firms To Spread Malware In Job Scams
- Written by Kiara Fabbri Former Tech News Writer
- Fact-Checked by Sarah Frazier Former Content Manager
North Korean hackers are posing as crypto firms, tricking job seekers into downloading malware that steals wallet credentials during fake interviews.
In a rush? Here are the quick facts:
- Malware disguised as coding tests stole victims’ crypto wallet credentials.
- AI-generated profiles made fake companies appear credible.
- Attacks were spread through GitHub and freelance platforms.
Security researchers at Silent Push have uncovered a new cyberattack campaign orchestrated by the North Korean hacking group known as Contagious Interview, also referred to as Famous Chollima.
The group is operating three fraudulent cryptocurrency companies—BlockNovas LLC, Angeloper Agency, and SoftGlide LLC—to deceive job seekers into installing malware .
The scheme begins with fake job postings on freelance and recruitment websites, targeting individuals seeking roles in the cryptocurrency industry . When applicants respond, they are asked to download files allegedly containing interview materials or coding challenges.
These files, however, deliver malicious software identified as BeaverTail , InvisibleFerret, and OtterCookie. The malware is designed to steal sensitive data, including cryptocurrency wallet credentials.
To bolster the scam’s credibility, the hackers create fake employee profiles using AI-generated images. Some of these headshots were produced with Remaker AI, a tool designed to fabricate realistic portraits.
The three fraudulent companies—BlockNovas, Angeloper, and SoftGlide—present themselves as legitimate businesses, but their primary purpose is to distribute malware. Victims are misled into executing malicious code during what they believe to be technical assessments or interviews.
The hackers rely on platforms such as GitHub, freelancer marketplaces, and job boards to distribute the malware and manage their operations.
The attack strategy aligns with a pattern seen in past operations by Contagious Interview, a subgroup of the North Korean state-backed Lazarus team. Known for using fake job offers and AI-generated personas, Lazarus leverages residential proxies and VPNs to mask its location while targeting individuals globally.
To protect against such attacks, experts advise job seekers to be wary of any offers that require downloading unknown files or executing code. It is also essential to verify the legitimacy of companies before engaging in interviews and to use up-to-date security software.
One developer recounted their experience: “I wanted to share how my MetaMask wallet was hacked yesterday as a cautionary tale.”
“I received a new project through Freelancer.com. The client had a ‘payment verified’ badge, so I assumed they were legitimate. The project involved web3 backend development, which I was confident I could handle,” he continued.
“After accepting the contract, the client invited me to their GitLab project and asked me to run their backend code. Soon after running it, I realized that my MetaMask wallet had been compromised,” the developer warned.