Recently, Elliptic published a report into pig butchering and the role of Cambodia-based Huione Guarantee marketplaces in selling a range of tools for scammers. Among the tools on sale was AI face-changing software — marketed for numerous live chat platforms and messaging apps. Elliptic has conducted separate research into deepfakes and their role in the crypto romance scams that such groups are notorious for facilitating. The good news is that, despite their experimentation with AI, the actual use thereof currently appears to crypto scams dating apps low. Elliptic has not identified the use of AI tools to enhance on-chain obfuscation of pig butchering proceeds, although there is a small but growing indication of AI-generated content being used to initiate these scams. The even better news is that this sort of trend — where it has been observed — is largely detectable, both by blockchain analytics and the numerous red flags they exhibit. In this blog, we discuss some of these capabilities and red flags, as well as key vulnerabilities observed so far that can be addressed while technology is still in its development phase. Early mitigation is key to ensuring that emerging crime trends do not become mainstream. Elliptic is running a consultation on developing cross-industry best practices to prevent AI-enabled crime in the cryptoasset ecosystem. Have your say and receive exclusive early access to the results. Our investigation into Huione Guarantee merchants found that access to AI face-changing software is being sold on dedicated telegram channels, alongside stolen data, pig butchering investment sites and even torture equipment. Huione Guarantee merchants offering web development of cryptocurrency investment sites of the type used in pig butchering scams leftpersonal data of individuals around the world for targeting by scammers middle and AI face changing software advertised for use in scams right. Although interest in AI as crypto scams dating apps solution is increasing, there is no suggestion that it is yet being used en-masse as a solution. In fact, the limited observations of where AI has been used by pig butchering scammers has exposed a number of limitations for criminals, partly in thanks to AI large language models getting better at identifying and refusing malicious prompts. This is an early indication that pig butchering scammers — often impeded by the English language barrier — are exploring the use of AI to make them more inconspicuous, though with obvious crypto scams dating apps of failure. There are indications that Huione-linked individuals or entities are exploring workarounds, however. It is unknown whether that customer is specifically associated with pig butchering or what their intentions are with the subscription. Some victims crypto scams dating apps reported the apparent use of AI-generated or enhanced images of young men and women by scammers, identified across numerous dating apps and other social media, such as LinkedIn. This tactic, however, has numerous limitations for criminals. It can be easy, for example, through visual inspection or dedicated tools, to detect whether the image is fake. Additionally, AI tools still struggle in producing the image of the same individual in different contexts, as the face is likely to change with the prompt. Furthermore, it remains the case that using real images of unsuspecting young people harvested from social media is a cheap and easy endeavour for scammers. Much like stolen data and AI face-changers, many of these Huione merchants also sell harvested images in bulk — both on dedicated messaging channels and websites. These include images of people, but also of fancy cars and luxury offices — all intended to convince pig butchering victims that the scammer has found extreme wealth. A Taiwanese website selling batches of profile pictures, as well as images depicting wealth and fancy cars — all potentially intended for Sha Zhu Pan pig butchering scams. A bigger enabler of crypto investment scams, rather than AI itself, is the hype behind it. Public reports of pig butchering sites suggest that such URLs have been used significantly since As exemplified by the above quote, AI-related pig butchering sites will typically use buzzwords and jargon designed to give a sense of technological sophistication and legitimacy. Other key red flags of pig butchering scams may be that the user interface of the website does not necessarily match — or have any mention of — the AI-related keywords in its URL. The two example scam sites below are both accessed through URLs that include AI keywords. It is likely to be reused from a previous URL deployed by the same scam operators. It is important to note that, in terms of their on-chain activities, the use of AI in scam site interfaces or URLs bears no difference to ones that do not. The capability of blockchain analytics solutions to understand the operations of such scams is demonstrated on the below Elliptic Investigator graph, which shows the on-chain transactions between an AI-related pig butchering scam site and six presumed victims. Source: Elliptic Investigator. This is a typical initial baiting withdrawal to make the victim believe in the authenticity of the site — after which the victim is encouraged to invest more. Noting that prevention is the best cure, and reiterating that AI-enabled pig butchering attempts exhibit some clear red-flag indicators, here are some that may allow victims to detect these scams and protect themselves while engaging with AI and crypto.
The Cryptocurrency and Digital Asset Fraud Casebook, Volume II
The Rise of Pig Butchering Scams It begins by outlining the historical role of crypto romance scams, including the. The scam involves criminals engaging with targets through social media, direct messaging apps, and dating apps, sometimes for months, to build a sense of trust. This chapter provides an overview of crypto romance scams and pig butchering. Krypto- und Web3-Blog - pig-butchering-scam-in-crypto-and-how-to-protect-yourself | TrustThe two example scam sites below are both accessed through URLs that include AI keywords. Then, we analyze the anatomy of romance scams and discuss the characteristics of victims and the role of law enforcement in assisting victims in recovering. We begin with an overview about trends in malicious activity and thefts in the space. They provided a fraudulent certificate of incorporation to further legitimize their operations. Many of these indicators are also relevant for typical crypto investment scams and are not limited only to those initiated by pig butchering operations. Promising Exorbitant Returns: The threat actors offered victims a ten-time return on their investment, a highly unrealistic and unsustainable promise.
Premium Partner
It begins by outlining the historical role of crypto romance scams, including the. The scam involves criminals engaging with targets through social media, direct messaging apps, and dating apps, sometimes for months, to build a sense of trust. I Lost the Majority of my Life Savings in an Online Dating Scam. Lafayette man loses life savings to crypto scam. Shai. Scammers like Gochenour's have become skilled at setting up sites that convincingly look like legitimate cryptocurrency companies, and Gochenour was taken in. This chapter provides an overview of crypto romance scams and pig butchering.Articles AI. Dort werden die Opfer mit Liebes- und Geldversprechen gelockt. Additionally, we located directories where uploaded images are stored. Automotive Acoustics Conference A Taiwanese website selling batches of profile pictures, as well as images depicting wealth and fancy cars — all potentially intended for Sha Zhu Pan pig butchering scams. While most pig butchering scams are associated with Chinese-speaking threat actor groups, our investigation suggests that this specific scam appears to be linked mainly to threat actors originating in Africa, indicating the global expansion and diversification of such operations. This blog is provided for general informational purposes only. Zugang für Unternehmen. Wir freuen uns auf Ihre Anregungen für innovative, umweltfreundliche und intelligente Verfahren zur Gestaltung der Zukunft der Fahrzeugakustik. Welche Rolle spielt KI? Bitte loggen Sie sich ein, um Zugang zu Ihrer Lizenz zu erhalten. Furthermore, it remains the case that using real images of unsuspecting young people harvested from social media is a cheap and easy endeavour for scammers. Jeder kann Opfer dieser Betrugsmasche werden. Es drohen Depressionen und Angstzustände. Geld, das sie nie wieder sehen werden. Mai Public reports of pig butchering sites suggest that such URLs have been used significantly since A bigger enabler of crypto investment scams, rather than AI itself, is the hype behind it. Figures Examples of payment receipts uploaded by Russian-speaking victims to the platforms. We begin by analyzing a case study about data breaches at Neopets. The chapter continues with additional case studies in NFT rug pulls Evolved Apes, Pixel Penguins, Mutant Ape Planet. Share to your network. This chapter provides an overview of Decentralized Autonomous Organization DAO fraud, hacks, and controversies. Cryptocurrencies and digital assets have continued to gain widespread acceptance from both retail and institutional investors. Die Täter planen ihre Betrugsmasche im Wesentlichen in drei Phasen — und verhöhnen ihre Opfer dabei in menschenverachtender Weise:. Deepfakes typically do not render side profiles correctly under current technologies. Much like stolen data and AI face-changers, many of these Huione merchants also sell harvested images in bulk — both on dedicated messaging channels and websites. Dr Arda Akartuna. We identified that the scammers are using the Laravel framework based on the presence of certain files. Cases discussed include Platypus Finance and the ethical hacker defense, Euler Finance, KyberSwap, and Themis Protocol.