{"id":26546,"date":"2025-01-10T10:38:26","date_gmt":"2025-01-10T02:38:26","guid":{"rendered":"https:\/\/www.1ai.net\/?p=26546"},"modified":"2025-01-10T10:39:27","modified_gmt":"2025-01-10T02:39:27","slug":"ai%e8%af%88%e9%aa%97%e7%9a%847%e7%a7%8d%e5%85%b8%e5%9e%8b%e5%a5%97%e8%b7%af%ef%bc%8c%e9%98%b2%e8%8c%83ai%e6%8d%a2%e8%84%b8%e8%af%88%e9%aa%97%e4%bd%a0%e9%9c%80%e8%a6%81%e7%9a%84","status":"publish","type":"post","link":"https:\/\/www.1ai.net\/en\/26546.html","title":{"rendered":"AI fraud 7 typical routes, to prevent \"AI face\" fraud you need the knowledge are here"},"content":{"rendered":"<p>I guess everyone has heard about this recently: an actor was tricked into a Southeast Asian extortion ring in the name of \"auditioning for a movie\" and was eventually rescued and returned home. I can't help but sigh<a href=\"https:\/\/www.1ai.net\/en\/tag\/%e8%af%88%e9%aa%97\" title=\"[Sees articles containing [fraud] labels]\" target=\"_blank\" >Scams<\/a>The tactics are endless, and if you are not careful, you may fall into a carefully laid trap.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-26548\" title=\"42fb7ce3j00spuq1b00m0d000v900e2p\" src=\"https:\/\/www.1ai.net\/wp-content\/uploads\/2025\/01\/42fb7ce3j00spuq1b00m0d000v900e2p.jpg\" alt=\"42fb7ce3j00spuq1b00m0d000v900e2p\" width=\"1125\" height=\"506\" \/><\/p>\n<p>As a platform for AI applications, it suddenly feels necessary to summarize the typical <a href=\"https:\/\/www.1ai.net\/en\/tag\/ai%e8%af%88%e9%aa%97\" title=\"[SEES ARTICLES WITH [AI FRAUD] LABELS]\" target=\"_blank\" >AI scams<\/a>A set-up, a warning to myself, and to everyone else.<\/p>\n<p>Feel free to retweet this so that more people are aware of AI scams and alert. \ud83d\udea8<\/p>\n<p><strong>Routine 1: AI face-swapping video scams<\/strong><\/p>\n<p>Fraudsters collect information about someone through various channels, such as name, phone number, social accounts, photos, and videos, before using AI face-swapping technology to create an AI digital person who looks like that person.<\/p>\n<p>This tactic often uses high-level, boss image to pressure employees to let their guard down and urge victims to transfer money as soon as possible and so on.<\/p>\n<p>\ud83d\udcd8 Practical cases<\/p>\n<p>In early 2023, an employee of the Hong Kong branch of Arup, a multinational engineering firm, received an email invitation to a meeting that appeared to be from executives at the company's headquarters. Although he was initially skeptical, he let his guard down when he clicked on the link in the email to enter the meeting and saw that a number of executives, including the company's CFO, were online and discussing a secret acquisition. After the meeting, he followed the instructions of the \"leader\" and transferred HK$200 million into five designated accounts in 15 installments. It was not until he communicated with the headquarters five days later that he realized he had been cheated.<\/p>\n<p>It turns out that the fraudsters used Deepfake technology to create \"avatars\" using audio and video messages from company executives and prerecorded the fake high-level meeting, allowing employees to fall into the trap without even realizing it. The case is considered one of the largest AI scams in history.<\/p>\n<p><strong>Set two: AI synthesized voice fraud<\/strong><\/p>\n<p>Fraudsters obtain the voice material of the target person through harassing telephone recordings and other means. Then they use AI voice synthesis technology to imitate the voice of the target person, communicate with the target person's acquaintances over the phone, and use a variety of urgent or enticing reasons to obtain trust and money.<\/p>\n<p>With the increasing fidelity of tone cloning these days, fake tones are hard to recognize. It is advisable to refuse all requests for remote transfers that are \"all voice and no person\". \ud83d\ude45<\/p>\n<p>\ud83d\udcd8 Practical cases<\/p>\n<p>In 2019, the world's first AI scam took place in the UK: a fraudster used advanced AI voice mimicry software to pose as a company executive and successfully defrauded the managing director of a British energy company out of 220,000 euros.<\/p>\n<p>Recently in China, a company's founder was scammed out of up to 4.3 million yuan in just 10 minutes of using WeChat to video chat with a friend.<\/p>\n<p><strong>Trope 3: AI Generates Fake News<\/strong><\/p>\n<p>Fraudsters use AI generation technology to generate fake news content based on specific keywords or topics. These contents are very similar to real news in terms of language expression, logical structure, etc., and are highly confusing.<\/p>\n<p>Then, by publishing false financial news, product reviews and other information, people are induced to invest or buy inferior products.<\/p>\n<p>\ud83d\udcd8 Practical cases<\/p>\n<p>In January this year, Nanjing Sun Mou, Suzhou Li Mou and other people, in order to gain attention and improve property sales and other purposes, fabricated and disseminated \"compulsory education reform to shorten the school system\", \"high school into compulsory education, Nanjing in Xuanwu District pilot\" and other rumors, resulting in adverse social impact, disrupting public order. Social impact, disturbing public order. At present, Sun Mou, Li Mou and other seven people have been sentenced to administrative punishment by the police according to law.<\/p>\n<p>\ud83e\udd1d Precautionary advice<\/p>\n<p>When getting news, try to choose the channels released by official media or authoritative organizations. For some shocking secret news and gossip, keep calm and do not spread mindlessly to follow the trend.<\/p>\n<p><strong>Trope 4: AI Scuba Scam<\/strong><\/p>\n<p>Fraudsters use AI technology to generate a large number of fake accounts and control the activities of these accounts on e-commerce platforms and social media. Then, through the AI writing function, they generate a large number of false reviews and favorable comments to mislead consumers into believing that a certain product or service is very popular.<\/p>\n<p>\ud83e\udd1d Precautionary advice<\/p>\n<p>When purchasing an item, in addition to checking the number of reviews and positive ratings, read the content of the reviews carefully, especially those with descriptions of specific usage experiences and details.<\/p>\n<p>Be wary of items that have seen a spike in the number of reviews in a short period of time and have unusually high positive ratings - there may be a risk of fake reviews.<\/p>\n<p><strong>Trope 5: AI Emotional Fraud<\/strong><\/p>\n<p>Using AI face-swapping technology and natural language processing technology, it disguises celebrity characters from TV dramas and chats with victims 1v1 through social software.<\/p>\n<p>After gaining the victim's trust, they use emotions as bait and fabricate various reasons to \"sell\" the victim and ask for money.<\/p>\n<p>\ud83e\udd1d Precautionary advice<\/p>\n<p>When communicating with so-called \"celebrities\" or \"acquaintances\", keep your wits about you. \"Celebrities are very busy and are unlikely to come over to talk to a stranger, and don't transfer money or provide personal information easily.<\/p>\n<p>Verify the identity through the star's official channels, such as through the official studio, the star's other official accounts, etc.<\/p>\n<p><strong>Trope 6: AI Money Fraud<\/strong><\/p>\n<p>Fraudsters use AI technology to analyze large amounts of user data to accurately identify potential fraud targets, such as people who frequently focus on financial investments.<\/p>\n<p>Then, customized fraud scripts are generated according to the characteristics and needs of the target group, and false investment information is sent to them by phone and SMS.<\/p>\n<p><strong>Trope 7: AI Phishing Scam<\/strong><\/p>\n<p>Use AI technology to hack into someone's email &amp; other files, then mimic that person's writing style to send phishing letters to their social friends that are both real and fake.<\/p>\n<p>The emails usually contain malicious links or attachments that entice victims to click or download, and once the user clicks on them, their personal information is stolen.<\/p>\n<p>After reading these cases, have you noticed a pattern: AI scams are not only exploiting technology, but also exploiting human psychological vulnerabilities.<\/p>\n<p>As a result, some have also compared AI fraud to an 'arms race':<\/p>\n<p>Fraudsters are using more advanced AI technology to break through people's psychological defenses and create chaos, while ordinary people need to band together to defend themselves against human weaknesses by reinforcing rules and 'common sense'.<\/p>","protected":false},"excerpt":{"rendered":"<p>I guess we have all heard about this recently: an actor in the name of \"audition\" was tricked into Southeast Asia's electric fraud gangs, and was eventually rescued back to China. I can't help but marvel at the endless ways of fraud, and if you're not careful, you may fall into a carefully arranged trap. As a platform in the field of AI applications, I suddenly feel the need to summarize the typical AI fraud schemes, and give myself and everyone a reminder. Welcome to forward it, so that more people can understand AI scams and be more vigilant. \ud83d\udea8 Set 1: AI face-swapping video fraud Fraudsters collect information about a person through various channels, such as name, phone number, social account, photos, videos, and then use AI face-swapping technology to create an AI digital person who looks like this person. This tactic often utilizes high-level and boss images to pressure employees into<\/p>","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[148,146],"tags":[4112,1176],"collection":[],"class_list":["post-26546","post","type-post","status-publish","format-standard","hentry","category-headline","category-news","tag-ai","tag-1176"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/posts\/26546","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/comments?post=26546"}],"version-history":[{"count":0,"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/posts\/26546\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/media?parent=26546"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/categories?post=26546"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/tags?post=26546"},{"taxonomy":"collection","embeddable":true,"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/collection?post=26546"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}