Tech

Scams and frauds: Here are tactics criminals use on you in the age of AI and cryptocurrencies

Published

on


Credit: Pixabay/CC0 Public Domain

Scams are nothing new—fraud has existed as long as human greed, but what changes are the tools.

Scammers thrive on exploiting vulnerable, uninformed users, and they adapt to whatever technologies or trends dominate the moment. In 2025, that means AI, cryptocurrencies and stolen personal data are their weapons of choice.

And, as always, the duty, fear and hope of their targets provide openings. Today, duty often means following instructions from bosses or co-workers, who scammers can impersonate. Fear is that a loved one, who scammers can also impersonate, is in danger. And hope is often for an investment scheme or job opportunity to pay off.

AI-powered scams and deepfakes

Artificial intelligence is no longer niche—it’s cheap, accessible and effective. While businesses use AI for advertising and , scammers exploit the same tools to mimic reality, with disturbing precision.

Criminals are using AI-generated audio or video to impersonate CEOs, managers or even family members in distress. Employees have been tricked into transferring money or leaking . Over 105,000 such deepfake attacks were recorded in the U.S. in 2024, costing more than US$200 million in the first quarter of 2025 alone. Victims often cannot distinguish synthetic voices or faces from real ones.

Fraudsters are also using emotional manipulation. The scammers make or send convincing AI-written texts posing as relatives or friends in distress. Elderly victims in particular fall prey when they believe a grandchild or other family member is in urgent trouble. The Federal Trade Commission has outlined how scammers use fake emergencies to pose as relatives.

Cryptocurrency scams

Crypto remains the Wild West of finance—fast, unregulated and ripe for exploitation.

Pump-and-dump scammers artificially inflate the price of a cryptocurrency through hype on to lure investors with promises of huge returns—the pump—and then sell off their holdings—the dump—leaving victims with worthless tokens.

Pig butchering is a hybrid of romance scams and crypto fraud. Scammers build trust over weeks or months before persuading victims to invest in fake crypto platforms. Once the scammers have extracted enough money from the victim, they vanish.

Scammers also use cryptocurrencies as a means of extracting money from people in impersonation scams and other forms of fraud. For example, scammers direct victims to bitcoin ATMs to deposit large sums of cash and convert it to the untraceable cryptocurrency as payment for fictitious fines.

Phishing, smishing, tech support and jobs

Old scams don’t die; they evolve.

Phishing and smishing have been around for years. Victims are tricked into clicking links in emails or text messages, leading to malware downloads, credential theft or ransomware attacks. AI has made these lures eerily realistic, mimicking corporate tone, grammar and even video content.

Tech support scams often start with pop-ups on computer screens that warn of viruses or identity theft, urging users to call a number. Sometimes they begin with a direct cold call to the victim. Once the victim is on a call with the fake , the scammers convince victims to grant to their supposedly compromised computers. Once inside, install malware, steal data, demand payment or all three.

Fake websites and listings are another current type of scam. Fraudulent sites impersonating universities or ticket sellers trick victims into paying for fake admissions, concerts or goods.

One example is when a website for “Southeastern Michigan University” came online and started offering details about admission. There is no such university. Eastern Michigan University filed a complaint that Southeastern Michigan University was copying its website and defrauding unsuspecting victims.

The rise of remote and gig work has opened new fraud avenues.

Victims are offered fake jobs with promises of high pay and flexible hours. In reality, scammers extract “placement fees” or harvest sensitive personal data such as Social Security numbers and bank details, which are later used for identity theft.

How you can protect yourself

Technology has changed, but the basic principles remain the same: Never click on suspicious links or download attachments from unknown senders, and enter personal information only if you are sure that the website is legitimate. Avoid using third-party apps or links. Legitimate businesses have apps or real websites of their own.

Enable two-factor authentication wherever possible. It provides security against stolen passwords. Keep software updated to patch security holes. Most software allows for automatic updates or warns about applying a patch.

Remember that a legitimate business will never ask for or a money transfer. Such requests are a red flag.

Relationships are a trickier matter. The state of California provides details on how people can avoid being victims of pig butchering.

Technology has supercharged age-old fraud. AI makes deception virtually indistinguishable from reality, crypto enables anonymous theft, and the remote-work era expands opportunities to trick people. The constant: Scammers prey on trust, urgency and ignorance. Awareness and skepticism remain your best defense.

Provided by
The Conversation


This article is republished from The Conversation under a Creative Commons license. Read the original article.

Citation:
Scams and frauds: Here are tactics criminals use on you in the age of AI and cryptocurrencies (2025, September 18)
retrieved 18 September 2025
from https://techxplore.com/news/2025-09-scams-frauds-tactics-criminals-age.html

This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no
part may be reproduced without the written permission. The content is provided for information purposes only.





Source link

Leave a Reply

Your email address will not be published. Required fields are marked *

Trending

Exit mobile version