Scam-Yourself Attacks Are Spreading – and AI Is Making Them Harder to Spot

Monday, 12/01/2026 | 12:49 GMT by Tanya Chepkova
  • “Scam-yourself” attacks are becoming a growing fraud trend.
  • Attackers are exploiting trust and routine behaviour – making user actions the weakest point in modern fraud defence.
fraud scam trap

Cybercrime is increasingly targeting people, not devices. Attackers are using so-called “scam-yourself” techniques across everyday channels such as SMS, email, and social media, walking users into taking harmful actions themselves.

According to latest Gen Digital’s Threat Report, this new class of social engineering increasingly combines generative AI with platform distribution tools to scale rapidly and bypass traditional security defences. In many cases, victims are tricked into transferring funds themselves – without malware, phishing links, or credential theft.

YouTube Deepfake “Advisors” Case

One of the most illustrative examples of this broader scam-yourself trend involved AI-generated “crypto advisors” on YouTube. Cybersecurity researchers documented a campaign that used deepfake personas across more than 500 videos to promote tools designed to exploit price discrepancies between blockchain networks.

Rather than delivering malware or stealing credentials, the attackers relied on user participation. Victims were instructed to copy and paste code into web-based integrated development environments (IDEs) and then fund smart contracts. In practice, the code redirected funds to attacker-controlled wallets – with users completing each step themselves.

The campaign also used typo-squatted domains mimicking TradingView, such as “tradlngview.com.” These near-identical URLs were designed to reduce friction and suppress standard security warnings during code compilation, making red flags easier to miss unless users manually verified addresses.

Why This Matters

The YouTube campaign captures the defining feature of scam-yourself attacks described in Gen Digital’s report: defenders can harden systems, but attackers win by manipulating trust, familiarity, and routine behaviour across channels. There is no malicious file to quarantine and no credential database to reset if the user has been persuaded to authorise the transaction.

As scams become more coordinated across platforms, effective defences increasingly depend on user behaviour: checking URLs, questioning step-by-step instructions, and being cautious of polished presentation.

Cybercrime is increasingly targeting people, not devices. Attackers are using so-called “scam-yourself” techniques across everyday channels such as SMS, email, and social media, walking users into taking harmful actions themselves.

According to latest Gen Digital’s Threat Report, this new class of social engineering increasingly combines generative AI with platform distribution tools to scale rapidly and bypass traditional security defences. In many cases, victims are tricked into transferring funds themselves – without malware, phishing links, or credential theft.

YouTube Deepfake “Advisors” Case

One of the most illustrative examples of this broader scam-yourself trend involved AI-generated “crypto advisors” on YouTube. Cybersecurity researchers documented a campaign that used deepfake personas across more than 500 videos to promote tools designed to exploit price discrepancies between blockchain networks.

Rather than delivering malware or stealing credentials, the attackers relied on user participation. Victims were instructed to copy and paste code into web-based integrated development environments (IDEs) and then fund smart contracts. In practice, the code redirected funds to attacker-controlled wallets – with users completing each step themselves.

The campaign also used typo-squatted domains mimicking TradingView, such as “tradlngview.com.” These near-identical URLs were designed to reduce friction and suppress standard security warnings during code compilation, making red flags easier to miss unless users manually verified addresses.

Why This Matters

The YouTube campaign captures the defining feature of scam-yourself attacks described in Gen Digital’s report: defenders can harden systems, but attackers win by manipulating trust, familiarity, and routine behaviour across channels. There is no malicious file to quarantine and no credential database to reset if the user has been persuaded to authorise the transaction.

As scams become more coordinated across platforms, effective defences increasingly depend on user behaviour: checking URLs, questioning step-by-step instructions, and being cautious of polished presentation.

About the Author: Tanya Chepkova
Tanya Chepkova
  • 129 Articles
About the Author: Tanya Chepkova
Tanya Chepkova is a News Editor at Finance Magnates with more than 16 years of experience in financial journalism, covering forex, crypto, and digital asset markets. Her work spans daily industry reporting and data-driven, long-form explainers focused on market structure, trading models, and regulatory shifts. Before joining Finance Magnates, she led the editorial team of a cryptocurrency-focused media outlet for six years. Her reporting combines analytical depth with clear storytelling, with particular attention to how structural changes in trading, stablecoin infrastructure, and emerging products such as prediction markets reshape the broader financial ecosystem. She covers global developments and provides additional insight into CIS markets. Areas of Coverage: Crypto and digital asset markets Prediction markets Stablecoins and cross-border payments Industry analysis and long-form explainers
  • 129 Articles

More from the Author

CryptoCurrency

!"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|} !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}