{"id":39348,"date":"2025-08-30T07:00:00","date_gmt":"2025-08-30T04:00:00","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=39348"},"modified":"2025-08-30T09:07:21","modified_gmt":"2025-08-30T06:07:21","slug":"fake-on-chain-sleuths-prey-on-hack-victims-an-ai-journalist-dupes-the-press-and-other-cybersecurity-stories","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/fake-on-chain-sleuths-prey-on-hack-victims-an-ai-journalist-dupes-the-press-and-other-cybersecurity-stories\/","title":{"rendered":"Fake on-chain sleuths prey on hack victims, an AI \u2018journalist\u2019 dupes the press, and other cybersecurity stories"},"content":{"rendered":"<p>We have collected the most important cybersecurity news of the week.<\/p>\n<div class=\"wp-block-text-wrappers-keypoints article_keypoints\">\n<ul class=\"wp-block-list\">\n<li>Fake on-chain sleuths steal remaining funds from victims of crypto theft.<\/li>\n<li>The media fell for an AI \u201cjournalist\u201d.<\/li>\n<li>Meta is suspected of accessing photo galleries without user consent.<\/li>\n<li>Researchers hid a trojan in an AI image.<\/li>\n<\/ul>\n<\/div>\n<h2 class=\"wp-block-heading\">Fake on-chain sleuths are stealing what remains from crypto-hack victims<\/h2>\n<p>In August the FBI <a href=\"https:\/\/www.ic3.gov\/PSA\/2025\/PSA250813\">warned<\/a> of fraudsters posing as bogus crypto law firms. Under the guise of sham asset-recovery services, the scammers stole money and personal data from clients.<\/p>\n<p>According to the statement, the primary targets are victims of crypto hacks trying to reclaim stolen funds.<\/p>\n<p>Law enforcement said the fraudsters used a wide array of manipulative tactics, playing on victims\u2019 desperation and creating a false sense of security by impersonating government representatives or claiming cooperation with them. The reputations of people and organisations whose names were misused were also harmed.<\/p>\n<p>When choosing help to recover cryptocurrency, the FBI advised watching for:<\/p>\n<ul class=\"wp-block-list\">\n<li>references to fictitious government or regulatory bodies, such as the nonexistent International Financial Trading Commission (INTFTC);<\/li>\n<li>requests for payment in cryptocurrency or gift cards;<\/li>\n<li>knowledge of exact amounts and dates of previous bank transfers;<\/li>\n<li>claims that the victim is supposedly on a list of people scammed and can get their money back through \u201clegitimate channels\u201d;<\/li>\n<li>referrals to a \u201ccryptocurrency recovery law firm\u201d;<\/li>\n<li>assertions that funds are in a foreign bank and demands to open an account there. The domain or site may look legitimate but in fact be a fake platform to extend the scam;<\/li>\n<li>invitations to a group chat in a messenger app allegedly \u201cfor client secrecy and safety\u201d with \u201cforeign bank operators and lawyers\u201d. They may demand fees to verify identity and ownership;<\/li>\n<li>refusal or inability to provide identification or a licence, refusal to turn on a camera or hold a video meeting;<\/li>\n<li>demands to send payment to a third party supposedly for secrecy and safety.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\">An AI \u201cjournalist\u201d duped the media<\/h2>\n<p><a href=\"https:\/\/pressgazette.co.uk\/publishers\/digital-journalism\/wired-and-business-insider-remove-ai-written-freelance-articles\/\">Press Gazette<\/a> noted that at least six outlets, including Wired and Business Insider, have in recent months removed articles from their sites. The reason, it reported, was that pieces published under the name Margot Blanchard were generated by AI.<\/p>\n<p>In May Wired ran a story titled \u201cThey fell in love playing Minecraft. Then the game became their wedding venue.\u201d It mentioned Jessica Hu, a 34-year-old clergywoman from Chicago known as a \u201cdigital officiant\u201d on Twitch and Discord. The outlet could not verify her existence and, weeks later, removed the piece for failing to meet editorial standards.<\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"401\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/AI_journalist-1024x401.png\" alt=\"AI_journalist\" class=\"wp-image-264763\" srcset=\"https:\/\/forklog.com\/wp-content\/uploads\/AI_journalist-1024x401.png 1024w, https:\/\/forklog.com\/wp-content\/uploads\/AI_journalist-300x117.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/AI_journalist-768x301.png 768w, https:\/\/forklog.com\/wp-content\/uploads\/AI_journalist-1536x601.png 1536w, https:\/\/forklog.com\/wp-content\/uploads\/AI_journalist.png 1665w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">A removed piece by a certain Margot Blanchard at Wired. Source: <a href=\"https:\/\/web.archive.org\/web\/20250507234854\/https:\/\/www.wired.com\/story\/they-fell-in-love-playing-minecraft-then-the-game-became-their-wedding-venue\/\">Wayback Machine<\/a>.<\/figcaption><\/figure>\n<p>According to Press Gazette, in April Business Insider published two Blanchard essays. Last week the outlet deleted them.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/Press_Gazette.webp\" alt=\"Press_Gazette\" class=\"wp-image-264764\"\/><figcaption class=\"wp-element-caption\">Reports on the removal of Business Insider and Wired pieces. Source: <a href=\"https:\/\/pressgazette.co.uk\/publishers\/digital-journalism\/wired-and-business-insider-remove-ai-written-freelance-articles\/\">Press Gazette<\/a>.\u00a0<\/figcaption><\/figure>\n<p>On 21 August Wired\u2019s leadership <a href=\"https:\/\/www.wired.com\/story\/how-wired-got-rolled-by-an-ai-freelancer\/\">acknowledged the error<\/a>:<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>\u201cIf any publication should recognize AI grifters, it\u2019s Wired. And in fact we usually do\u2026 Unfortunately, one slipped through.\u201d<\/em><\/p>\n<\/blockquote>\n<p>The outlet explained that on 7 April an editor received a pitch from one Margot Blanchard about \u201cthe growing popularity of hyper-niche internet weddings\u201d. The email bore \u201call the hallmarks of a great Wired story\u201d. After a standard exchange about scope and fee, the editor commissioned the piece, which ran on 7 May.<\/p>\n<p>Wired said that within days the newsroom realised the author could not provide sufficient information about herself. The journalist insisted on payment via PayPal or cheque.<\/p>\n<p>Further investigation showed the story was fabricated.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>\u201cWe made mistakes: the story did not undergo proper fact-checking and was not edited by a senior editor[&#8230;] We acted quickly when we discovered the deception and took steps to prevent a recurrence. In the new era every newsroom must be prepared for this.\u201d<\/em><\/p>\n<\/blockquote>\n<p>Press Gazette said the first to flag irregularities was Dispatch editor Jacob Furedi. He reported receiving a pitch from Blanchard about \u201cGravemont, a closed mining town in rural Colorado that had been repurposed into one of the most secretive death-investigation training centres.\u201d He asked the supposed freelancer to show records requests; she ignored the request.<\/p>\n<h2 class=\"wp-block-heading\">Meta is suspected of accessing galleries without user consent<\/h2>\n<p>Meta analyses and stores photos from devices. According to <a href=\"https:\/\/www.zdnet.com\/article\/meta-might-be-secretly-scanning-your-phones-camera-roll-how-to-check-and-turn-it-off\/\">ZDNET<\/a>, some Facebook users found two enabled options in Meta app settings that give the company access to the gallery. The feature is intended to use AI to offer \u201cpersonalised creative ideas\u201d such as travel montages and collages.<\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"621\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/ZDNET_Meta_spy-1024x621.png\" alt=\"ZDNET_Meta_spy\" class=\"wp-image-264765\" srcset=\"https:\/\/forklog.com\/wp-content\/uploads\/ZDNET_Meta_spy-1024x621.png 1024w, https:\/\/forklog.com\/wp-content\/uploads\/ZDNET_Meta_spy-300x182.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/ZDNET_Meta_spy-768x466.png 768w, https:\/\/forklog.com\/wp-content\/uploads\/ZDNET_Meta_spy.png 1048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Settings that help avoid tracking. Source: ZDNET.<\/figcaption><\/figure>\n<p>Media reported that the options for AI features called \u201csuggestions to use photos from the gallery\u201d are enabled for users who say they did not consent.<\/p>\n<p>If a user taps \u201callow\u201d, they agree to Meta\u2019s AI terms and to analysis of \u201cmedia and facial features\u201d. Facebook then uses images from the gallery (including creation dates and the presence of people or objects) to suggest collages, themed albums, recap posts or AI-modified versions of images.<\/p>\n<h2 class=\"wp-block-heading\">Researchers hid a trojan in an AI image<\/h2>\n<p>Researchers at Trail of Bits <a href=\"https:\/\/blog.trailofbits.com\/2025\/08\/21\/weaponizing-image-scaling-against-production-ai-systems\/\">developed<\/a> a new attack to steal user data. The method embeds malicious commands in images that are processed by AI systems before being passed to a large language model.<\/p>\n<p>The idea is to use full-size images with \u201cinvisible\u201d instructions that emerge when quality is reduced by resizing algorithms. When uploaded to AI systems, such images are automatically downscaled to improve performance and save resources.<\/p>\n<p>Depending on the system, image-resizing algorithms may lighten the image using nearest-neighbour, bilinear or bicubic interpolation.<\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"477\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/Trail_of_Bits_AI_paint_ghost-1024x477.png\" alt=\"Trail_of_Bits_AI_paint_ghost\" class=\"wp-image-264766\" srcset=\"https:\/\/forklog.com\/wp-content\/uploads\/Trail_of_Bits_AI_paint_ghost-1024x477.png 1024w, https:\/\/forklog.com\/wp-content\/uploads\/Trail_of_Bits_AI_paint_ghost-300x140.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/Trail_of_Bits_AI_paint_ghost-768x358.png 768w, https:\/\/forklog.com\/wp-content\/uploads\/Trail_of_Bits_AI_paint_ghost.png 1477w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Bicubic interpolation hides the AI trojan. Source: Trail of Bits.<\/figcaption><\/figure>\n<p>In Trail of Bits\u2019 example, when downscaled bicubically the dark areas of the malicious image turn red and hidden text appears in black.<\/p>\n<p>From the user\u2019s perspective nothing unusual happens, but in fact the model executes hidden instructions that can lead to data leakage or other risky actions.<\/p>\n<p>The researchers confirmed their method applies to:<\/p>\n<ul class=\"wp-block-list\">\n<li>Google Gemini CLI;<\/li>\n<li>Vertex AI Studio (with Gemini backend);<\/li>\n<li>the Gemini web interface;<\/li>\n<li>the Gemini API via llm CLI;<\/li>\n<li>Google Assistant on an Android phone;<\/li>\n<li>Genspark.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\">Google will ban software from unverified developers<\/h2>\n<p>On 25 August Google <a href=\"https:\/\/android-developers.googleblog.com\/2025\/08\/elevating-android-security.html\">announced<\/a> it will soon stop allowing software from unverified developers in Google Play. A new Android protection system will block the installation of malicious apps when downloading from third-party sources.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>\u201cWhile the threat is more associated with third-party sources, the developer verification requirement now applies to apps from Google Play as well as apps in third-party stores,\u201d<\/em> the team added.<\/p>\n<\/blockquote>\n<p>Early access to verification opens in October, and in March 2026 the system will become available to all Android developers. In September the mandatory identity verification requirement will take effect for Brazil, Indonesia, Singapore and Thailand, and in 2027 worldwide.<\/p>\n<p>Also on ForkLog:<\/p>\n<ul class=\"wp-block-list\">\n<li>ZachXBT <a href=\"https:\/\/forklog.com\/en\/news\/zachxbt-labels-ripple-cardano-and-hedera-as-insider-enrichment-schemes\">called<\/a> Ripple, Cardano and Hedera \u201cinsiders\u2019 enrichment schemes\u201d.<\/li>\n<li>US banks <a href=\"https:\/\/forklog.com\/en\/news\/us-banks-surpass-crypto-in-money-laundering-volume\">outpaced<\/a> the crypto industry by the volume of laundered funds.<\/li>\n<li>The number of traders on Solana <a href=\"https:\/\/forklog.com\/en\/news\/solana-traders-plummet-by-80-amid-rising-rug-pulls\">fell<\/a> by 80% amid a rise in rug pulls.<\/li>\n<li>Scammers <a href=\"https:\/\/forklog.com\/en\/news\/fraudsters-exploit-claude-for-vibe-hacking\">used<\/a> Claude for vibe hacking.<\/li>\n<li>112 crypto companies <a href=\"https:\/\/forklog.com\/en\/news\/112-crypto-firms-urge-us-senate-to-protect-developers\">urged<\/a> the US Senate to protect developers.<\/li>\n<li>A fake trader from Odesa <a href=\"https:\/\/forklog.com\/en\/news\/fake-trader-from-odessa-swindles-acquaintances-out-of-1-million\">stole<\/a> $1m from acquaintances.<\/li>\n<li>CertiK\u2019s founder <a href=\"https:\/\/forklog.com\/en\/news\/certik-founder-describes-battle-with-hackers-as-endless\">called<\/a> the war with hackers \u201cendless\u201d.<\/li>\n<li>In Ufa, authorities <a href=\"https:\/\/forklog.com\/en\/news\/illegal-crypto-cash-out-scheme-worth-3-billion-rubles-halted-in-ufa\">shut down<\/a> an illegal crypto cash-out scheme worth 3bn rubles.<\/li>\n<li>Pavel Durov <a href=\"https:\/\/forklog.com\/en\/news\/pavel-durov-calls-his-arrest-in-france-a-legal-absurdity\">called<\/a> his arrest in France \u201ca legal absurdity\u201d.<\/li>\n<li>A South Korean <a href=\"https:\/\/forklog.com\/en\/news\/south-korean-accused-of-laundering-50-million-by-converting-bitcoin-to-gold\">was charged<\/a> with laundering $50m by converting bitcoin into gold.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\">What to read this weekend?<\/h2>\n<p>Why trading platforms block accounts, how a \u201cclean\u201d transaction can still lead to frozen funds, and how deeply <span data-descr=\"anti-money laundering\" class=\"old_tooltip\">AML<\/span> systems trace transfer chains? In a guest piece for ForkLog, Fedor Ivanov\u2014director of analytics at the company \u201cShard\u201d\u2014explains.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We have collected the most important cybersecurity news of the week.<\/p>\n","protected":false},"author":1,"featured_media":39349,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"The week\u2019s key cybersecurity stories.","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1238,1233],"class_list":["post-39348","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-cybersecurity-digest","tag-industry-digests"],"aioseo_notices":[],"amp_enabled":true,"views":"238","promo_type":"1","layout_type":"1","short_excerpt":"The week\u2019s key cybersecurity stories.","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/39348","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=39348"}],"version-history":[{"count":1,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/39348\/revisions"}],"predecessor-version":[{"id":39350,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/39348\/revisions\/39350"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/39349"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=39348"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=39348"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=39348"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}