Skip to main content
Mallory

AI-Assisted Cryptocurrency Investment Scams Targeting Japan via Malvertising and Pig-Butchering Tactics

ai-enabled-threat-activitycryptocurrency-platform-riskidentity-impersonation-fraudsearch-ad-manipulationfinancial-sector-threat
Updated March 21, 2026 at 02:23 PM2 sources
Share:
AI-Assisted Cryptocurrency Investment Scams Targeting Japan via Malvertising and Pig-Butchering Tactics

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

Threat actors are running cryptocurrency investment scams across Asia—heavily targeting Japan—that blend malvertising (paid ads on platforms such as Facebook and Instagram) with pig butchering-style long-con social engineering. Infoblox reported identifying large clusters of suspicious domains (including domains consistent with registered domain generation algorithms (RDGAs)) disproportionately queried by users in Japan; victims are funneled from fake ads impersonating financial experts or “AI-driven” trading systems to lure sites that push them into messaging apps (e.g., LINE, WhatsApp, KakaoTalk) via links or QR codes. Once in chats, victims are engaged by AI bots posing as experts/assistants, fed fabricated success stories, and nudged from small “test” deposits to larger transfers; when victims attempt withdrawals, scammers demand additional payments such as a “release fee.” Reported losses tied to this activity have reached up to ¥10 million per victim.

A related pattern shows scammers using AI chatbots as high-pressure sales agents for fake crypto offerings: Malwarebytes documented a live “Google Coin” presale site using a chatbot impersonating Google’s Gemini branding to provide tailored investment projections and steer victims toward irreversible cryptocurrency payments; Google does not have a cryptocurrency. While this “Google Coin” case is a separate scam instance from the Japan-focused malvertising/pig-butchering operation, it reinforces the same operational shift highlighted by Infoblox: automation and AI-driven conversational tooling are increasingly replacing human operators to scale persuasion, maintain consistent scam personas, and accelerate victim conversion from initial interest to payment.

Timeline

  1. Feb 17, 2026

    Researchers identify a shared, scalable fraud ecosystem spanning 23,000 domains

    Infoblox researchers reported that the campaign used a shared website framework, overlapping ad flows, and common analytics identifiers, suggesting a shared enablement layer or possible as-a-service model. They assessed the activity as expanding beyond Asia to English-, German-, and Spanish-speaking audiences, indicating a globalized and automated fraud operation.

  2. Feb 17, 2026

    Scammers demand release fees and inflict losses up to ¥10 million

    Victim reports indicate the fraud culminated in direct transfers to scammers followed by demands for additional release fees to unlock fake profits. Reported individual losses reached as high as ¥10 million, or about US$63,000.

  3. Feb 17, 2026

    Victims are funneled into messaging apps for pig-butchering chats

    After visiting lure sites, victims were directed into legitimate messaging apps including LINE, KakaoTalk, and WhatsApp through links or QR codes. There they were engaged in one-on-one and group chats that appeared automated or AI-assisted, using scripted conversations and fake success stories to build trust and drive larger deposits.

  4. Feb 17, 2026

    Malvertising campaign targets Asia, especially Japan

    Operators launched ads on platforms such as Facebook and Instagram impersonating financial experts or promoting AI-based investing to lure victims in Asia, with a strong focus on Japan. The ads redirected users to fraudulent investment-themed websites designed to start the scam flow.

  5. Jan 1, 2025

    Scam infrastructure growth begins with large-scale domain registrations

    DNS-led analysis found registration growth for the cryptocurrency scam ecosystem beginning in early 2025. Researchers ultimately linked more than 23,000 domains, including RDGA-generated and lookalike domains, to the operation.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Sources

Related Stories

Scams and Malware Abusing Google Branding to Steal Cryptocurrency

Scams and Malware Abusing Google Branding to Steal Cryptocurrency

Security researchers reported multiple campaigns abusing *Google* branding to drive crypto theft. Malwarebytes identified a polished fraudulent “presale” site promoting a fake token called **“Google Coin”** and embedding a chatbot that impersonates **Google Gemini**; the bot delivers a scripted investment pitch, cites specific token pricing and a “2026 roadmap,” and steers victims toward sending irreversible cryptocurrency payments while avoiding verifiable corporate, regulatory, or registration details. Separately, Kaspersky’s Securelist detailed **BeatBanker**, an Android malware campaign targeting Brazil that spreads via phishing to a website masquerading as the **Google Play Store** (e.g., `cupomgratisfood[.]shop`) and distributing trojanized APKs such as a fake “INSS Reembolso” app. The malware combines a **cryptominer** with a **banking Trojan** capable of device hijacking and screen overlays, including swapping destination addresses during **USDT** transactions in apps like *Binance* and *Trust Wallet*; newer samples reportedly replaced the banking module with **BTMOB RAT** while retaining the broader infection chain and persistence techniques (including looping near-inaudible audio to resist termination).

1 months ago
Chainalysis Reports Surge in Crypto Scams Driven by Impersonation and AI-Enabled Fraud

Chainalysis Reports Surge in Crypto Scams Driven by Impersonation and AI-Enabled Fraud

Chainalysis reported that **cryptocurrency scams and fraud generated an estimated $17B in victim losses in 2025**, making it the largest year on record in its tracking, with at least **$14B observed on-chain** and expectations that totals will rise as additional illicit addresses are identified. The report attributes the increase to the continued industrialization of scam operations and infrastructure, including *phishing-as-a-service*, AI-generated deepfakes, and professional money-laundering networks, alongside major scam categories such as **pig butchering/romance scams** and HYIP-style schemes. Chainalysis also assessed that scam efficiency increased materially, citing a **253% YoY rise in average scam payment** (from **$782 in 2024** to **$2,764 in 2025**) and noting that **AI-enabled scams** can be significantly more profitable than traditional approaches. A key driver highlighted was the rapid growth of **impersonation scams**, which Chainalysis said rose roughly **1,400% YoY**, with average payments to those clusters up more than **600%**. One example cited was an **E‑ZPass-themed smishing campaign** that used fake toll-payment texts and lookalike sites to deceive victims; Chainalysis linked this activity to the Chinese-speaking group **“Darcula” / “Smishing Triad,”** and referenced reporting and legal action describing tooling and templates used to scale these lures. Separately, reporting on **AI deepfake impersonation** shows similar social-engineering dynamics outside of “crypto-only” contexts, including deepfakes impersonating religious figures to solicit donations and promote fraudulent crypto-related offers, reinforcing the report’s broader finding that **AI-assisted impersonation** is increasing the reach and credibility of scams.

1 months ago
Consumer-Facing Phishing and Payment Scams Using Fake Support and Fraud Alerts

Consumer-Facing Phishing and Payment Scams Using Fake Support and Fraud Alerts

Multiple reports describe **social-engineering scams** that impersonate trusted brands and payment providers to drive victims into credential theft or direct monetary loss. A “crypto compensation” lure abuses a legitimate-looking *Yandex* poll as an entry point, then redirects victims to a fake Bitcoin payout page claiming an approved `0.943 BTC` transaction and imposes a small “commission”/fee to withdraw funds—classic advance-fee fraud wrapped in a polished, multi-step funnel (including a fake chat “support agent”). Separately, Japanese-language phishing emails impersonating **ANA**, **DHL**, and **myTOKYOGAS** show consistent infrastructure patterns (notably `.cn` domains in sender and landing-page URLs), suggesting a single operator or shared kit targeting Japanese-speaking recipients. Several consumer scam advisories highlight **SMS-based fraud alerts** that push targets to call attacker-controlled phone numbers, where scammers pose as “support” to steal **Apple ID/2FA codes** or payment details, or to coerce victims into moving money. One PayPal-themed case escalated to cash withdrawals handed to a courier after a victim called a number from an unsolicited text, illustrating how “fraud department” pretexts can transition from phishing to **cash-out theft**. Additional warnings cover lookalike payment sites (e.g., `payyourbill.aps medical.com`) and generic guidance on what to do after clicking a phishing link; these are broadly consistent with the same theme (phishing/payment fraud) but are not tied to a single, specific campaign or actor across all items.

Today

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.