The post How an AI Wiz Used ChatGPT to Turn the Tables on a Scammer appeared on BitcoinEthereumNews.com. In brief A Delhi IT worker claims he used ChatGPT to build a fake payment site that captured a scammer’s location and photo during an “army transfer” fraud attempt. The Reddit post went viral after the scammer allegedly panicked and begged for mercy once confronted with his own data. Other Reddit users replicated the technique and confirmed the AI-generated code could work, underscoring how generative tools are reshaping DIY scambaiting. When a message popped up on his phone from a number claiming to be from a former college contact, a Delhi-based information technology professional was initially intrigued. The sender, posing as an Indian Administrative Service officer, claimed a friend in the paramilitary forces was being transferred and needed to liquidate high-end furniture and appliances “dirt cheap.” It was a classic “army transfer” fraud, a pervasive digital grift in India. But instead of blocking the number or falling victim to the scheme, the target claims that he decided to turn the tables using the very technology often accused of aiding cybercriminals: artificial intelligence. Scamming a scammer According to a detailed account posted on Reddit, the user, known by the handle u/RailfanHS, used OpenAI’s ChatGPT to “vibe code” a tracking website. The trap successfully harvested the scammer’s location and a photograph of his face, leading to a dramatic digital confrontation where the fraudster reportedly begged for mercy. While the identity of the Reddit user could not be independently verified, and the specific individual remains anonymous, the technical method described in the post has been scrutinized and validated by the platform’s community of developers and AI enthusiasts. The incident highlights a growing trend of “scambaiting”—vigilante justice where tech-savvy people bait fraudsters to waste their time or expose their operations—evolving with the aid of generative AI.  The encounter, which was widely publicized in… The post How an AI Wiz Used ChatGPT to Turn the Tables on a Scammer appeared on BitcoinEthereumNews.com. In brief A Delhi IT worker claims he used ChatGPT to build a fake payment site that captured a scammer’s location and photo during an “army transfer” fraud attempt. The Reddit post went viral after the scammer allegedly panicked and begged for mercy once confronted with his own data. Other Reddit users replicated the technique and confirmed the AI-generated code could work, underscoring how generative tools are reshaping DIY scambaiting. When a message popped up on his phone from a number claiming to be from a former college contact, a Delhi-based information technology professional was initially intrigued. The sender, posing as an Indian Administrative Service officer, claimed a friend in the paramilitary forces was being transferred and needed to liquidate high-end furniture and appliances “dirt cheap.” It was a classic “army transfer” fraud, a pervasive digital grift in India. But instead of blocking the number or falling victim to the scheme, the target claims that he decided to turn the tables using the very technology often accused of aiding cybercriminals: artificial intelligence. Scamming a scammer According to a detailed account posted on Reddit, the user, known by the handle u/RailfanHS, used OpenAI’s ChatGPT to “vibe code” a tracking website. The trap successfully harvested the scammer’s location and a photograph of his face, leading to a dramatic digital confrontation where the fraudster reportedly begged for mercy. While the identity of the Reddit user could not be independently verified, and the specific individual remains anonymous, the technical method described in the post has been scrutinized and validated by the platform’s community of developers and AI enthusiasts. The incident highlights a growing trend of “scambaiting”—vigilante justice where tech-savvy people bait fraudsters to waste their time or expose their operations—evolving with the aid of generative AI.  The encounter, which was widely publicized in…

How an AI Wiz Used ChatGPT to Turn the Tables on a Scammer

In brief

  • A Delhi IT worker claims he used ChatGPT to build a fake payment site that captured a scammer’s location and photo during an “army transfer” fraud attempt.
  • The Reddit post went viral after the scammer allegedly panicked and begged for mercy once confronted with his own data.
  • Other Reddit users replicated the technique and confirmed the AI-generated code could work, underscoring how generative tools are reshaping DIY scambaiting.

When a message popped up on his phone from a number claiming to be from a former college contact, a Delhi-based information technology professional was initially intrigued. The sender, posing as an Indian Administrative Service officer, claimed a friend in the paramilitary forces was being transferred and needed to liquidate high-end furniture and appliances “dirt cheap.”

It was a classic “army transfer” fraud, a pervasive digital grift in India. But instead of blocking the number or falling victim to the scheme, the target claims that he decided to turn the tables using the very technology often accused of aiding cybercriminals: artificial intelligence.

Scamming a scammer

According to a detailed account posted on Reddit, the user, known by the handle u/RailfanHS, used OpenAI’s ChatGPT to “vibe code” a tracking website. The trap successfully harvested the scammer’s location and a photograph of his face, leading to a dramatic digital confrontation where the fraudster reportedly begged for mercy.

While the identity of the Reddit user could not be independently verified, and the specific individual remains anonymous, the technical method described in the post has been scrutinized and validated by the platform’s community of developers and AI enthusiasts.

The incident highlights a growing trend of “scambaiting”—vigilante justice where tech-savvy people bait fraudsters to waste their time or expose their operations—evolving with the aid of generative AI.

The encounter, which was widely publicized in India, began with a familiar script. The scammer sent photos of goods and a QR code, demanding an upfront payment. Feigning technical difficulties with the scan, u/RailfanHS turned to ChatGPT.

He fed the AI chatbot a prompt to generate a functional webpage designed to mimic a payment portal. The code, described as an “80-line PHP webpage,” was secretly designed to capture the visitor’s GPS coordinates, IP address, and a front-camera snapshot.

The tracking mechanism relied in part on social engineering as much as a software exploit. To circumvent browser security features that typically block silent camera access, the user told the scammer he needed to upload the QR code to the link to “expedite the payment process.” When the scammer visited the site and clicked a button to upload the image, the browser prompted him to allow camera and location access—permissions he unwittingly granted in his haste to secure the funds.

Image: RailfanHS on Reddit

“Driven by greed, haste, and completely trusting the appearance of a transaction portal, he clicked the link,” u/RailfanHS wrote in the thread on the r/delhi subreddit. “I instantly received his live GPS coordinates, his IP address, and, most satisfyingly, a clear, front-camera snapshot of him sitting.”

The retaliation was swift. The IT professional sent the harvested data back to the scammer. The effect, according to the post, was immediate panic. The fraudster’s phone lines flooded the user with calls, followed by messages pleading for forgiveness and promising to abandon his life of crime.

“He was now pleading, insisting he would abandon this line of work entirely and desperately asking for another chance,” RailfanHS wrote. “Needless to say, he would very well be scamming someone the very next hour, but boy the satisfaction of stealing from a thief is crazy.”

Redditors verify the approach

While dramatic tales of internet justice often invite skepticism, the technical underpinnings of this sting were verified by other users in the thread. A user with the handle u/BumbleB3333 reported successfully replicating the “dummy HTML webpage” using ChatGPT. They noted that while the AI has guardrails against creating malicious code for silent surveillance, it readily generates code for legitimate-looking sites that request user permissions—which is exactly how the scammer was trapped.

“I was able to make a sort of a dummy HTML webpage with ChatGPT. It does capture geolocation when an image is uploaded after asking for permission,” u/BumbleB3333 commented, confirming the plausibility of the hack. Another user, u/STOP_DOWNVOTING, claimed to have generated an “ethical version” of the code that could be modified to function similarly.

The original poster, who identified himself in the comments as an AI product manager, acknowledged that he had to use specific prompts to bypass some of ChatGPT’s safety restrictions. “I’m sort of used to bypassing these guardrails with right prompts,” he noted, adding that he hosted the script on a virtual private server.

Cybersecurity experts caution that while such “hack-backs” are satisfying, they operate in a legal grey area and can carry risks. Still, it’s pretty tempting—and makes for a satisfying spectator sport.

Generally Intelligent Newsletter

A weekly AI journey narrated by Gen, a generative AI model.

Source: https://decrypt.co/350935/how-ai-wiz-used-chatgpt-turn-tables-scammer

Market Opportunity
Sleepless AI Logo
Sleepless AI Price(AI)
$0.03647
$0.03647$0.03647
+2.18%
USD
Sleepless AI (AI) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Wormhole launches reserve tying protocol revenue to token

Wormhole launches reserve tying protocol revenue to token

The post Wormhole launches reserve tying protocol revenue to token appeared on BitcoinEthereumNews.com. Wormhole is changing how its W token works by creating a new reserve designed to hold value for the long term. Announced on Wednesday, the Wormhole Reserve will collect onchain and offchain revenues and other value generated across the protocol and its applications (including Portal) and accumulate them into W, locking the tokens within the reserve. The reserve is part of a broader update called W 2.0. Other changes include a 4% targeted base yield for tokenholders who stake and take part in governance. While staking rewards will vary, Wormhole said active users of ecosystem apps can earn boosted yields through features like Portal Earn. The team stressed that no new tokens are being minted; rewards come from existing supply and protocol revenues, keeping the cap fixed at 10 billion. Wormhole is also overhauling its token release schedule. Instead of releasing large amounts of W at once under the old “cliff” model, the network will shift to steady, bi-weekly unlocks starting October 3, 2025. The aim is to avoid sharp periods of selling pressure and create a more predictable environment for investors. Lockups for some groups, including validators and investors, will extend an additional six months, until October 2028. Core contributor tokens remain under longer contractual time locks. Wormhole launched in 2020 as a cross-chain bridge and now connects more than 40 blockchains. The W token powers governance and staking, with a capped supply of 10 billion. By redirecting fees and revenues into the new reserve, Wormhole is betting that its token can maintain value as demand for moving assets and data between chains grows. This is a developing story. This article was generated with the assistance of AI and reviewed by editor Jeffrey Albus before publication. Get the news in your inbox. Explore Blockworks newsletters: Source: https://blockworks.co/news/wormhole-launches-reserve
Share
BitcoinEthereumNews2025/09/18 01:55
Top Altcoins To Hold Before 2026 For Maximum ROI – One Is Under $1!

Top Altcoins To Hold Before 2026 For Maximum ROI – One Is Under $1!

BlockchainFX presale surges past $7.5M at $0.024 per token with 500x ROI potential, staking rewards, and BLOCK30 bonus still live — top altcoin to hold before 2026.
Share
Blockchainreporter2025/09/18 01:16
Best Crypto to Buy as Saylor & Crypto Execs Meet in US Treasury Council

Best Crypto to Buy as Saylor & Crypto Execs Meet in US Treasury Council

The post Best Crypto to Buy as Saylor & Crypto Execs Meet in US Treasury Council appeared on BitcoinEthereumNews.com. Michael Saylor and a group of crypto executives met in Washington, D.C. yesterday to push for the Strategic Bitcoin Reserve Bill (the BITCOIN Act), which would see the U.S. acquire up to 1M $BTC over five years. With Bitcoin being positioned yet again as a cornerstone of national monetary policy, many investors are turning their eyes to projects that lean into this narrative – altcoins, meme coins, and presales that could ride on the same wave. Read on for three of the best crypto projects that seem especially well‐suited to benefit from this macro shift:  Bitcoin Hyper, Best Wallet Token, and Remittix. These projects stand out for having a strong use case and high adoption potential, especially given the push for a U.S. Bitcoin reserve.   Why the Bitcoin Reserve Bill Matters for Crypto Markets The strategic Bitcoin Reserve Bill could mark a turning point for the U.S. approach to digital assets. The proposal would see America build a long-term Bitcoin reserve by acquiring up to one million $BTC over five years. To make this happen, lawmakers are exploring creative funding methods such as revaluing old gold certificates. The plan also leans on confiscated Bitcoin already held by the government, worth an estimated $15–20B. This isn’t just a headline for policy wonks. It signals that Bitcoin is moving from the margins into the core of financial strategy. Industry figures like Michael Saylor, Senator Cynthia Lummis, and Marathon Digital’s Fred Thiel are all backing the bill. They see Bitcoin not just as an investment, but as a hedge against systemic risks. For the wider crypto market, this opens the door for projects tied to Bitcoin and the infrastructure that supports it. 1. Bitcoin Hyper ($HYPER) – Turning Bitcoin Into More Than Just Digital Gold The U.S. may soon treat Bitcoin as…
Share
BitcoinEthereumNews2025/09/18 00:27