The post How an AI Wiz Used ChatGPT to Turn the Tables on a Scammer appeared on BitcoinEthereumNews.com. In brief A Delhi IT worker claims he used ChatGPT to build a fake payment site that captured a scammer’s location and photo during an “army transfer” fraud attempt. The Reddit post went viral after the scammer allegedly panicked and begged for mercy once confronted with his own data. Other Reddit users replicated the technique and confirmed the AI-generated code could work, underscoring how generative tools are reshaping DIY scambaiting. When a message popped up on his phone from a number claiming to be from a former college contact, a Delhi-based information technology professional was initially intrigued. The sender, posing as an Indian Administrative Service officer, claimed a friend in the paramilitary forces was being transferred and needed to liquidate high-end furniture and appliances “dirt cheap.” It was a classic “army transfer” fraud, a pervasive digital grift in India. But instead of blocking the number or falling victim to the scheme, the target claims that he decided to turn the tables using the very technology often accused of aiding cybercriminals: artificial intelligence. Scamming a scammer According to a detailed account posted on Reddit, the user, known by the handle u/RailfanHS, used OpenAI’s ChatGPT to “vibe code” a tracking website. The trap successfully harvested the scammer’s location and a photograph of his face, leading to a dramatic digital confrontation where the fraudster reportedly begged for mercy. While the identity of the Reddit user could not be independently verified, and the specific individual remains anonymous, the technical method described in the post has been scrutinized and validated by the platform’s community of developers and AI enthusiasts. The incident highlights a growing trend of “scambaiting”—vigilante justice where tech-savvy people bait fraudsters to waste their time or expose their operations—evolving with the aid of generative AI.  The encounter, which was widely publicized in… The post How an AI Wiz Used ChatGPT to Turn the Tables on a Scammer appeared on BitcoinEthereumNews.com. In brief A Delhi IT worker claims he used ChatGPT to build a fake payment site that captured a scammer’s location and photo during an “army transfer” fraud attempt. The Reddit post went viral after the scammer allegedly panicked and begged for mercy once confronted with his own data. Other Reddit users replicated the technique and confirmed the AI-generated code could work, underscoring how generative tools are reshaping DIY scambaiting. When a message popped up on his phone from a number claiming to be from a former college contact, a Delhi-based information technology professional was initially intrigued. The sender, posing as an Indian Administrative Service officer, claimed a friend in the paramilitary forces was being transferred and needed to liquidate high-end furniture and appliances “dirt cheap.” It was a classic “army transfer” fraud, a pervasive digital grift in India. But instead of blocking the number or falling victim to the scheme, the target claims that he decided to turn the tables using the very technology often accused of aiding cybercriminals: artificial intelligence. Scamming a scammer According to a detailed account posted on Reddit, the user, known by the handle u/RailfanHS, used OpenAI’s ChatGPT to “vibe code” a tracking website. The trap successfully harvested the scammer’s location and a photograph of his face, leading to a dramatic digital confrontation where the fraudster reportedly begged for mercy. While the identity of the Reddit user could not be independently verified, and the specific individual remains anonymous, the technical method described in the post has been scrutinized and validated by the platform’s community of developers and AI enthusiasts. The incident highlights a growing trend of “scambaiting”—vigilante justice where tech-savvy people bait fraudsters to waste their time or expose their operations—evolving with the aid of generative AI.  The encounter, which was widely publicized in…

How an AI Wiz Used ChatGPT to Turn the Tables on a Scammer

2025/12/05 08:27

In brief

  • A Delhi IT worker claims he used ChatGPT to build a fake payment site that captured a scammer’s location and photo during an “army transfer” fraud attempt.
  • The Reddit post went viral after the scammer allegedly panicked and begged for mercy once confronted with his own data.
  • Other Reddit users replicated the technique and confirmed the AI-generated code could work, underscoring how generative tools are reshaping DIY scambaiting.

When a message popped up on his phone from a number claiming to be from a former college contact, a Delhi-based information technology professional was initially intrigued. The sender, posing as an Indian Administrative Service officer, claimed a friend in the paramilitary forces was being transferred and needed to liquidate high-end furniture and appliances “dirt cheap.”

It was a classic “army transfer” fraud, a pervasive digital grift in India. But instead of blocking the number or falling victim to the scheme, the target claims that he decided to turn the tables using the very technology often accused of aiding cybercriminals: artificial intelligence.

Scamming a scammer

According to a detailed account posted on Reddit, the user, known by the handle u/RailfanHS, used OpenAI’s ChatGPT to “vibe code” a tracking website. The trap successfully harvested the scammer’s location and a photograph of his face, leading to a dramatic digital confrontation where the fraudster reportedly begged for mercy.

While the identity of the Reddit user could not be independently verified, and the specific individual remains anonymous, the technical method described in the post has been scrutinized and validated by the platform’s community of developers and AI enthusiasts.

The incident highlights a growing trend of “scambaiting”—vigilante justice where tech-savvy people bait fraudsters to waste their time or expose their operations—evolving with the aid of generative AI.

The encounter, which was widely publicized in India, began with a familiar script. The scammer sent photos of goods and a QR code, demanding an upfront payment. Feigning technical difficulties with the scan, u/RailfanHS turned to ChatGPT.

He fed the AI chatbot a prompt to generate a functional webpage designed to mimic a payment portal. The code, described as an “80-line PHP webpage,” was secretly designed to capture the visitor’s GPS coordinates, IP address, and a front-camera snapshot.

The tracking mechanism relied in part on social engineering as much as a software exploit. To circumvent browser security features that typically block silent camera access, the user told the scammer he needed to upload the QR code to the link to “expedite the payment process.” When the scammer visited the site and clicked a button to upload the image, the browser prompted him to allow camera and location access—permissions he unwittingly granted in his haste to secure the funds.

Image: RailfanHS on Reddit

“Driven by greed, haste, and completely trusting the appearance of a transaction portal, he clicked the link,” u/RailfanHS wrote in the thread on the r/delhi subreddit. “I instantly received his live GPS coordinates, his IP address, and, most satisfyingly, a clear, front-camera snapshot of him sitting.”

The retaliation was swift. The IT professional sent the harvested data back to the scammer. The effect, according to the post, was immediate panic. The fraudster’s phone lines flooded the user with calls, followed by messages pleading for forgiveness and promising to abandon his life of crime.

“He was now pleading, insisting he would abandon this line of work entirely and desperately asking for another chance,” RailfanHS wrote. “Needless to say, he would very well be scamming someone the very next hour, but boy the satisfaction of stealing from a thief is crazy.”

Redditors verify the approach

While dramatic tales of internet justice often invite skepticism, the technical underpinnings of this sting were verified by other users in the thread. A user with the handle u/BumbleB3333 reported successfully replicating the “dummy HTML webpage” using ChatGPT. They noted that while the AI has guardrails against creating malicious code for silent surveillance, it readily generates code for legitimate-looking sites that request user permissions—which is exactly how the scammer was trapped.

“I was able to make a sort of a dummy HTML webpage with ChatGPT. It does capture geolocation when an image is uploaded after asking for permission,” u/BumbleB3333 commented, confirming the plausibility of the hack. Another user, u/STOP_DOWNVOTING, claimed to have generated an “ethical version” of the code that could be modified to function similarly.

The original poster, who identified himself in the comments as an AI product manager, acknowledged that he had to use specific prompts to bypass some of ChatGPT’s safety restrictions. “I’m sort of used to bypassing these guardrails with right prompts,” he noted, adding that he hosted the script on a virtual private server.

Cybersecurity experts caution that while such “hack-backs” are satisfying, they operate in a legal grey area and can carry risks. Still, it’s pretty tempting—and makes for a satisfying spectator sport.

Generally Intelligent Newsletter

A weekly AI journey narrated by Gen, a generative AI model.

Source: https://decrypt.co/350935/how-ai-wiz-used-chatgpt-turn-tables-scammer

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

US Dollar Index (DXY) hovers near multi-week low ahead of US PCE data

US Dollar Index (DXY) hovers near multi-week low ahead of US PCE data

The post US Dollar Index (DXY) hovers near multi-week low ahead of US PCE data appeared on BitcoinEthereumNews.com. The US Dollar Index (DXY), which tracks the Greenback against a basket of currencies, struggles to capitalize on the overnight bounce from its lowest level since late October and trades with a mild negative bias during the Asian session on Friday. The index is currently placed around the 99.00 mark, down less than 0.10% for the day, as traders now await the crucial US inflation data before placing fresh directional bets. The September US Personal Consumption Expenditure (PCE) Price Index will be published later today and will be scrutinized for more cues about the Federal Reserve’s (Fed) future rate-cut path. This, in turn, will play a key role in determining the next leg of a directional move for the Greenback. In the meantime, dovish US Federal Reserve (Fed) expectations overshadow Thursday’s upbeat US labor market reports and continue to act as a headwind for the buck. Recent comments from several Fed officials suggested that another interest rate cut in December is all but certain. The CME Group’s FedWatch Tool indicates an over 85% probability of a move next week. Furthermore, reports suggest that White House National Economic Council Director Kevin Hassett is seen as the frontrunner to become the next Fed Chair and is expected to enact US President Donald Trump’s calls for lower rates, which, in turn, favors the USD bears. Nevertheless, the DXY remains on track to register losses for the second straight week, and the fundamental backdrop suggests that the path of least resistance for the index remains to the downside. Hence, any attempted recovery is more likely to get sold into and remain limited. US Dollar Price Last 7 Days The table below shows the percentage change of US Dollar (USD) against listed major currencies last 7 days. US Dollar was the strongest against the Swiss…
Share
BitcoinEthereumNews2025/12/05 13:43
SSP Stock Surges 11% On FY25 Earnings And European Rail Review

SSP Stock Surges 11% On FY25 Earnings And European Rail Review

The post SSP Stock Surges 11% On FY25 Earnings And European Rail Review appeared on BitcoinEthereumNews.com. SSP Group stock rebounded strongly today. (Photo Illustration by Pavlo Gonchar/SOPA Images/LightRocket via Getty Images) SOPA Images/LightRocket via Getty Images Shares in travel food retailer SSP Group rose sharply today after the company posted solid FY25 results, highlighting good growth in two of its four regional divisions, and a decision to review its under‑performing Continental European rail business. The food and beverage (F&B) company’s stock closed 11.3% up in London on the back of a revenue rise of 7.8% (at constant currency) to £3.6 billion ($4.8 billion) in the 12 months to September. Operating profit jumped by 12.7% to £223 million ($298 million). Under statutory IFRS reporting, however, operating profit fell 58% to £86 million, which SSP said in a statement “reflected £183 million of non‑underlying expenses and impairment charges.” The decision to review its rail business in Continental Europe—the biggest of the F&B giant’s four divisions by revenue at £1,205 million ($1,607 million)—was welcomed by the market, given its weak performance of 2% like-for-like (LFL) growth. A carrot was also dangled— a reward to shareholders arising from the July IPO of SSP’s Indian joint venture Travel Food Services (TFS) with K Hospitality, India’s largest privately held F&B company. SSP Group CEO Patrick Coveney said in a statement: “We acknowledge there is more to do to strengthen our operational performance, most notably in Continental Europe, where we have now reset our team, model, and balance sheet, and have a range of initiatives underway. In addition, we are launching a wide-ranging review of our rail business in Continental Europe. We are also considering options to realise value for our shareholders in line with the delivery of the TFS free float requirement.” SSP currently retains a 50.01% stake in TFS and said: “We believe that India’s market potential, combined with TFS’s attractive…
Share
BitcoinEthereumNews2025/12/05 13:37
‘Love Island Games’ Season 2 Release Schedule—When Do New Episodes Come Out?

‘Love Island Games’ Season 2 Release Schedule—When Do New Episodes Come Out?

The post ‘Love Island Games’ Season 2 Release Schedule—When Do New Episodes Come Out? appeared on BitcoinEthereumNews.com. LOVE ISLAND GAMES — Episode 201 — Pictured: Ariana Madix — (Photo by: Ben Symons/PEACOCK via Getty Images) Ben Symons/PEACOCK via Getty Images We’ve got a text! It’s time for another season of Love Island Games. With fan-favorites returning in hopes of winning the $250,000 cash prize, read on to learn more about Love Island Games Season 2, including the release schedule so you don’t miss a second of drama. Love Island Games is a spinoff in the Love Island franchise that first premiered in 2023. The show follows a similar format to the original series, but with one major twist: all contestants are returning Islanders from previous seasons of Love Island from around the world, including the USA, UK, Australia and more. Another big difference is that games take on much more importance in Love Island Games than the mothership version, with the results “determining advantages, risks, and even who stays and who goes,” according to Peacock. Vanderpump Rules star Ariana Madix is taking over hosting duties for Love Island Games Season 2, replacing Love Island UK star Maya Jama who hosted the first season. Iain Stirling returns as the show’s narrator, while UK alum Maura Higgins will continue to host the Saturday show Love Island: Aftersun. ForbesWho’s In The ‘Love Island Games’ Season 2 Cast? Meet The IslandersBy Monica Mercuri Jack Fowler and Justine Ndiba were named the first-ever winners of Love Island Games in 2023. Justine had previously won Love Island USA Season 2 with Caleb Corprew, while Jack was a contestant on Love Island UK Season 4. In March 2024, Fowler announced on his Instagram story that he and Justine decided to remain “just friends.” The Season 2 premiere revealed the first couples of the season: Andrea Carmona and Charlie Georgios, Andreina Santos-Marte and Tyrique Hyde,…
Share
BitcoinEthereumNews2025/09/18 04:50