Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Banners, Bots and Butchers: The AI-Driven Long Con in Asia

0
Medium
Published: Thu Feb 19 2026 (02/19/2026, 15:26:29 UTC)
Source: AlienVault OTX General

Description

This threat describes a sophisticated hybrid cryptocurrency investment scam campaign primarily targeting users in Asia, especially Japan. It leverages malvertising via social media ads impersonating financial experts to lure victims to fraudulent websites. The campaign then uses AI-powered chatbots on messaging apps to engage victims in prolonged conversations, manipulating them into making increasingly large investments, a tactic known as pig butchering. The operation employs over 23,000 algorithmically generated domains to scale and evade detection. This automated approach transforms traditional labor-intensive scams into highly efficient, scalable fraud operations. While currently focused on Asia, there are signs of global expansion. No known exploits or CVEs are associated, and the campaign's severity is assessed as medium. Defenders should focus on detecting and blocking malicious domains, educating users on social engineering tactics, and monitoring for suspicious investment solicitations.

AI-Powered Analysis

AILast updated: 02/19/2026, 18:01:24 UTC

Technical Analysis

The campaign titled "Banners, Bots and Butchers: The AI-Driven Long Con in Asia" represents an evolution in cryptocurrency investment scams by combining malvertising and AI-driven social engineering. Initially, victims are targeted through social media advertisements that impersonate credible financial experts, enticing users to visit lure websites. These websites serve as gateways to messaging platforms where AI-powered chatbots engage victims in sustained conversations, employing pig butchering tactics—gradually building trust and coaxing victims into making progressively larger cryptocurrency investments. The campaign's infrastructure includes over 23,000 domains, many generated algorithmically, enabling rapid domain rotation to evade detection and takedown efforts. This automation reduces the need for human operators, increasing scalability and operational efficiency. The campaign is currently concentrated in Asia, particularly Japan, but indicators suggest expansion beyond this region. The threat does not exploit software vulnerabilities but relies on social engineering and deception. No known exploits or CVEs are linked to this campaign. The use of AI chatbots for long-term engagement marks a significant shift in investment fraud methodology, potentially increasing victim losses and complicating detection.

Potential Impact

Organizations and individuals face significant financial losses due to this scam, especially those involved or interested in cryptocurrency investments. The campaign's use of AI chatbots for prolonged engagement increases the likelihood of victims investing large sums over time. Financial institutions and cryptocurrency exchanges may experience indirect impacts such as increased fraud-related inquiries, chargebacks, and reputational damage. The large-scale domain generation complicates detection and blocking efforts, potentially allowing the scam to reach a broad audience. The psychological manipulation involved can lead to long-term trust erosion in legitimate financial services and platforms. Additionally, the campaign's expansion beyond Asia could expose global markets to similar risks. Regulatory bodies may face challenges in tracking and prosecuting perpetrators due to the automated and distributed nature of the infrastructure. Overall, the threat undermines trust in cryptocurrency markets and digital financial services.

Mitigation Recommendations

1. Implement advanced domain and URL filtering solutions that incorporate threat intelligence feeds to block access to known malicious and algorithmically generated domains associated with this campaign. 2. Deploy AI and machine learning-based detection systems to identify anomalous chatbot behaviors and suspicious messaging patterns on communication platforms. 3. Conduct targeted user awareness campaigns focusing on the risks of cryptocurrency investment scams, emphasizing the identification of impersonation and social engineering tactics. 4. Collaborate with social media platforms to identify and remove malvertising campaigns and fake profiles impersonating financial experts. 5. Encourage financial institutions and cryptocurrency exchanges to monitor for unusual transaction patterns indicative of scam-related activities and to provide clear reporting channels for suspected fraud. 6. Utilize multi-factor authentication and transaction verification processes to reduce the risk of unauthorized or coerced investments. 7. Establish rapid takedown procedures for newly identified malicious domains to disrupt the campaign's infrastructure. 8. Monitor messaging app ecosystems for AI chatbot abuse and work with providers to implement stricter controls on automated accounts. 9. Share threat intelligence across regional and international cybersecurity communities to enhance detection and response capabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.infoblox.com/blog/threat-intelligence/banners-bots-and-butchers-an-automated-long-con-targeting-japan-asia-and-beyond"]
Adversary
null
Pulse Id
69972ba50be84a620b567652
Threat Score
null

Indicators of Compromise

Domain

ValueDescriptionCopy
domain7973268.top
domain8jz2x.icu
domainaopmbxeqax.click
domainbtedsrr.icu
domainfgynfgi.buzz
domainfhysgth.sbs
domainghmfg.sbs
domaingnlaoprs.click
domaingooglenames.top
domainhrdfsetsdf.sbs
domainkoaliuehudrt.sbs
domainkpusnenvcg.buzz
domainlgsmjhsb.buzz
domainoiajdng.click
domainoslddjb.buzz
domainr2th4.icu
domainsafesecurea.sbs
domainstock-analysis06.buzz
domainttrvsgg.icu
domainttrvsii.icu
domainttrvsrr.icu
domainvbmuakf.click
domainxhlch.top
domainxqeha.icu
domainydfshans.click
domainyhdakgjd.top
domainyoutubefind.com
domainyoutubefind.top

Threat ID: 69974c64d7880ec89b0185a0

Added to database: 2/19/2026, 5:46:12 PM

Last enriched: 2/19/2026, 6:01:24 PM

Last updated: 2/20/2026, 1:19:59 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats