AI-Powered Scams Are Here, and They're Getting Personal
A recent experiment revealed how artificial intelligence is now adept at the psychological art of the scam. A journalist received a message that felt tailor-made: it referenced his specific...

A recent experiment revealed how artificial intelligence is now adept at the psychological art of the scam. A journalist received a message that felt tailor-made: it referenced his specific interests in open-source AI and robotics, name-dropped niche projects, and proposed a collaboration. The hook was a request to connect via a Telegram bot.
This wasn't a real attack, but a demonstration using a tool from startup Charlemagne Labs. The tool pits AI models against each other, one as an attacker crafting a social engineering scheme, another as the target. The initial message, and the persuasive follow-ups, were entirely generated by the open-source model DeepSeek-V3. The exchange was unnervingly plausible.
In tests, models from Anthropic, OpenAI, Nvidia, and others were tasked with inventing cons. Results varied. Some produced clumsy or nonsensical pitches, while others refused on ethical grounds. But the most convincing performances highlighted a clear risk: AI can now automate the creation of highly personalized, scalable phishing campaigns.
Jeremy Philip Galen, a Charlemagne Labs co-founder and former Meta security manager, notes that human error initiates most enterprise breaches. "If these models are really good at reasoning and writing, then they’re probably really good at social engineering," he says. Their tendency to be agreeable—a trait researchers call sycophancy—makes them natural manipulators.
Security expert Rachel Tobac observes that AI already helps scammers research targets and generate content, automating the entire attack pipeline. The defensive argument, however, hinges on the same technology. Charlemagne Labs uses open-source models to train its defensive AI. Co-founder Richard Whaling suggests that a robust open-source ecosystem may be essential for building effective digital defenses, creating a complex technological arms race where the tools for attack and defense are born from the same source.
Source: Wired
Ready to Modernize Your Business?
Get your AI automation roadmap in minutes, not months.
Analyze Your Workflows →