{"id":5718,"date":"2026-01-19T18:04:52","date_gmt":"2026-01-19T11:04:52","guid":{"rendered":"https:\/\/chongluadao.vn\/blog\/?p=5718"},"modified":"2026-01-23T00:47:15","modified_gmt":"2026-01-22T17:47:15","slug":"lua-dao-truc-tuyen-2025-2026","status":"publish","type":"post","link":"https:\/\/chongluadao.vn\/blog\/en\/2026\/01\/lua-dao-truc-tuyen-2025-2026\/","title":{"rendered":"Online fraud 2025-2026: As cybercriminals evolve thanks to AI."},"content":{"rendered":"<p>If 2025 was marked by large-scale data breaches and refined traditional scams, then 2026 is the year cybercriminals truly enter the era of AI. From simple impersonation via text messages and emails, we now face &quot;virtual characters&quot; that can talk, appear in videos, and even guide victims through complex scams across multiple platforms.<\/p>\n\n\n\n<p>It&#039;s clear that the fight against online fraud is shifting from &quot;detecting fake technology&quot; to &quot;identifying unusual behavior and processes.&quot; Let&#039;s explore this further. <a href=\"http:\/\/chongluadao.vn\/blog\/en\/\">Anti-Phishing<\/a> Learn about the shifts in online fraud trends in 2025-2026.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The online scam landscape in 2025<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Data leaks: A goldmine for cybercriminals.<\/h3>\n\n\n\n<p>2025 saw a series of serious data breaches in Vietnam and Southeast Asia. Personal information from banks, e-commerce platforms, delivery apps, and even government agencies was stolen on an unprecedented scale.<\/p>\n\n\n\n<p><strong>Why is this dangerous?<\/strong><\/p>\n\n\n\n<p>Leaked data isn&#039;t just lists of names and phone numbers. It includes transaction history, consumer habits, family relationships, and even biometric data. Criminals use this information to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Create a detailed profile.<\/strong> regarding each potential victim<\/li>\n\n\n\n<li><strong>Create personalized scam scenarios.<\/strong> based on actual circumstances<\/li>\n\n\n\n<li><strong>Increase the success rate.<\/strong> because the victim believed that &quot;they knew me too well.&quot;\u201c<\/li>\n<\/ul>\n\n\n\n<p>A typical example: criminals know you&#039;ve just made a purchase on an e-commerce platform, they call you impersonating a delivery driver with the same order information, and ask you to &quot;verify&quot; it via a fake link.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Offensive but effective technique<\/h3>\n\n\n\n<p>In 2025, common scam techniques will still revolve around:<\/p>\n\n\n<style>.wp-block-kadence-iconlist.kt-svg-icon-list-items5718_220c28-27:not(.this-stops-third-party-issues){margin-top:0px;margin-bottom:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5718_220c28-27 ul.kt-svg-icon-list:not(.this-prevents-issues):not(.this-stops-third-party-issues):not(.tijsloc){margin-top:0px;margin-right:0px;margin-bottom:var(--global-kb-spacing-sm, 1.5rem);margin-left:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5718_220c28-27 ul.kt-svg-icon-list{grid-row-gap:5px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5718_220c28-27 ul.kt-svg-icon-list .kt-svg-icon-list-item-wrap .kt-svg-icon-list-single{margin-right:10px;}.kt-svg-icon-list-items5718_220c28-27 ul.kt-svg-icon-list .kt-svg-icon-list-level-0 .kt-svg-icon-list-single svg{font-size:20px;}<\/style>\n<div class=\"wp-block-kadence-iconlist kt-svg-icon-list-items kt-svg-icon-list-items5718_220c28-27 kt-svg-icon-list-columns-1 alignnone\"><ul class=\"kt-svg-icon-list\"><style>.kt-svg-icon-list-item-5718_008f47-61 .kt-svg-icon-list-single{color:#ff0000 !important;}.kt-svg-icon-list-item-5718_008f47-61 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#ff0000;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5718_008f47-61\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_alertTriangle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M10.29 3.86L1.82 18a2 2 0 0 0 1.71 3h16.94a2 2 0 0 0 1.71-3L13.71 3.86a2 2 0 0 0-3.42 0z\"\/><line x1=\"12\" y1=\"9\" x2=\"12\" y2=\"13\"\/><line x1=\"12\" y1=\"17\" x2=\"12\" y2=\"17\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><mark true=\"true\" class=\"kt-highlight\">Ransomware and Malware:<\/mark><\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5718_e8652e-7c .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5718_e8652e-7c kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRight kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><line x1=\"5\" y1=\"12\" x2=\"19\" y2=\"12\"\/><polyline points=\"12 5 19 12 12 19\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Attacks targeting small and medium-sized businesses lacking security systems.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5718_dded91-88 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5718_dded91-88 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRight kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><line x1=\"5\" y1=\"12\" x2=\"19\" y2=\"12\"\/><polyline points=\"12 5 19 12 12 19\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Encrypting data and demanding ransom in cryptocurrency.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5718_6a5c01-59 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5718_6a5c01-59 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRight kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><line x1=\"5\" y1=\"12\" x2=\"19\" y2=\"12\"\/><polyline points=\"12 5 19 12 12 19\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Exploiting employees working remotely with poorly secured personal devices.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5718_5bafcb-cb .kt-svg-icon-list-single{color:#ff0000 !important;}.kt-svg-icon-list-item-5718_5bafcb-cb .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#ff0000;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5718_5bafcb-cb\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_alertTriangle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M10.29 3.86L1.82 18a2 2 0 0 0 1.71 3h16.94a2 2 0 0 0 1.71-3L13.71 3.86a2 2 0 0 0-3.42 0z\"\/><line x1=\"12\" y1=\"9\" x2=\"12\" y2=\"13\"\/><line x1=\"12\" y1=\"17\" x2=\"12\" y2=\"17\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><mark true=\"true\" class=\"kt-highlight\">Phishing\/Smishing via Email and SMS<\/mark><\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5718_4039b7-2f .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5718_4039b7-2f kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRight kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><line x1=\"5\" y1=\"12\" x2=\"19\" y2=\"12\"\/><polyline points=\"12 5 19 12 12 19\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Falsifying notices from banks, tax authorities, and power companies.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5718_de4e3c-03 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5718_de4e3c-03 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRight kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><line x1=\"5\" y1=\"12\" x2=\"19\" y2=\"12\"\/><polyline points=\"12 5 19 12 12 19\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Create a sense of urgency: \u201cYour account will be locked in 24 hours\u201d<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5718_b688e7-bc .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5718_b688e7-bc kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRight kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><line x1=\"5\" y1=\"12\" x2=\"19\" y2=\"12\"\/><polyline points=\"12 5 19 12 12 19\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Links to fake websites are almost indistinguishable from the real ones.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5718_74b71d-da .kt-svg-icon-list-single{color:#ff0000 !important;}.kt-svg-icon-list-item-5718_74b71d-da .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#ff0000;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5718_74b71d-da\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_alertTriangle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M10.29 3.86L1.82 18a2 2 0 0 0 1.71 3h16.94a2 2 0 0 0 1.71-3L13.71 3.86a2 2 0 0 0-3.42 0z\"\/><line x1=\"12\" y1=\"9\" x2=\"12\" y2=\"13\"\/><line x1=\"12\" y1=\"17\" x2=\"12\" y2=\"17\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><mark true=\"true\" class=\"kt-highlight\">Investment fraud and <a href=\"https:\/\/en.wikipedia.org\/wiki\/Ponzi_scheme\" target=\"_blank\" rel=\"noreferrer noopener\">Ponzi scheme<\/a> online<\/mark><\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5718_0ff23f-f7 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5718_0ff23f-f7 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRight kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><line x1=\"5\" y1=\"12\" x2=\"19\" y2=\"12\"\/><polyline points=\"12 5 19 12 12 19\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Promising high returns and low risk.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5718_f48a18-66 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5718_f48a18-66 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRight kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><line x1=\"5\" y1=\"12\" x2=\"19\" y2=\"12\"\/><polyline points=\"12 5 19 12 12 19\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Using images of celebrities or fake &quot;financial experts&quot;<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5718_ff0ffb-62 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5718_ff0ffb-62 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRight kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><line x1=\"5\" y1=\"12\" x2=\"19\" y2=\"12\"\/><polyline points=\"12 5 19 12 12 19\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Create a closed community group to generate a bandwagon effect.<\/span><\/li>\n<\/ul><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Scam Center: An industrial-scale fraudulent manufacturing facility.<\/h3>\n\n\n\n<p>A worrying phenomenon is the rise of &quot;scam centers&quot;\u2014large-scale organized fraud centers that operate like legitimate businesses with:<\/p>\n\n\n<style>.wp-block-kadence-iconlist.kt-svg-icon-list-items5718_ce65d3-40:not(.this-stops-third-party-issues){margin-top:0px;margin-bottom:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5718_ce65d3-40 ul.kt-svg-icon-list:not(.this-prevents-issues):not(.this-stops-third-party-issues):not(.tijsloc){margin-top:0px;margin-right:0px;margin-bottom:var(--global-kb-spacing-sm, 1.5rem);margin-left:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5718_ce65d3-40 ul.kt-svg-icon-list{grid-row-gap:5px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5718_ce65d3-40 ul.kt-svg-icon-list .kt-svg-icon-list-item-wrap .kt-svg-icon-list-single{margin-right:10px;}.kt-svg-icon-list-items5718_ce65d3-40 ul.kt-svg-icon-list .kt-svg-icon-list-level-0 .kt-svg-icon-list-single svg{font-size:20px;}<\/style>\n<div class=\"wp-block-kadence-iconlist kt-svg-icon-list-items kt-svg-icon-list-items5718_ce65d3-40 kt-svg-icon-list-columns-1 alignnone\"><ul class=\"kt-svg-icon-list\"><style>.kt-svg-icon-list-item-5718_f305e3-83 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5718_f305e3-83 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_chevronsRight kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><polyline points=\"13 17 18 12 13 7\"\/><polyline points=\"6 17 11 12 6 7\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Clearly defined roles: scriptwriter, caller, money launderer.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5718_917407-c5 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5718_917407-c5 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_chevronsRight kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><polyline points=\"13 17 18 12 13 7\"\/><polyline points=\"6 17 11 12 6 7\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Modern facilities in border areas that are difficult to control.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5718_62b155-c9 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5718_62b155-c9 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_chevronsRight kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><polyline points=\"13 17 18 12 13 7\"\/><polyline points=\"6 17 11 12 6 7\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Cross-border scams targeting victims in multiple countries.<\/span><\/li>\n<\/ul><\/div>\n\n\n\n<p>These scam centers focus particularly on romance scams, financial investment scams, and impersonating government officials.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">2026: When AI becomes an &quot;ally&quot; of powerful criminals.<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">The invasion of Deepfake and Voice Clone<\/h3>\n\n\n\n<p>Deepfake and voice cloning technologies have advanced to the point where they can create nearly perfect fake videos and voices at low cost and in a short amount of time. With just a few seconds of original audio or video (easily obtained from social media), criminals can:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Create a fake video call from a relative, colleague, or boss.<\/li>\n\n\n\n<li>Voice recording of CEO instructing accountant to transfer funds urgently.<\/li>\n\n\n\n<li>Impersonating bank officials or police officers via video call to increase credibility.<\/li>\n<\/ul>\n\n\n\n<p><strong>Here&#039;s why this trick is dangerous:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>People tend to believe what they see with their own eyes.<\/li>\n\n\n\n<li>Time pressure caused the victim to skip verification steps.<\/li>\n\n\n\n<li>Technology is developing faster than the average user can comprehend it.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Multi-channel attack: A scam scenario that surrounds the victim.<\/h3>\n\n\n\n<p>2026 marks a shift from single-channel phishing to multi-channel phishing \u2013 a coordinated campaign across multiple platforms:<\/p>\n\n\n\n<p><strong>Here&#039;s an example of a complete scenario:<\/strong><\/p>\n\n\n<style>.wp-block-kadence-iconlist.kt-svg-icon-list-items5718_34974c-2a:not(.this-stops-third-party-issues){margin-top:0px;margin-bottom:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5718_34974c-2a ul.kt-svg-icon-list:not(.this-prevents-issues):not(.this-stops-third-party-issues):not(.tijsloc){margin-top:0px;margin-right:0px;margin-bottom:var(--global-kb-spacing-sm, 1.5rem);margin-left:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5718_34974c-2a ul.kt-svg-icon-list{grid-row-gap:5px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5718_34974c-2a ul.kt-svg-icon-list .kt-svg-icon-list-item-wrap .kt-svg-icon-list-single{margin-right:10px;}.kt-svg-icon-list-items5718_34974c-2a ul.kt-svg-icon-list .kt-svg-icon-list-level-0 .kt-svg-icon-list-single svg{font-size:20px;}<\/style>\n<div class=\"wp-block-kadence-iconlist kt-svg-icon-list-items kt-svg-icon-list-items5718_34974c-2a kt-svg-icon-list-columns-1 alignnone\"><ul class=\"kt-svg-icon-list\"><style>.kt-svg-icon-list-item-5718_ce0e15-6c .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5718_ce0e15-6c kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"\/><polyline points=\"12 16 16 12 12 8\"\/><line x1=\"8\" y1=\"12\" x2=\"16\" y2=\"12\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong>Phase 1 \u2013 SMS outreach:<\/strong> The victim received a text message from the &quot;bank&quot; about an unusual transaction.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5718_7de60a-f9 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5718_7de60a-f9 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"\/><polyline points=\"12 16 16 12 12 8\"\/><line x1=\"8\" y1=\"12\" x2=\"16\" y2=\"12\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong>Phase 2 \u2013 Applying pressure via email:<\/strong> Confirmation email with logo and correct formatting.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5718_8288f4-fa .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5718_8288f4-fa kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"\/><polyline points=\"12 16 16 12 12 8\"\/><line x1=\"8\" y1=\"12\" x2=\"16\" y2=\"12\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong>Phase 3 \u2013 AI Chatbot on Facebook:<\/strong> The bot automatically answers questions on &quot;how to protect your account&quot;.\u201c<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5718_47f448-b6 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5718_47f448-b6 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"\/><polyline points=\"12 16 16 12 12 8\"\/><line x1=\"8\" y1=\"12\" x2=\"16\" y2=\"12\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong>Phase 4 \u2013 Fake Video Call:<\/strong> \u201c&quot;Bank employee&quot; makes video call to confirm, requests OTP.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5718_6d7cac-ad .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5718_6d7cac-ad kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"\/><polyline points=\"12 16 16 12 12 8\"\/><line x1=\"8\" y1=\"12\" x2=\"16\" y2=\"12\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong>Phase 5 \u2013 Telegram\/Zalo for \u201cemergency support\u201d:<\/strong> Guide the victim through the final steps.<\/span><\/li>\n<\/ul><\/div>\n\n\n\n<p>Each channel reinforces the credibility of the others, creating a closed &quot;scam ecosystem.&quot;.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"2752\" height=\"1536\" src=\"https:\/\/chongluadao.vn\/blog\/wp-content\/uploads\/2026\/01\/unnamed-77.png\" alt=\"Quy tr\u00ecnh l\u1eeba \u0111\u1ea3o \u0111a k\u00eanh\" class=\"wp-image-5725\" style=\"aspect-ratio:1.7917013831028161;width:703px;height:auto\"\/><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\">AI optimizes the attack lifecycle.<\/h3>\n\n\n\n<p>Currently, cybercriminals are using AI to scale up scams from &quot;manual&quot; to &quot;industrial.&quot; AI chatbots have been exploited to become &quot;sleepless scam consultants&quot; capable of:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Automated responses 24\/7 with a high degree of naturalness.<\/li>\n\n\n\n<li>Learn from the conversation to adjust your tactics.<\/li>\n\n\n\n<li>It is possible to handle thousands of victims simultaneously.<\/li>\n\n\n\n<li>Pretend to sympathize, create an emotional connection with the victim.<\/li>\n<\/ul>\n\n\n\n<p>Beyond simply reaching victims, AI is also used to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Scanning and analyzing millions of social media profiles to find potential victims.<\/li>\n\n\n\n<li>Write automated code to create fake websites in minutes.<\/li>\n\n\n\n<li>Optimize attack timing based on the victim&#039;s online behavior.<\/li>\n\n\n\n<li>Personalize content: Write &quot;bait&quot; that perfectly matches the psychology and circumstances of each target audience based on collected data.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Why has &quot;identity&quot; become the number one weakness?<\/h3>\n\n\n\n<p>By 2026, mobile devices will become the biggest risk surface as they contain the entirety of personal identification (e-KYC), e-wallets, and digital banking. As video and voice verification are no longer reliable enough, identity verification becomes a major challenge.<\/p>\n\n\n\n<p>For businesses, data protection is no longer an option but a matter of survival. The pressure to comply with legal regulations has increased dramatically, as even a single data breach can lead to a wave of mass fraud and a severe reputational crisis.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The shift in online fraud<\/h2>\n\n\n\n<p>If 2025 was the period of accumulating &quot;fuel&quot; from data, then 2026 is the time when cybercriminals will activate their automated attack machinery on a large scale. Below is a detailed analysis of this shift:<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table><thead><tr><td><strong>Aspects\/Arrays<\/strong><\/td><td><strong>Key features of 2025<\/strong><\/td><td><strong>Shift\/Escalation in 2026<\/strong><\/td><td><strong>Related technologies<\/strong><\/td><td><strong>Level of risk (Inference)<\/strong><\/td><\/tr><\/thead><tbody><tr><td><strong>Scams targeting individual users.<\/strong><\/td><td>The number of victims has decreased, but the economic damage is significant. Scenarios impersonating banks, government agencies, delivery drivers, and investment firms are becoming common.<\/td><td>Scams are being &quot;AI-ized.&quot; Deepfakes, voice clones, and virtual characters are being used to create more convincing impersonations through fake videos, impersonating officials, or posing as relatives.<\/td><td>Deepfake, Voice clone, Virtual character<\/td><td>The price is very high due to its sophisticated psychological manipulation capabilities, making it difficult for the average user to distinguish between genuine and fake products.<\/td><\/tr><tr><td><strong>Attack surface<\/strong><\/td><td>Mobile and web are the primary platforms for individual and organizational users.<\/td><td>Mobile has become the biggest risk surface due to its connection with banking activities, digital identity, customer service, and e-wallets.<\/td><td>Mobile Banking, Digital Identity Verification (E-KYC), E-wallet<\/td><td>The price is very high because mobile phones contain all of an individual&#039;s most sensitive information.<\/td><\/tr><tr><td><strong>Malware \/ Ransomware<\/strong><\/td><td>Data theft for blackmail is a major trend in the context of rapid digitalization.<\/td><td>AI is being used to optimize the attack lifecycle: from reconnaissance and malware writing to automated exploitation, making detection more difficult.<\/td><td>Ransomware, AI-assisted malware decryption.<\/td><td>Extremely serious for businesses and critical infrastructure due to the rapid pace of the attack.<\/td><\/tr><tr><td><strong>The &quot;luring&quot; technique\u201c<\/strong><\/td><td>They primarily use familiar scam scenarios, carried out via single-channel or dual-channel methods.<\/td><td>Multi-channel attacks are becoming the norm: luring victims from SMS\/social media to chat apps and fake payment sites. AI-powered conversations operate 24\/7.<\/td><td>Multi-channel, AI chatbot<\/td><td>High because it creates a closed ecosystem of scams, trapping victims on multiple platforms simultaneously.<\/td><\/tr><tr><td><strong>\u201cThe scam industry<\/strong><\/td><td>Fraud centers are highly active in Southeast Asia, linked to scams, money laundering, and transnational organized crime.<\/td><td>As the pattern of crime continues to expand into more areas, the pressure from fraud is unlikely to decrease in the short term.<\/td><td>Transnational criminal networks, digital money laundering systems.<\/td><td>High prices create regional cybersecurity instability and pose significant challenges to law enforcement.<\/td><\/tr><tr><td><strong>Personal data &amp; leaks<\/strong><\/td><td>Data continues to fuel scams. It is bought, sold, and exploited to target more precise attacks.<\/td><td>Criminals are exploiting the &quot;data\/identity update&quot; theme to commit fraud through impersonation as legal frameworks begin to tighten.<\/td><td>Data mining, Social engineering<\/td><td>Moderate to high, posing a direct threat to individual privacy and financial security.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Protective Shield: 6 Golden Rules Against Scams<\/h2>\n\n\n\n<p>To combat the sophistication of AI-driven crime, follow these principles:<\/p>\n\n\n<style>.wp-block-kadence-iconlist.kt-svg-icon-list-items5718_339b67-21:not(.this-stops-third-party-issues){margin-top:0px;margin-bottom:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5718_339b67-21 ul.kt-svg-icon-list:not(.this-prevents-issues):not(.this-stops-third-party-issues):not(.tijsloc){margin-top:0px;margin-right:0px;margin-bottom:var(--global-kb-spacing-sm, 1.5rem);margin-left:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5718_339b67-21 ul.kt-svg-icon-list{grid-row-gap:5px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5718_339b67-21 ul.kt-svg-icon-list .kt-svg-icon-list-item-wrap .kt-svg-icon-list-single{margin-right:10px;}.kt-svg-icon-list-items5718_339b67-21 ul.kt-svg-icon-list .kt-svg-icon-list-level-0 .kt-svg-icon-list-single svg{font-size:20px;}<\/style>\n<div class=\"wp-block-kadence-iconlist kt-svg-icon-list-items kt-svg-icon-list-items5718_339b67-21 kt-svg-icon-list-columns-1 alignnone kt-list-icon-aligntop\"><ul class=\"kt-svg-icon-list\"><style>.kt-svg-icon-list-item-5718_2a3667-f7 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5718_2a3667-f7 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_checkCircle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M22 11.08V12a10 10 0 1 1-5.93-9.14\"\/><polyline points=\"22 4 12 14.01 9 11.01\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong>Be wary of images\/voices:<\/strong> Always turn off your phone and call back the registered number to verify when a money transfer request is made.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5718_d1f342-06 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5718_d1f342-06 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_checkCircle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M22 11.08V12a10 10 0 1 1-5.93-9.14\"\/><polyline points=\"22 4 12 14.01 9 11.01\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong>Blocking multi-channel lure paths:<\/strong> Do not click on unfamiliar links; type the website name yourself or use the official app.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5718_7641b1-05 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5718_7641b1-05 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_checkCircle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M22 11.08V12a10 10 0 1 1-5.93-9.14\"\/><polyline points=\"22 4 12 14.01 9 11.01\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong>Verify before transferring money:<\/strong> Always cross-check through multiple communication channels before executing a transaction.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5718_629093-a9 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5718_629093-a9 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_checkCircle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M22 11.08V12a10 10 0 1 1-5.93-9.14\"\/><polyline points=\"22 4 12 14.01 9 11.01\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong>Protect your mobile device:<\/strong> Treat your phone like a wallet; update your operating system regularly and avoid installing apps from unknown sources.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5718_637c70-3a .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5718_637c70-3a kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_checkCircle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M22 11.08V12a10 10 0 1 1-5.93-9.14\"\/><polyline points=\"22 4 12 14.01 9 11.01\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong>Managing personal data:<\/strong> Limit sharing sensitive information (identification documents, airline tickets) on social media; use two-factor authentication (2FA).<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5718_5a9fa1-91 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5718_5a9fa1-91 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_checkCircle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M22 11.08V12a10 10 0 1 1-5.93-9.14\"\/><polyline points=\"22 4 12 14.01 9 11.01\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong>Stop \u2013 Save \u2013 Report Procedure:<\/strong> If you have any doubts, stop interacting with the bank, save the evidence, and report it immediately to the bank or authorities.<\/span><\/li>\n<\/ul><\/div>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1536\" height=\"2694\" src=\"https:\/\/chongluadao.vn\/blog\/wp-content\/uploads\/2026\/01\/z7428119468169_04e9b89dfe66062356ea8f00aaa84cf6.jpg\" alt=\"6 nguy\u00ean t\u1eafc ch\u1ed1ng l\u1eeba \u0111\u1ea3o tr\u1ef1c tuy\u1ebfn infographic\" class=\"wp-image-5721\" style=\"width:483px;height:auto\"\/><\/figure>\n<\/div>\n\n\n<p>In the age of AI, vigilance lies not only in verifying information but also in adhering to rigorous authentication procedures. Don&#039;t let emotions override your safety.<\/p>","protected":false},"excerpt":{"rendered":"<p>Online fraud is facing a major shift: If 2025 was the year of data-driven attacks, then 2026 will be the year of comprehensive AI and multi-modal attacks. [...]<span class=\"screen-reader-text\"> From Online Fraud 2025-2026: As Cybercrime Evolves Thanks to AI<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":5758,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[7,10],"tags":[],"class_list":["post-5718","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-canh-bao-pho-bien","category-chieu-tro-lua-dao-pho-bien"],"_links":{"self":[{"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/posts\/5718","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/comments?post=5718"}],"version-history":[{"count":4,"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/posts\/5718\/revisions"}],"predecessor-version":[{"id":5726,"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/posts\/5718\/revisions\/5726"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/media\/5758"}],"wp:attachment":[{"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/media?parent=5718"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/categories?post=5718"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/tags?post=5718"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}