{"id":13063,"date":"2026-03-19T07:55:13","date_gmt":"2026-03-19T14:55:13","guid":{"rendered":"https:\/\/www.infoblox.com\/blog\/?p=13063"},"modified":"2026-03-19T13:01:23","modified_gmt":"2026-03-19T20:01:23","slug":"inside-keitaro-abuse-a-persistent-stream-of-ai-driven-investment-scams","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-keitaro-abuse-a-persistent-stream-of-ai-driven-investment-scams\/","title":{"rendered":"Inside Keitaro Abuse: A Persistent Stream of AI-Driven Investment Scams"},"content":{"rendered":"<p><strong>Authors: Infoblox Threat Intel and Confiant<\/strong><\/p>\n<h3>Executive Summary<\/h3>\n<p>Cloaking\u2014the act and art of hiding a website\u2019s true nature\u2014is a critical component of cybercriminal operations today. Threat actors use domain cloaking, implemented through traffic distribution systems (TDSs) and cloaking kits, to evade content restrictions in advertising, for precision targeting of victims for malware and scams, and to protect themselves from each other. Some actors develop their own TDS or purchase access to wholly criminal operations like BlackTDS, 404TDS, and ParrotTDS. But many avail themselves of commercially available software. After all, cybercrime is like any other economy: Why build when you can use highly sophisticated products developed by others?<\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/keitaro-ai-campaign-image.png\" alt=\"Keitaro traffic filters for AI-driven campaigns\" \/><\/p>\n<p>Keitaro Tracker, sometimes referred to as Keitaro TDS, is an advertising performance tracking platform that has been frequently observed in malicious campaigns and abused by threat actors, though it certainly isn\u2019t the only commercial tracker used in this way. It has <a href=\"https:\/\/www.techtarget.com\/searchsecurity\/feature\/Why-the-Keitaro-TDS-keeps-causing-security-headaches\" target=\"_blank\" rel=\"noopener\">gained attention across the security community<\/a> because of its adoption by some of the most notorious criminal actors over the last decade. In the past few years, it has been a signature of <a href=\"https:\/\/www.proofpoint.com\/us\/blog\/threat-insight\/update-fake-updates-two-new-actors-and-new-mac-malware\" target=\"_blank\" rel=\"noopener\"><strong>TA2726, who uses Keitaro<\/strong><\/a> to deliver traffic to SocGholish (TA569) for their fake browser update campaigns. Website visitors who do not meet the targeting requirements for SocGholish are dumped out to other affiliate advertising platforms or fed decoy pages. Beyond TA2726, Keitaro has been reported in security literature dozens of times, most recently in <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/26\/b\/spam-campaign-abuses-atlassian-jira.html\" target=\"_blank\" rel=\"noopener\">spam campaigns using Jira<\/a> to target government entities.<\/p>\n<p>While it is \u201cwell known\u201d that Keitaro is abused by threat actors, there has never been a longitudinal study to understand the nature of this abuse. Infoblox and Confiant collaborated over the last six months to understand how threat actors use the tracker based on our complementary views of the environment. Confiant can see across the advertising chain, while Infoblox focuses on how threats appear in DNS, using spam and website content to inform our understanding of the landscape. We discovered early on that the Keitaro instances we observed in attacks showed little overlap, making a combined story not just more compelling, but vast.<\/p>\n<p>We examined four months of data starting October 1, 2025, to determine how much of that use was malicious. During this time, we detected thousands of instances of malicious Keitaro cloaking content ranging from investment scams to information stealers. Traffic to the instances was driven from compromised websites, spam, social media, and advertising. The level and persistence of abuse is quite staggering. Keitaro is a feature-rich, self-hosted tracker that can be spun up in a few minutes on multiple hosting platforms, likely making it attractive to use. We found approximately 15,500 domains actively used for malicious Keitaro instances during this time, with about 9,000 of those registered before their use. These were used in advertising campaigns seen by Confiant, but also included in spam emails, embedded in compromised websites, and linked through other traffic sources.<\/p>\n<p>Investment scams dominated the threats we saw. A recent trend in this type of scam is the use of AI as a central marketing hook: pages routinely claim &#8220;advanced AI&#8221; or &#8220;AI\u2011driven algorithms&#8221; that automate trading and promise outsized returns. Several actors also incorporate deepfake imagery or video to boost perceived credibility. We additionally observed indicators of programmatic use of generative AI to mass\u2011produce headlines, copy, and visuals that are deployed as lure pages and ad creatives.<\/p>\n<p>Aside from domain cloaking, Keitaro\u2019s conditional routing based on device characteristics allows operators to create complex traffic flows. We analyzed thousands of attack instances to characterize the flows used in these types of scams. Figure 1 summarizes the most common flows from geo + user agent cohorts to the languages used by the landing page. We can see that in these attacks, regardless of visitor location and device type, the final lure is shown in a limited number of languages, predominantly Russian and English. This might indicate targeting by the attacker or limited capabilities on their part. While many of the campaigns are global, there are notable threat actors, particularly ones observed by Confiant in the advertising ecosystem that specifically target the United States.<\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/keitaro-ai-campaign-figure-1.png\" alt=\"Keitaro traffic filters for AI-driven campaigns\" \/><\/p>\n<p class=\"image-caption\">Figure 1. Keitaro traffic filters for AI-driven campaigns<\/p>\n<p>We also set out to determine how responsive Apliteni, the company that developed and sells Keitaro Tracker, was to abuse reporting. After all, Keitaro has been used by bad actors over such a long period of time, it begged the question of whether the company turned a blind eye to abuse: were they a bulletproof tracker, so to speak? Since August 2025, we have reported over a hundred domains. The company responded quickly and thoroughly to each of our requests. As a result, over a dozen threat actors\u2019 accounts were canceled. The Keitaro <a href=\"https:\/\/web.archive.org\/web\/20251211001713\/https:\/keitaro.io\/terms-of-service-us\" target=\"_blank\" rel=\"noopener\"><strong>Tracker licensing terms<\/strong><\/a> prohibit, among other things, \u201cmisleading\u201d content. This allows the company to terminate an instance using a tracker for malicious cloaking purposes. In many cases, the domains we observed were not valid licenses. Through multiple exchanges based on the activity we saw and the customer information the Keitaro team held, we verified that TA2726 and other malware actors were using illicit copies of the tracker.<\/p>\n<p>While we took a deep dive into Keitaro Tracker, this multi-part publication is intended to highlight the depth and breadth of cloaking in the threat landscape. Other commercial trackers, like Binom, are also highly abused and this research is not intended to implicate Keitaro more than these others. Indeed, our collaboration with Keitaro led to new discoveries that would not have been possible otherwise. Hyrhorii, head of Trust and Safety, told us regarding this reporting, &#8220;<em>At Keitaro, we are dedicated to maintaining a professional and secure environment for legitimate marketing. Our strategy is built on both reactive and proactive measures: while we promptly act on external abuse reports, we also invest heavily in internal monitoring to identify and neutralize malicious patterns before they can impact the ecosystem. The fact that actors &#8216;stay down&#8217; after our intervention confirms that our approach is working. We value our collaboration with Infoblox, as proactive synergy between software vendors and cybersecurity experts is the only way to effectively protect industry reputation and user safety.<\/em>&#8221;<\/p>\n<p>This is the first of three blogs sharing the results of this study. The use of AI in illicit activity is growing, and campaigns fueled by Keitaro abuse are no different. In this blog we will report on the subset of threat actors who have leveraged AI in their campaigns, most of which were investment scams. The next blog will provide a survey of the many other subsets of actors both teams found. The final blog will dive into how cybercriminals have weaponized the features and functionalities of Keitaro\u2019s software for nefarious purposes, and discuss our collaboration with the vendor on abuse.<\/p>\n<p>While we are using real-world examples to tell the story\u2014this is not just another blog about AI or investment scams. The key takeaway here is that threat actors are using domain cloaking to drive an endless torrent of malicious content to users of all types, in all corners of the globe, and that Keitaro is one tool they commonly choose in these campaigns. While Apliteni can, and has, responded to abuse reporting, the sheer volume and diversity of the threats, not to mention the ingenuity and license theft, makes these technologies a persistent, underreported challenge for defenders.<\/p>\n<p>Confiant secures the digital advertising supply chain and protects many major advertising exchanges, platforms, and publishers. Their visibility of close to 90 billion ad impressions a month on publisher sites is derived from thousands of client-side integrations that block malvertising attacks. This product suite also collects telemetry on threat activity seen in the wild and serves to complement the view Infoblox Threat Intel has via DNS, spam, and website scans.<\/p>\n<h3>Investment Scams and AI<\/h3>\n<p>The largest category of threats we have identified abusing Keitaro services is investment scams. While both Infoblox and Confiant found this type of fraud to dominate our detections, the threat actors we see are different due to our visibility and focus. In a previously published <a href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/uncovering-actor-ttp-patterns-and-the-role-of-dns-in-investment-scams\/\"><strong>blog<\/strong><\/a>, Infoblox highlighted the recurring tactics, techniques, and procedures (TTPs) that define these operations, and those patterns remain consistent:<\/p>\n<ul class=\"list-spacing\">\n<li>Registering large numbers of domains algorithmically over time, a technique we refer to as registered domain generation algorithms (RDGAs)<\/li>\n<li>Reusing nearly identical web forms to capture user information<\/li>\n<li>Deploying kits that produce uniform website structures<\/li>\n<li>Relying on fabricated news articles or endorsements to appear legitimate<\/li>\n<\/ul>\n<p>We will start by sharing some of the unnamed actors that Infoblox tracks in this space, many of whom leverage social media, especially Facebook Ads, to lure victims. Whereas we\u2019ve seen AI used to generate pages for years, fraudsters are now incorporating AI as an advantage in using their fake trading platform. Figure 2 shows the different templates used by an actor we track that runs these types of investment scam campaigns.<\/p>\n<div class=\"grid-container\">\n<div class=\"grid-item\"><img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/keitaro-ai-campaign-figure-2a.png\" alt=\"Figure 2a\" \/><\/div>\n<div class=\"grid-item\"><img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/keitaro-ai-campaign-figure-2b.png\" alt=\"Figure 2b\" \/><\/div>\n<\/div>\n<div class=\"grid-container\">\n<div class=\"grid-item\"><img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/keitaro-ai-campaign-figure-2c.png\" alt=\"Figure 2c\" \/><\/div>\n<div class=\"grid-item\"><img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/keitaro-ai-campaign-figure-2d.png\" alt=\"Figure 2d\" \/><\/div>\n<\/div>\n<p class=\"image-caption\">Figure 2. Investment scam landing pages featuring AI\u2011powered trading platforms, sharing a similar structure and a common embedded web form used to collect victim details. Image credit: urlscan.io<\/p>\n<p>The second threat actor also runs an AI\u2011themed investment scam, but its website template design favors a more minimalistic style with a white background (Figure 3). Despite the shift in style, the underlying pattern remains the same: promoting AI\u2011powered trading as a lure to draw victims into an investment scam. It promises market\u2011beating, low\u2011risk automated returns and pads the pitch with meaningless buzzwords, like \u201cblockchain.\u201d A web form collects visitor contact details. With these <a href=\"https:\/\/www.investor.gov\/introduction-investing\/general-resources\/news-alerts\/alerts-bulletins\/investor-alerts\/artificial-intelligence-fraud\" target=\"_blank\" rel=\"noopener\"><strong>kinds of scams<\/strong><\/a>, the threat actor typically impersonates an &#8220;account manager&#8221; and bombards victims with phone calls to secure an initial investment. Based on observed language distribution, the actor appears to primarily target English- and German-speaking audiences, with additional targeting of Japanese, Italian, Dutch, French, Spanish, and Portuguese speakers.<\/p>\n<div class=\"grid-container\">\n<div class=\"grid-item\"><img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/keitaro-ai-campaign-figure-3a.png\" alt=\"Figure 3a\" \/><\/div>\n<div class=\"grid-item\"><img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/keitaro-ai-campaign-figure-3b.png\" alt=\"Figure 3b\" \/><\/div>\n<\/div>\n<div class=\"grid-container\">\n<div class=\"grid-item\"><img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/keitaro-ai-campaign-figure-3c.png\" alt=\"Figure 3c\" \/><\/div>\n<div class=\"grid-item\"><img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/keitaro-ai-campaign-figure-3d.png\" alt=\"Figure 3d\" \/><\/div>\n<\/div>\n<p class=\"image-caption\">Figure 3. Investment scam landing pages linked to a separate threat actor that were observed promoting AI\u2011powered trading platforms and near\u2011five\u2011star reviews. Image credit: urlscan.io<\/p>\n<p>The next threat actor appears to rely on AI\u2011themed fake news articles to promote their investment scheme. Rather than fabricating celebrity endorsements, these pages present AI itself as the trusted authority, framing it as a transformative technology that enables effortless, expert\u2011level trading for everyday users. Across versions of the site presented in multiple languages, the content consistently pairs AI\u2011related imagery with narratives claiming that AI simplifies complex financial decisions (Figure 4), illustrating how the actor adapts the same core message for different audiences. The actor also uses RDGA domains such as those in Table 1 for their campaigns.<\/p>\n<div class=\"grid-container\">\n<div class=\"grid-item\"><img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/keitaro-ai-campaign-figure-4a.png\" alt=\"Figure 4a\" \/><\/div>\n<div class=\"grid-item\"><img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/keitaro-ai-campaign-figure-4b.png\" alt=\"Figure 4b\" \/><\/div>\n<\/div>\n<div class=\"grid-container\">\n<div class=\"grid-item\"><img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/keitaro-ai-campaign-figure-4c.png\" alt=\"Figure 4c\" \/><\/div>\n<div class=\"grid-item\"><img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/keitaro-ai-campaign-figure-4d.png\" alt=\"Figure 4d\" \/><\/div>\n<\/div>\n<p class=\"image-caption\">Figure 4. AI\u2011themed fake news pages used by an unnamed threat actor to promote investment scams by positioning AI as a trusted authority across multiple languages. Image credit: urlscan.io<\/p>\n<table>\n<thead>\n<tr>\n<th>Lumitex + AI or + X suffix<\/th>\n<th>ATT prefix\/suffix<\/th>\n<th>Other<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>lumitexaihub[.]com<br \/>\nlumitexaicloud[.]com<br \/>\nlumitexsyncai[.]com<br \/>\nlumitexstackai[.]com<br \/>\nlumitexinsightai[.]com<br \/>\nlumitexconnectx[.]com<br \/>\nlumitexlaunchx[.]com<br \/>\nlumitexgridx[.]com<br \/>\nlumitexbasex[.]com<br \/>\nlumitexflowx[.]com<\/td>\n<td>echoatt[.]com<br \/>\nrocketatt[.]com<br \/>\ntradefyatt[.]com<br \/>\nprofitlyatt[.]com<br \/>\nigniteatt[.]com<br \/>\nautopilotatt[.]com<br \/>\nwizardatt[.]com<br \/>\nquietbotatt[.]com<br \/>\nautotradeatt[.]com<br \/>\nattgenius[.]com<\/td>\n<td>tradingideasai[.]com<br \/>\ntradingideasfromai[.]com<br \/>\nstar-boostmedia[.]com<\/td>\n<\/tr>\n<tr>\n<td colspan=\"3\">Table 1. RDGA domain name patterns used by an unnamed investment scam actor who cloaks campaigns with Keitaro<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>For the set of pattern domains listed in the \u201cOther\u201d column of Table 1 above, the actor relies heavily on subdomains of the RDGAs to control the language of each landing page. The leading label in the hostname (for example, <strong>tr, au, br, za, swe, mx, pl<\/strong>) corresponds directly to a specific locale or language group, indicating some of the actor\u2019s targeted languages. When a user is routed to one of these subdomains, the website automatically serves content in the associated language, allowing the actor to reuse the same infrastructure while still presenting localized material tailored to each region. Table 2 shows what these subdomains look like.<\/p>\n<table>\n<thead>\n<tr>\n<th>Hostname<\/th>\n<th>Language<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>au.star-boostmedia[.]com<\/td>\n<td>English (Australia)<\/td>\n<\/tr>\n<tr>\n<td>br.star-boostmedia[.]com<\/td>\n<td>Portuguese (Brazil)<\/td>\n<\/tr>\n<tr>\n<td>can.star-boostmedia[.]com<\/td>\n<td>English (Canada)<\/td>\n<\/tr>\n<tr>\n<td>mx.star-boostmedia[.]com<\/td>\n<td>Spanish (Mexico)<\/td>\n<\/tr>\n<tr>\n<td>pl1.tradingideasai[.]com<\/td>\n<td>Polish<\/td>\n<\/tr>\n<tr>\n<td>swe.star-boostmedia[.]com<\/td>\n<td>Swedish<\/td>\n<\/tr>\n<tr>\n<td>tr.star-boostmedia[.]com<\/td>\n<td>Turkish<\/td>\n<\/tr>\n<tr>\n<td>za.star-boostmedia[.]com<\/td>\n<td>English (South Africa)<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\">Table 2. Observed subdomains and their associated languages.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3>FaiKast<\/h3>\n<p>Confiant has tracked FaiKast (derived from &#8220;Fake AI News Broadcast\u201d) since May 2025. FaiKast is a threat actor that leverages AI-generated deepfake videos to impersonate recognizable television news anchors and public figures (Figure 5). The deepfakes create an illusion of legitimacy and urgency around fraudulent investment schemes. FaiKast has been observed entering the AdTech supply chain primarily through Bigo Ads. Bigo Ads has also fallen under additional scrutiny in <a href=\"https:\/\/www.buchodi.com\/bigo-ads-deploys-c2-style-infrastructure-to-survive-domain-bans-heres-the-decrypted-config\/\" target=\"_blank\" rel=\"noopener\"><strong>this new research on their SDK<\/strong><\/a> by Buchodi.<\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/keitaro-ai-campaign-figure-5.png\" alt=\"FaiKast news anchor deepfakes\" \/><\/p>\n<p class=\"image-caption\">Figure 5. FaiKast news anchor deepfakes<\/p>\n<p>Typical FaiKast delivery TTPs are as follows:<\/p>\n<p>Stage 1 (Lure): AI-generated video ads featuring deepfake news anchors are served through the ad ecosystem, localized to match the target audience&#8217;s language, currency, and regional news cycle. Geos targeted include several European countries such as France and the U.K., as well as Canada, Japan, and Kazakhstan.<\/p>\n<p>Stage 2 (Landing): Victims who click through are taken to near-perfect replica sites of legitimate news outlets (e.g., CBC News). These fake pages include fabricated reader comments, images of real public figures (e.g., Canadian PM Mark Carney), and urgent calls-to-action to sign up for fraudulent cryptocurrency platforms with names like Pyravelon, Tyveralon, and Quantum AI. See Figures 6 and 7 for examples.<\/p>\n<p>Stage 3 (Conversion): Victims are funneled to fake government assistance pages and fraudulent investment portals.<\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/keitaro-ai-campaign-figure-6.png\" alt=\"FaiKast landing page samples impersonating CBC News\" \/><\/p>\n<p class=\"image-caption\">Figure 6. FaiKast landing page samples impersonating CBC News<\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/keitaro-ai-campaign-figure-7.png\" alt=\"Additional FaiKast landing page samples\" \/><\/p>\n<p class=\"image-caption\">Figure 7. Additional FaiKast landing page samples: calls-to-action to sign up for fake cryptocurrency platforms<\/p>\n<h3>WickedWally<\/h3>\n<p>WickedWally is a deceptive affiliate marketing cluster targeting specific U.S.-based audiences, such as senior citizens and those in need of social assistance programs with lures of debt relief, grocery allowances, Medicare benefits, and funeral expenses. This actor has been active and tracked by Confiant since at least 2024.<\/p>\n<p>WickedWally uses generative AI deepfake video ads, often designed to look like news reports, that leverage current events and opaque language such as: &#8220;Due to the USA tariffs release, you can erase your credit card debt for free until this Saturday&#8221; (see Figure 8 for an example).<\/p>\n<div class=\"grid-container\">\n<div class=\"grid-item\"><img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/keitaro-ai-campaign-figure-8a.png\" alt=\"Figure 8a\" \/><\/div>\n<div class=\"grid-item\"><img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/keitaro-ai-campaign-figure-8b.png\" alt=\"Figure 8b\" \/><\/div>\n<\/div>\n<p class=\"image-caption\">Figure 8. WickedWally ad sample impersonating a CNN news broadcast for investment scam domain empowerementplan[.]com<\/p>\n<p>A common landing page WickedWally uses is a fake chatbot\u2014a low-friction chat with an &#8220;agent&#8221; to &#8220;qualify&#8221; the victim for a fake benefit and build a false sense of legitimacy. They prompt users to call various toll-free numbers with prefixes such as 1-844, 888, etc. which route to unverified third-party call centers that urge people to share their personal and\/or financial information. See Figure 9. Other landing pages feature fake reviews and urgency, fake logos, and totally unrealistic claims.<\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/keitaro-ai-campaign-figure-9.png\" alt=\"WickedWally landing page sample\" \/><\/p>\n<p class=\"image-caption\">Figure 9. WickedWally landing page sample for empowerementplan[.]com, featuring a fake debt relief lure<\/p>\n<p>Instead of using cloaking, these campaigns attempt to slip through by blending in with legitimate lead-generation marketing. Despite this approach, Keitaro still plays a critical role in the delivery infrastructure, ostensibly for endpoint routing and campaign tracking. In our observations, this actor repeatedly used Keitaro Tracker as part of its campaign delivery chain, making it a useful signal when identifying related activity.<\/p>\n<h3>Tech Support Scams (Unattributed)<\/h3>\n<p>Malvertising remains a fertile source for uncovering tech support scams (TSSs). Confiant tracks multiple actors in this space that exhibit closely aligned TTPs. While cloaking is common, Keitaro is not frequently observed in these chains; but a notable exception surfaced last October. In that campaign, a TSS operator blended AI\u2011generated assets into lure sites, a technique that increases perceived legitimacy and scales with production. Keitaro was then used to conditionally route visitors from the lures to scam landing pages or other payloads based on signals such as IP, geo, user agent, and referrer, while diverting non\u2011targets to benign content. The lures impersonated popular brands or topics and used broad commerce keywords (e.g., Taylor Swift, shoes, pillows, board games) to cast a wide net across search and ad inventory. This programmatic approach lets the actor mass\u2011produce pages that match diverse queries, extend SEO coverage, and sustain a steady inbound stream into the support\u2011scam funnel. This actor is an early adopter of AI technologies, including OpenAI\u2019s DALL-E text\u2011to\u2011image generator. Confiant has been tracking this activity since November 2023.<\/p>\n<p>Typical TSS actor TTPs are as follows:<\/p>\n<p>Stage 1 (Lure): Native display ads are served into programmatic display ad slots on publisher pages. Ad creatives feature prominent green &#8220;START&#8221; buttons, IQ test prompts, fake download offers, or clickbait topics (gardening tips, moving companies, lifestyle content). TSS actors can operate within locked-down native ad templates, which do not allow custom JavaScript execution in the ad itself. Ads are increasingly sophisticated, evolving from simple button-style creatives to more developed ad text incorporating calls to &#8220;watch,&#8221; &#8220;learn,&#8221; or &#8220;continue.&#8221; Figure 10 shows an example of these types of ads.<\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/keitaro-ai-campaign-figure-10.gif\" alt=\"Example of a native display ad used in Stage 1\" \/><\/p>\n<p class=\"image-caption\">Figure 10. Example of a native display ad used in Stage 1<\/p>\n<p>Stage 2 (Cloaking and Landing): Victims who click through land on a multi-step cloaked landing page. The first page is typically not cloaked and presents a large &#8220;CONTINUE&#8221; button, &#8220;Start Quiz,&#8221; or &#8220;Read More&#8221; prompt. This page acts as a gate to the payload. Behind the scenes, cloaking kits perform client-side fingerprinting: checking IP geolocation (U.S. targeting), user-agent (Windows vs. macOS), ASN blacklists, and the presence of click URL parameters to confirm the visitor arrived via a paid ad click. Non-qualifying traffic receives a white page, typically a benign-looking website clone like the one in Figure 11 below.<\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/keitaro-ai-campaign-figure-11.jpg\" alt=\"Cloaked white page\" \/><\/p>\n<p class=\"image-caption\">Figure 11. Cloaked white page for marrowcliff[.]org<\/p>\n<p>Cloaked page themes have evolved significantly over time and are where Confiant has been seeing TSS actors using AI. Many of these themes include:<\/p>\n<ul class=\"list-spacing\">\n<li>AI-generated content pages using DALL-E images, covering diverse topics (Taylor Swift, shoes, pillows, board games)<\/li>\n<li>Fake quizzes\/IQ tests (now declining)<\/li>\n<li>Cloned business websites, stolen copies of legitimate digital marketing agencies, SEO firms, and platforms like Capterra<\/li>\n<li>Cookie consent modals that auto-redirect after two seconds or upon any user interaction (accept or decline)<\/li>\n<\/ul>\n<p>Stage 3 (TSS Payload): Victims who pass fingerprinting are redirected via HTTP 302 to a tech support scam page, often hosted on Azure Blob Storage (*.web.core.windows.net subdomains). These pages are short-lived and impersonate Microsoft or Apple, displaying fabricated virus alerts, trojan warnings, Windows Defender error messages (Figure 12), and fake system scans. Victims are urged to call a fraudulent support number. Scam operators then request remote access, run fake diagnostics, and demand payment via credit card, gift cards, wire transfer, or cryptocurrency. Reported individual victim losses have reached beyond US$40,000 in <a href=\"https:\/\/www.ic3.gov\/AnnualReport\/Reports\/2024_IC3Report.pdf%5d\" target=\"_blank\" rel=\"noopener\"><strong>documented cases<\/strong><\/a>.<\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/keitaro-ai-campaign-figure-12.png\" alt=\"Uncloaked TSS fake alert\" \/><\/p>\n<p class=\"image-caption\">Figure 12. Uncloaked TSS fake alert, fake scan, and payment demand<\/p>\n<p>TSS activity primarily targets users in the United States with fingerprinting logic specifically gating on U.S. IP ranges. Secondary targeting includes Japan (with ads in Japanese) as well as broader English and European-language markets.<\/p>\n<h3>FishSteaks<\/h3>\n<p>Our analysis surfaced some findings from FishSteaks, a mature cluster that has been active since at least March 2024, likely much longer. In recent campaigns, we\u2019ve observed FishSteaks beginning to leverage Keitaro as a cloaking mechanism. They run campaigns that target the United States and lure victims with convincing giveaway-themed creatives impersonating popular American consumer brands.<\/p>\n<p>Victims are funneled through multi-stage, gamified landing pages before arriving at a final phishing site designed to harvest personal information and credit card data. The actor demonstrates scalable operations through brand rotation, subdomain cycling, and using AI-generated placeholder assets that are swapped for brand logos as campaigns go live. Gamification techniques such as virtual prize boxes and falling confetti increase victim engagement and time-on-page, boosting conversion rates.<\/p>\n<p>The screenshots in Figures 13 and 14 below show landing pages for domains 5000-giftcardswb[.]ru, active throughout October and sporadically in November, and tryhappycards[.]ru, active in December. Both campaigns leveraged Keitaro and lured victims with generic ad creatives that resembled native mobile app widgets.<\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/keitaro-ai-campaign-figure-13a.gif\" alt=\"FishSteaks fake mobile app widgets\" \/><br \/>\n<img decoding=\"async\" class=\"blog-image\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/keitaro-ai-campaign-figure-13b.gif\" alt=\"FishSteaks fake mobile app widgets\" \/><\/p>\n<p class=\"image-caption\">Figure 13. FishSteaks fake mobile app widgets<\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/keitaro-ai-campaign-figure-14.png\" alt=\"tryhappycards[.]ru giveaway page\" \/><\/p>\n<p class=\"image-caption\">Figure 14. tryhappycards[.]ru giveaway page<\/p>\n<h3>AI as a Force Multiplier, Keitaro as the Enabler<\/h3>\n<p>Across all of our observational data points, we identified thousands of attacks involving Keitaro. What was alarming was the diversity and sheer volume of threat actors operating in this part of the cybercrime ecosystem. Investment scams were the most common attack category, and the most compelling subset within that was AI-driven scams. By combining an older but still highly effective investment fraud theme with modern AI technologies, actors have been able to launch large\u2011scale, highly convincing cyber campaigns. The approach scales and defeats conventional defenses by combining conditional traffic routing (geo\/IP\/ASN, user\u2011agent\/referrer, risk\u2011based flows), AI\u2011personalized content, and cloaking that shows benign pages to scanners and persuasive lures to real users. Together, these techniques reduce the efficacy of signature and rule\u2011based security controls and increase conversion rates for the attackers.<\/p>\n<p>Actors leaned heavily on DNS infrastructure and advertising pipelines to achieve scale and lead acquisition. Effective social engineering is critical to the success of these campaigns because many of them rely on user engagement such as submitting contact details or following instructions over the phone. Consequently, actors tune their TTPs to maximize trust and engagement, routinely deploying brand\u2011impersonating lookalike domains, high\u2011fidelity AI\u2011generated creatives localized to the target, and deepfake audio\/video assets to simulate trusted representatives or media personalities.<\/p>\n<p>Although Keitaro\u2011abusing attacks are often complex and far\u2011reaching, we are encouraged by Apliteni\u2019s responsiveness to abuse escalations. Coordinated reporting efforts have already led to infrastructure and account takedowns, giving us a viable remediation path even as actors continue rotating domains and ad creatives.<\/p>\n<h3>What\u2019s Next<\/h3>\n<p>Since we couldn&#8217;t come close to covering all our findings and examples here, part two (of three) will move beyond AI\u2011themed lures to examine other fraud schemes leveraging Keitaro and the spam and advertising pipelines that support them. We\u2019ll also share how we used webserver fingerprinting and JA4+ to surface additional Keitaro servers and uncover malware distribution activities.<\/p>\n<h3>Indicators<\/h3>\n<p>A curated selection of indicators related to the threats discussed can be seen in the table below. A more comprehensive list of indicators can be found in our <a href=\"https:\/\/github.com\/infobloxopen\/threat-intelligence\" target=\"_blank\" rel=\"noopener\"><strong>GitHub repository<\/strong><\/a>.<\/p>\n<p><em>Note: These domains may be associated with inactive or stolen licenses.<\/em><\/p>\n<table>\n<thead>\n<tr>\n<th>Indicators<\/th>\n<th>Description<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>fin-zen-ai[.]com<br \/>\nsynatra-nexus[.]com<br \/>\ntoonie-bot[.]com<br \/>\nveltimo-ai[.]com<\/td>\n<td>Domains used by an unnamed threat actor running investment scams featuring AI\u2011powered trading platforms. The domains are associated with the examples in Figure 2.<\/td>\n<\/tr>\n<tr>\n<td>argea-ai[.]org<br \/>\nel-camino-trader[.]com<br \/>\nmizuai[.]org<br \/>\nmyhomequote[.]xyz<br \/>\nnuve-ai-invest[.]vip<br \/>\nnuvei-bot-neway[.]org<br \/>\nnuvei-bot-neway[.]vip<br \/>\nplumaclean[.]com<br \/>\npowerquizmaster[.]com<br \/>\ntruenorth-yachts[.]com<\/td>\n<td>Additional sample of domains used by the same unnamed threat actor running investment scams mentioned in the row above.<\/td>\n<\/tr>\n<tr>\n<td>cryptopassive-swiss-switzerland[.]org<br \/>\nnexiroka[.]net<br \/>\nsamsosi[.]net<br \/>\nyieldup[.]ch<\/td>\n<td>Domains used by an unnamed threat actor running investment scams. The domains are associated with the examples in Figure 3.<\/td>\n<\/tr>\n<tr>\n<td>bitget-passive-income[.]com<br \/>\ncardanocrypto[.]ch<br \/>\nclarozenvix[.]com<br \/>\ncrypto-nsw-app-au[.]com<br \/>\ngentlevector[.]com<br \/>\nkyvaronedge82[.]com<br \/>\nnewton-passive-income[.]net<br \/>\nopulatrix[.]ch<br \/>\nowleblo[.]net wirbeldappix[.]ch<\/td>\n<td>Additional sample of domains used by the same unnamed threat actor running investment scams mentioned in the row above.<\/td>\n<\/tr>\n<tr>\n<td>au[.]lpa1[.]star-boostmedia[.]com<br \/>\npl[.]star-boostmedia[.]com<br \/>\npol[.]star-boostmedia[.]com<br \/>\nlumitexchainai[.]com<\/td>\n<td>Domains used by an unnamed threat actor running AI-themed fake news campaigns. The domains are associated with the examples in Figure 4.<\/td>\n<\/tr>\n<tr>\n<td>lumitexaihub[.]com<br \/>\nlumitexaicloud[.]com<br \/>\nlumitexsyncai[.]com<br \/>\nlumitexstackai[.]com<br \/>\nlumitexinsightai[.]com<br \/>\nlumitexconnectx[.]com<br \/>\nlumitexlaunchx[.]com<br \/>\nlumitexgridx[.]com<br \/>\nlumitexbasex[.]com<br \/>\nlumitexflowx[.]com<\/td>\n<td>Sample of domains used by the same unnamed threat actor in the row above. Domains with pattern \u201clumitex +AI or +X suffix\u201d<\/td>\n<\/tr>\n<tr>\n<td>echoatt[.]com<br \/>\nrocketatt[.]com<br \/>\ntradefyatt[.]com<br \/>\nprofitlyatt[.]com<br \/>\nigniteatt[.]com<br \/>\nautopilotatt[.]com<br \/>\nwizardatt[.]com<br \/>\nquietbotatt[.]com<br \/>\nautotradeatt[.]com<br \/>\nattgenius[.]com<\/td>\n<td>Sample of domains used by the same unnamed actor in the row above; domains with pattern \u201cATT prefix\/suffix\u201d<\/td>\n<\/tr>\n<tr>\n<td>tradingideasai[.]com<br \/>\ntradingideasfromai[.]com<br \/>\nstar-boostmedia[.]com<\/td>\n<td>Domains used by the same unnamed actor in the row above. Domains with no obvious common pattern, but leverage subdomains to determine the page\u2019s language.<\/td>\n<\/tr>\n<tr>\n<td>tryhappycards[.]ru<br \/>\nyourluckycard[.]ru<\/td>\n<td>FishSteaks \u2013 Giveaway scams<\/td>\n<\/tr>\n<tr>\n<td>marrowcliff[.]org<br \/>\nnestledawn[.]org<\/td>\n<td>Tech Support Scams<\/td>\n<\/tr>\n<tr>\n<td>empowerementplan[.]com<br \/>\nfinancialmatcher[.]com<\/td>\n<td>WickedWally \u2013 Debt relief scams<\/td>\n<\/tr>\n<tr>\n<td>wealthlift[.]click<br \/>\nnorthernavenue[.]info<br \/>\nfzclbsmartcbeaa[.]com<br \/>\nmcdpwmachineylpdn[.]com<br \/>\nfunds-treasure[.]com<br \/>\nvwyitsensorjieho[.]com<br \/>\nfunds-allowance[.]com<br \/>\ncash-revenue[.]xyz<br \/>\ncognithic[.]com<br \/>\nthrygate[.]com<br \/>\nlogithrive[.]com<br \/>\nyoxjsensordkzb[.]com<br \/>\nggkngpssanil[.]com<br \/>\nzoizagricultureciva[.]com<br \/>\ntmgmaiwwta[.]com<\/td>\n<td>FaiKast \u2013 Gen AI broadcast persona impersonators<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<style>\n.savy-seahorse-table {<br \/>font-size:14px;<br \/>word-break: keep-all;<br \/>}<br \/>.savy-seahorse-table td:last-child, .savy-seahorse-table th:last-child {<br \/>padding-right:10px;<br \/>}<br \/>.code-format {<br \/>\tfont-family: 'Courier New';<br \/>}<br \/>.image-caption {<br \/>    font-size: 12px;<br \/>margin-top:auto;<br \/>}<br \/>.list-spacing li{margin-bottom:20px}<br \/>.img-container, .img-container-3-col {<br \/>display: flex;<br \/>flex-wrap: wrap;<br \/>justify-content: space-between;<br \/>}<br \/>.img-container img {<br \/>width: 49%;<br \/>margin-bottom: 10px;<br \/>}<br \/>.img-container-3-col img {<br \/>width: 30%;<br \/>margin-bottom: 10px;<br \/>}<br \/>@media (max-width: 767px) {<br \/>.img-container, .img-container-3-col {<br \/>display: block;<br \/>}<br \/>.img-container img, .img-container-3-col img {<br \/>width: 100%;<br \/>}<br \/>.grid-container {<br \/>    grid-template-columns: 1fr!important;<br \/>  }<br \/>}<br \/>@media (min-width: 767px) {<br \/>.img-50{width:50%;}<br \/>}<br \/>.grid-container {<br \/>  display: grid;<br \/>  grid-template-columns: repeat(2, 1fr);<br \/>  gap: 40px;<br \/>  max-width: 800px;<br \/>  margin: 0 auto;<br \/>  align-items: stretch;<br \/>margin-bottom: 20px;<br \/>}<br \/>.grid-item {<br \/>   display: flex;<br \/>  flex-direction: column;<br \/>  justify-content: flex-start;<br \/>}<br \/>.grid-item img {<br \/>  width: 100%;<br \/>  height: auto;<br \/>}<br \/><\/style>\n<p><script>\njQuery('.single h1').html('<span class=\"gradient\">Inside Keitaro Abuse<\/span>: A Persistent Stream of AI-Driven Investment Scams');\n<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Authors: Infoblox Threat Intel and Confiant Executive Summary Cloaking\u2014the act and art of hiding a website\u2019s true nature\u2014is a critical component of cybercriminal operations today. Threat actors use domain cloaking, implemented through traffic distribution systems (TDSs) and cloaking kits, to evade content restrictions in advertising, for precision targeting of victims for malware and scams, and [&hellip;]<\/p>\n","protected":false},"author":397,"featured_media":13062,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[254],"tags":[965,1626,1082,902,242,1037,1627,774,1105,1628,1146,1629,1630,930,30],"class_list":{"0":"post-13063","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threat-intelligence","8":"tag-keitaro","9":"tag-cloaking","10":"tag-traffic-distribution-system","11":"tag-tds","12":"tag-ai","13":"tag-scams","14":"tag-investment-scams","15":"tag-malvertising","16":"tag-threat-actors","17":"tag-cybercriminals","18":"tag-domain-cloaking","19":"tag-performance-tracker","20":"tag-advertising-tracker","21":"tag-cybercrime","22":"tag-dns","23":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.4 (Yoast SEO v26.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Inside Keitaro Abuse Part 1: Cloaking AI\u2011Enhanced Scams<\/title>\n<meta name=\"description\" content=\"Infoblox and Confiant reveal how Keitaro is exploited for cloaking scams, targeting victims, and automating AI\u2011enhanced fraud in today\u2019s threat landscape.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-keitaro-abuse-a-persistent-stream-of-ai-driven-investment-scams\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Inside Keitaro Abuse Part 1: Cloaking AI\u2011Enhanced Scams\" \/>\n<meta property=\"og:description\" content=\"Infoblox and Confiant reveal how Keitaro is exploited for cloaking scams, targeting victims, and automating AI\u2011enhanced fraud in today\u2019s threat landscape.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-keitaro-abuse-a-persistent-stream-of-ai-driven-investment-scams\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-19T14:55:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-19T20:01:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/keitaro-ai-campaign-thumbnail.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"408\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Infoblox Threat Intel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Inside Keitaro Abuse Part 1: Cloaking AI\u2011Enhanced Scams\" \/>\n<meta name=\"twitter:description\" content=\"Infoblox and Confiant reveal how Keitaro is exploited for cloaking scams, targeting victims, and automating AI\u2011enhanced fraud in today\u2019s threat landscape.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/keitaro-ai-campaign-thumbnail.jpeg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Infoblox Threat Intel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"23 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-keitaro-abuse-a-persistent-stream-of-ai-driven-investment-scams\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-keitaro-abuse-a-persistent-stream-of-ai-driven-investment-scams\/\"},\"author\":{\"name\":\"Infoblox Threat Intel\",\"@id\":\"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae\"},\"headline\":\"Inside Keitaro Abuse: A Persistent Stream of AI-Driven Investment Scams\",\"datePublished\":\"2026-03-19T14:55:13+00:00\",\"dateModified\":\"2026-03-19T20:01:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-keitaro-abuse-a-persistent-stream-of-ai-driven-investment-scams\/\"},\"wordCount\":4031,\"publisher\":{\"@id\":\"https:\/\/www.infoblox.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-keitaro-abuse-a-persistent-stream-of-ai-driven-investment-scams\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/keitaro-ai-campaign-thumbnail.jpeg\",\"keywords\":[\"Keitaro\",\"cloaking\",\"Traffic Distribution System\",\"TDS\",\"AI\",\"scams\",\"investment scams\",\"malvertising\",\"threat actors\",\"cybercriminals\",\"Domain Cloaking\",\"performance tracker\",\"advertising tracker\",\"Cybercrime\",\"DNS\"],\"articleSection\":[\"Infoblox Threat Intel\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-keitaro-abuse-a-persistent-stream-of-ai-driven-investment-scams\/\",\"url\":\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-keitaro-abuse-a-persistent-stream-of-ai-driven-investment-scams\/\",\"name\":\"Inside Keitaro Abuse Part 1: Cloaking AI\u2011Enhanced Scams\",\"isPartOf\":{\"@id\":\"https:\/\/www.infoblox.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-keitaro-abuse-a-persistent-stream-of-ai-driven-investment-scams\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-keitaro-abuse-a-persistent-stream-of-ai-driven-investment-scams\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/keitaro-ai-campaign-thumbnail.jpeg\",\"datePublished\":\"2026-03-19T14:55:13+00:00\",\"dateModified\":\"2026-03-19T20:01:23+00:00\",\"description\":\"Infoblox and Confiant reveal how Keitaro is exploited for cloaking scams, targeting victims, and automating AI\u2011enhanced fraud in today\u2019s threat landscape.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-keitaro-abuse-a-persistent-stream-of-ai-driven-investment-scams\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-keitaro-abuse-a-persistent-stream-of-ai-driven-investment-scams\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-keitaro-abuse-a-persistent-stream-of-ai-driven-investment-scams\/#primaryimage\",\"url\":\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/keitaro-ai-campaign-thumbnail.jpeg\",\"contentUrl\":\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/keitaro-ai-campaign-thumbnail.jpeg\",\"width\":612,\"height\":408},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-keitaro-abuse-a-persistent-stream-of-ai-driven-investment-scams\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.infoblox.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infoblox Threat Intel\",\"item\":\"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Inside Keitaro Abuse: A Persistent Stream of AI-Driven Investment Scams\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.infoblox.com\/blog\/#website\",\"url\":\"https:\/\/www.infoblox.com\/blog\/\",\"name\":\"blog.infoblox.com\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.infoblox.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.infoblox.com\/blog\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\/\/www.infoblox.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae\",\"name\":\"Infoblox Threat Intel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png\",\"contentUrl\":\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png\",\"caption\":\"Infoblox Threat Intel\"},\"description\":\"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.\",\"url\":\"https:\/\/www.infoblox.com\/blog\/author\/infoblox-threat-intel\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Inside Keitaro Abuse Part 1: Cloaking AI\u2011Enhanced Scams","description":"Infoblox and Confiant reveal how Keitaro is exploited for cloaking scams, targeting victims, and automating AI\u2011enhanced fraud in today\u2019s threat landscape.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-keitaro-abuse-a-persistent-stream-of-ai-driven-investment-scams\/","og_locale":"en_US","og_type":"article","og_title":"Inside Keitaro Abuse Part 1: Cloaking AI\u2011Enhanced Scams","og_description":"Infoblox and Confiant reveal how Keitaro is exploited for cloaking scams, targeting victims, and automating AI\u2011enhanced fraud in today\u2019s threat landscape.","og_url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-keitaro-abuse-a-persistent-stream-of-ai-driven-investment-scams\/","og_site_name":"Infoblox Blog","article_published_time":"2026-03-19T14:55:13+00:00","article_modified_time":"2026-03-19T20:01:23+00:00","og_image":[{"width":612,"height":408,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/keitaro-ai-campaign-thumbnail.jpeg","type":"image\/jpeg"}],"author":"Infoblox Threat Intel","twitter_card":"summary_large_image","twitter_title":"Inside Keitaro Abuse Part 1: Cloaking AI\u2011Enhanced Scams","twitter_description":"Infoblox and Confiant reveal how Keitaro is exploited for cloaking scams, targeting victims, and automating AI\u2011enhanced fraud in today\u2019s threat landscape.","twitter_image":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/keitaro-ai-campaign-thumbnail.jpeg","twitter_misc":{"Written by":"Infoblox Threat Intel","Est. reading time":"23 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-keitaro-abuse-a-persistent-stream-of-ai-driven-investment-scams\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-keitaro-abuse-a-persistent-stream-of-ai-driven-investment-scams\/"},"author":{"name":"Infoblox Threat Intel","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae"},"headline":"Inside Keitaro Abuse: A Persistent Stream of AI-Driven Investment Scams","datePublished":"2026-03-19T14:55:13+00:00","dateModified":"2026-03-19T20:01:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-keitaro-abuse-a-persistent-stream-of-ai-driven-investment-scams\/"},"wordCount":4031,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-keitaro-abuse-a-persistent-stream-of-ai-driven-investment-scams\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/keitaro-ai-campaign-thumbnail.jpeg","keywords":["Keitaro","cloaking","Traffic Distribution System","TDS","AI","scams","investment scams","malvertising","threat actors","cybercriminals","Domain Cloaking","performance tracker","advertising tracker","Cybercrime","DNS"],"articleSection":["Infoblox Threat Intel"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-keitaro-abuse-a-persistent-stream-of-ai-driven-investment-scams\/","url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-keitaro-abuse-a-persistent-stream-of-ai-driven-investment-scams\/","name":"Inside Keitaro Abuse Part 1: Cloaking AI\u2011Enhanced Scams","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-keitaro-abuse-a-persistent-stream-of-ai-driven-investment-scams\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-keitaro-abuse-a-persistent-stream-of-ai-driven-investment-scams\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/keitaro-ai-campaign-thumbnail.jpeg","datePublished":"2026-03-19T14:55:13+00:00","dateModified":"2026-03-19T20:01:23+00:00","description":"Infoblox and Confiant reveal how Keitaro is exploited for cloaking scams, targeting victims, and automating AI\u2011enhanced fraud in today\u2019s threat landscape.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-keitaro-abuse-a-persistent-stream-of-ai-driven-investment-scams\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-keitaro-abuse-a-persistent-stream-of-ai-driven-investment-scams\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-keitaro-abuse-a-persistent-stream-of-ai-driven-investment-scams\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/keitaro-ai-campaign-thumbnail.jpeg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/keitaro-ai-campaign-thumbnail.jpeg","width":612,"height":408},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-keitaro-abuse-a-persistent-stream-of-ai-driven-investment-scams\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Infoblox Threat Intel","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/"},{"@type":"ListItem","position":3,"name":"Inside Keitaro Abuse: A Persistent Stream of AI-Driven Investment Scams"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"blog.infoblox.com","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae","name":"Infoblox Threat Intel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","caption":"Infoblox Threat Intel"},"description":"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.","url":"https:\/\/www.infoblox.com\/blog\/author\/infoblox-threat-intel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/13063","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/397"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=13063"}],"version-history":[{"count":8,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/13063\/revisions"}],"predecessor-version":[{"id":13065,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/13063\/revisions\/13065"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/13062"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=13063"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=13063"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=13063"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}