Skip to Content
logologo
AI Incident Database
Open TwitterOpen RSS FeedOpen FacebookOpen LinkedInOpen GitHub
Open Menu
Discover
Submit
  • Welcome to the AIID
  • Discover Incidents
  • Spatial View
  • Table View
  • List view
  • Entities
  • Taxonomies
  • Submit Incident Reports
  • Submission Leaderboard
  • Blog
  • AI News Digest
  • Risk Checklists
  • Random Incident
  • Sign Up
Collapse
Discover
Submit
  • Welcome to the AIID
  • Discover Incidents
  • Spatial View
  • Table View
  • List view
  • Entities
  • Taxonomies
  • Submit Incident Reports
  • Submission Leaderboard
  • Blog
  • AI News Digest
  • Risk Checklists
  • Random Incident
  • Sign Up
Collapse

Report 5206

Associated Incidents

Incident 10676 Report
Alleged Use of Purported AI-Generated Identities to Defraud FTX Claims Buyers of $5.6M

Loading...
Crypto scam: $5.6m stolen in FTX debt claims fraud
crypto.news · 2025

A scam group posing as FTX debt claimants defrauded two companies of more than $5.6 million, according to a new report from Inca Digital. 

The perpetrators allegedly used AI-generated identities and unauthorized access to bankruptcy records to execute the scheme.

The report identifies the likely culprit as an individual or group operating under two aliases: Lim Chee Chong and Teh Jin Loon.

Inca Digital found that the scammer likely manipulated facial appearances using AI tools and provided fake Singaporean ID cards with visual discrepancies. 

The perpetrators' photos closely resembled images of Kurtis Lau Wai-kin, a former professional gamer currently imprisoned for drug trafficking.

FTX debt sales

The fraud began in June 2024, when the scammer sold FTX debt claims to two companies. Although the claims were verified as legitimate, both firms later received rejection notices from Kroll, the company managing FTX's bankruptcy claims.

Investigators believe the scammer accessed FTX customer data through public bankruptcy filings or a 2023 data breach at Kroll.

Blockchain analysis revealed that the stolen funds were funneled through Binance, CoinEx, and Gate.io. Two addresses linked to the scam sent funds to the same CoinEx deposit address, reinforcing the suspicion that the aliases belonged to the same entity. 

Additionally, the analysis traced funds back to an MEV bot associated with Symbolic Capital Partners, though Inca Digital could not confirm the firm's involvement.

Read the Source

Research

  • Defining an “AI Incident”
  • Defining an “AI Incident Response”
  • Database Roadmap
  • Related Work
  • Download Complete Database

Project and Community

  • About
  • Contact and Follow
  • Apps and Summaries
  • Editor’s Guide

Incidents

  • All Incidents in List Form
  • Flagged Incidents
  • Submission Queue
  • Classifications View
  • Taxonomies

2024 - AI Incident Database

  • Terms of use
  • Privacy Policy
  • Open twitterOpen githubOpen rssOpen facebookOpen linkedin
  • e1b50cd