• About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal
The Cyber Express
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    ChipSoft cyberattack

    Dutch Health Tech Firm ChipSoft Confirms Destruction of Stolen Patient Data

    APRA AI risk warning

    Australia’s APRA Issues AI Risk Warning to Banks and Insurers

    CVE-2026-41940

    CVE-2026-41940: Critical cPanel Authentication Bypass Exposes Hosting Systems

    Operation Tri-Force Sentinel

    Dubai Police Smash International Scam Empire in Massive FBI and China-Led Operation

    IOCTA 2026 report

    IOCTA 2026 Report Warns of Rising AI-Driven Cybercrime and Dark Web Threats

    Hutt City Council phishing attack

    Hutt City Council Confirms Phishing Attack, Data of Hundreds Potentially Exposed

    CVE-2026-3854

    GitHub Fixes Critical RCE Bug CVE-2026-3854 Within Hours of Discovery

    AI Agent, Claude

    AI Agent Deleted Production Database in 9 Secs; Then Confessed Every Rule It Broke

    CERT-In advisory

    CERT-In Warns of AI-Driven Cyber Threat Surge, MSMEs at Highest Risk

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    APRA AI risk warning

    Australia’s APRA Issues AI Risk Warning to Banks and Insurers

    Norway social media age limit

    Norway to Introduce Social Media Age Limit of 16, Platforms to Enforce Verification

    Facial Recognition Policy

    High Court Backs UK Police Use of Live Facial Recognition Technology

    CBI, Cyber Fraud Network, Chakra-V, SIM Card, Operation Chakra, Covid-19, Fraud

    Indian Agency Arrests Key SIM Card Supplier of a Broader Cyber Fraud Network

    UAE Cyber Security Council

    UAE Cyber Security Council Warns 1 in 4 Public Files Contain Sensitive Personal Data

    DDoS-for-Hire, Operation PowerOFF, Europol, U.S. Department of Justice

    75,000 DDoS-for-Hire Users Reprimanded as Authorities Seize Dozens of Domains

    UAC-0247, CERT-UA, Ukrainian IP Addresses, IP Addresses, Digital Assets, Russia, Ukraine

    Ukraine Warns of Surge in Cyberattacks on Hospitals, Local Governments by UAC-0247 Hackers

    Goldman Sachs, AI Risks, AI-driven Risks, Mythos, Anthropic, David Solomon

    Goldman Sachs ‘Hyperaware’ of AI Risks; Working with Anthropic on Mythos

    W3LL Phishing, W3LL Phishing Kit, W3LL Store

    Authorities Dismantle ‘W3LL’ Phishing Empire Powering Global Business Email Attacks

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    Google Chrome

    How to Remove Saved Passwords From Google Chrome (And Why You Should)

    DPDP Rules, Cyble, DPDP Act, Cyble Vantage

    How Cyble’s Front-Row Vantage Can Help You in Complying to India’s DPDP Act

    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    AI Chip, Chip Security Act

    Congress Wants a GPS Tracker on Every Advanced AI Chip America Exports

    Fraud, Agentic AI

    Agentic AI Run Fraud Campaigns Earning 4.5 Times More: Interpol

    Stryker, Stryker Cyberattack, CISA, Handala

    Stryker Says Cyberattack Disrupted Processing, Manufacturing and Shipping

    INC Ransom, Western Critical Infrastructure, Critical infrastructure, Russian GRU, Russian Threat Actor, Sandworm, APT44, Energy Supply Chain, Energy Infrastructure

    INC Ransom’s Franchise Model Is Putting Critical Infrastructure on the Chopping Block

    Terrorist Cyberattacks, UAE Cyber Security Council

    UAE Blocked AI-Powered Terrorist Cyberattacks Targeting Critical Infrastructure

    Eurail Breach, Eurail

    Eurail Breach Escalates as Stolen Passport Data and IBANs Surface on Dark Web for Sale

    Discord teen-by-default settings

    Discord Introduces Stronger Teen Safety Controls Worldwide

    The Cyber Express cybersecurity roundup

    The Cyber Express Weekly Roundup: FortiOS Exploits, Ransomware, Hacktivist Surge, and EU Telecom Rules

    Nicole Ozer appointment

    Nicole Ozer Joins CPPA to Drive Privacy and Digital Security Initiatives

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    ChipSoft cyberattack

    Dutch Health Tech Firm ChipSoft Confirms Destruction of Stolen Patient Data

    APRA AI risk warning

    Australia’s APRA Issues AI Risk Warning to Banks and Insurers

    CVE-2026-41940

    CVE-2026-41940: Critical cPanel Authentication Bypass Exposes Hosting Systems

    Operation Tri-Force Sentinel

    Dubai Police Smash International Scam Empire in Massive FBI and China-Led Operation

    IOCTA 2026 report

    IOCTA 2026 Report Warns of Rising AI-Driven Cybercrime and Dark Web Threats

    Hutt City Council phishing attack

    Hutt City Council Confirms Phishing Attack, Data of Hundreds Potentially Exposed

    CVE-2026-3854

    GitHub Fixes Critical RCE Bug CVE-2026-3854 Within Hours of Discovery

    AI Agent, Claude

    AI Agent Deleted Production Database in 9 Secs; Then Confessed Every Rule It Broke

    CERT-In advisory

    CERT-In Warns of AI-Driven Cyber Threat Surge, MSMEs at Highest Risk

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    APRA AI risk warning

    Australia’s APRA Issues AI Risk Warning to Banks and Insurers

    Norway social media age limit

    Norway to Introduce Social Media Age Limit of 16, Platforms to Enforce Verification

    Facial Recognition Policy

    High Court Backs UK Police Use of Live Facial Recognition Technology

    CBI, Cyber Fraud Network, Chakra-V, SIM Card, Operation Chakra, Covid-19, Fraud

    Indian Agency Arrests Key SIM Card Supplier of a Broader Cyber Fraud Network

    UAE Cyber Security Council

    UAE Cyber Security Council Warns 1 in 4 Public Files Contain Sensitive Personal Data

    DDoS-for-Hire, Operation PowerOFF, Europol, U.S. Department of Justice

    75,000 DDoS-for-Hire Users Reprimanded as Authorities Seize Dozens of Domains

    UAC-0247, CERT-UA, Ukrainian IP Addresses, IP Addresses, Digital Assets, Russia, Ukraine

    Ukraine Warns of Surge in Cyberattacks on Hospitals, Local Governments by UAC-0247 Hackers

    Goldman Sachs, AI Risks, AI-driven Risks, Mythos, Anthropic, David Solomon

    Goldman Sachs ‘Hyperaware’ of AI Risks; Working with Anthropic on Mythos

    W3LL Phishing, W3LL Phishing Kit, W3LL Store

    Authorities Dismantle ‘W3LL’ Phishing Empire Powering Global Business Email Attacks

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    Google Chrome

    How to Remove Saved Passwords From Google Chrome (And Why You Should)

    DPDP Rules, Cyble, DPDP Act, Cyble Vantage

    How Cyble’s Front-Row Vantage Can Help You in Complying to India’s DPDP Act

    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    AI Chip, Chip Security Act

    Congress Wants a GPS Tracker on Every Advanced AI Chip America Exports

    Fraud, Agentic AI

    Agentic AI Run Fraud Campaigns Earning 4.5 Times More: Interpol

    Stryker, Stryker Cyberattack, CISA, Handala

    Stryker Says Cyberattack Disrupted Processing, Manufacturing and Shipping

    INC Ransom, Western Critical Infrastructure, Critical infrastructure, Russian GRU, Russian Threat Actor, Sandworm, APT44, Energy Supply Chain, Energy Infrastructure

    INC Ransom’s Franchise Model Is Putting Critical Infrastructure on the Chopping Block

    Terrorist Cyberattacks, UAE Cyber Security Council

    UAE Blocked AI-Powered Terrorist Cyberattacks Targeting Critical Infrastructure

    Eurail Breach, Eurail

    Eurail Breach Escalates as Stolen Passport Data and IBANs Surface on Dark Web for Sale

    Discord teen-by-default settings

    Discord Introduces Stronger Teen Safety Controls Worldwide

    The Cyber Express cybersecurity roundup

    The Cyber Express Weekly Roundup: FortiOS Exploits, Ransomware, Hacktivist Surge, and EU Telecom Rules

    Nicole Ozer appointment

    Nicole Ozer Joins CPPA to Drive Privacy and Digital Security Initiatives

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
The Cyber Express
No Result
View All Result
Home Features

Does Scambaiting Actually Deter Scammers?

Scambaiting is a tactic to keep scammers engaged as long as possible to prevent them from targeting others.

thecyberexpress by thecyberexpress
July 4, 2023
in Features
0
Scambaiting
698
SHARES
3.9k
VIEWS
Share on LinkedInShare on Twitter

by Zac Amos

Cybercrime has drastically increased in recent years, heavily impacting vulnerable people and organizations. In response, digital vigilantes took up scambaiting to get revenge on scammers.

While it may be a solution to an inadequate system, some argue it has little genuine effect. Does it actually deter anyone?

What Is Scambaiting?

Some experts project global annual cybercrime costs to reach $10.5 trillion by 2025, up from $3 trillion in 2015. It’s an ever-growing issue that needs attention.

Since individuals are most often a target, many responded by scambaiting. It originated as a response to excessive scam emails and calls but has grown in popularity as fraud becomes more rampant.

Basically, scambaiting is a tactic to keep scammers engaged as long as possible to prevent them from targeting others. It usually involves deception or social engineering methods on the scambaiter’s part.

report-ad-banner

They intentionally waste time and typically stall as much as possible. Many upload their interactions to the internet afterwards.

How Does Scambaiting Work?

Essentially, scambaiters are digital vigilantes that seek revenge on scammers. Some seek out fraud, while others only react after contact. Since fraud affects almost 4.6 million people annually, they typically don’t have to wait long.

Once they are speaking with a scammer, the scambaiters typically disguise themselves as naive and vulnerable. They pretend to genuinely believe whatever claims they are fed to prolong engagement. Since they are not actually interested, the interactions end up wasting the fraudster’s time and frustrating them.

For example, a scambaiter who receives an illegitimate email will respond and pretend to be oblivious to the fraud. They follow all of the scammer’s orders up to the point where they’d send money. Then, they either pretend to be incompetent to further stall or reveal their deception.

It encompasses all types of scams, so scambaiters are sometimes in contact for days or weeks before revealing themselves.

Many trick scammers into performing humiliating actions or revealing personal information. Some take it further and attempt to disrupt the fraud operation, whether through damaging their computers or publicizing their location.

Is Scambaiting Necessary?

According to the United Kingdom National Fraud Intelligence Bureau, COVID-related cybercrime reached $34.5 million in losses as of 2021. As long as digital fraud continues to increase, some form of scam prevention will be necessary.

While individuals using scambaiting may not be the best suited for the position, they are often the only ones who take action. Many legal and regulatory bodies don’t take scams seriously because they can be challenging to investigate.

As technology advances, so do scammer tactics.

For instance, they can create fake content with generative artificial intelligence in a few short minutes — and it’s more realistic than ever. Finding their true identity is much more challenging when they essentially produce faulty evidence of their existence — doing a reverse image search with original, unpublished content isn’t possible.

Police have struggled to pursue cybercrime because of the continuously increasing demand. They don’t have enough resources to cover all the new cases they receive, so many go unsolved.

Digital vigilantes potentially prevent more people from becoming victims of fraud. Their efforts may not have an incredibly significant impact, but collective action can help.

In addition, scambaiters often make up for the state’s insufficiencies. For example, Birmingham City University labeled the U.K.’s national fraud hotline as unfit for purpose in 2020 after investigations uncovered consistent inaction.

One discovered that it successfully pursued only one in 50 fraud cases and simply abandoned the others. Scambaiting may not be an ideal response, but it’s often the only solution available to most.

What Motivates Scambaiters?

Most internet vigilantes engage in scambaiting because they want retribution or feel a sense of justice. Most often, they seek to cause frustration and disorder — whatever will cause a significant impact.

Scambaiters have four primary motivators:

  • Raise awareness: People exposed to videos or descriptions of scambaiting are more likely to recognize fraud.
  • Deter scammers: Some take steps to damage a scammer’s resources or reputation, deterring them from future fraud attempts.
  • Prevent scams: Keeping a scammer occupied with a call that will go nowhere can protect others from being scammed. As long as they’re busy, they can’t cause actual harm.
  • Disrupt operations: Many attempt to cause significant damage or distress to have more long-term disruptions in the fraud operation.

Most scambaiters share these motivators. While they generally have good intentions and get positive results, some are more malicious. It’s an unregulated practice, so they have no set standards.

What Are the Disadvantages of Scambaiting?

While scambaiting can be a much faster alternative to regulated activities, it does come with potential disadvantages.

The 419eaters forum is a good example. It’s the self-described biggest scambaiting group in the world, with more than 1.7 million threads as of 2021.

Although its members put consistent effort into fraud disruption and prevention, their intent is sometimes misaligned.

Their system rewards certain activities. For example, the pith helmet award goes to people who can get their target to travel more than 200 miles in one trip.

They also often convince scammers to send nude graphic images because they can then post them online. Their goal is public humiliation.

The reward system incentivizes users to cause disproportional mental or physical strain. Many assume the fraudster’s malicious intentions justify this behavior, but does one immoral action justify another? A large, unregulated collective acting in such a capacity can potentially be dangerous.

What Are Potential Scambaiting Dangers?

Scambaiting can pose risks to the scambaiter as well as the fraudster. The people behind the deception are already willing to steal the life savings of vulnerable people, so there’s potential for more significant adverse reactions.

There are a few potential scambaiting dangers:

  • Disproportionate responses: Many people are driven by anger when scambaiting, which increases the likelihood of taking things too far. While some may feel their actions are just, they may only be seeking harm to get revenge on scammers.
  • Legal consequences: Many people want to give scammers a taste of their own medicine, but the law doesn’t protect their actions. Doing something illegal in pursuit of catching a scammer is still illegal.
  • Increased scam attempts: Scammers will continue to contact someone if they initially answer. Also, they will often bombard scambaiters with messages and calls in retribution.
  • Accidental information disclosure: Scambaiters can accidentally expose their personal information — like their IP address — while interacting with a scammer, which can open them up to a potentially dangerous response from the scammer.

People who seek revenge on scammers should be aware of potential scambaiting dangers to protect themselves. While retribution may be as minor as constant phone calls, it can quickly escalate.

Does Scambaiting Deter Scammers?

Although scambaiting has disadvantages and possible dangers, it’s a relatively common response to increased fraud levels. Scammers are targeting individuals at an unprecedented rate. Regulatory and legal bodies can’t handle their workloads and are resorting to case abandonment. Digital vigilantes may possess questionable motives and methods at times, but they offer many more options than the current system.

Applying standards to scambaiting could help ensure more legitimate and ethical practices. A cybercrime professor from the University of New South Wales believes more regulation and stricter payment barriers could reduce half of all scams at minimum.

However, given the scale that scammers operate at, scambaiters may not have the impact they hope for. Even if they succeed in deterring one scammer, that will likely not translate to deterring the scammer’s entire network. But while scambaiters may not make much of a dent in overall scamming activities, they are improving awareness.

Scambaiter content creators have risen in popularity in recent years, providing viewers with inside details on how scams work and bringing scam awareness into the public consciousness.

Scambaiting may not be the perfect solution, but it can still be a valid tactic in a system of inaction. More collective action in the future may genuinely deter scammers from defrauding vulnerable people, and the rise of scambaiters as content creators should help more people avoid being scammed themselves.

Share this:

  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Reddit (Opens in new window) Reddit
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
  • More
  • Email a link to a friend (Opens in new window) Email
  • Share on WhatsApp (Opens in new window) WhatsApp

Related

Tags: Scambaiting
Previous Post

What’s the Problem With Backdoor Encryption?

Next Post

AFP Cyber Attack: Anonymous Sudan Strikes Multiple Media Companies

Next Post
AFP Cyber Attack 3

AFP Cyber Attack: Anonymous Sudan Strikes Multiple Media Companies

Sectoral Threat Reports

❮ ❯
Cyble-Vision


Follow Us On Google News

Latest Cyber News

TCE weekly roundup cybersecurity news
Cyber News

The Cyber Express Weekly Roundup: Data Breaches, AI Risks, and Phishing Campaigns Dominate Cybersecurity Landscape

May 1, 2026
ChipSoft cyberattack
Firewall Daily

Dutch Health Tech Firm ChipSoft Confirms Destruction of Stolen Patient Data

April 30, 2026
APRA AI risk warning
Cyber News

Australia’s APRA Issues AI Risk Warning to Banks and Insurers

April 30, 2026
CVE-2026-41940
Firewall Daily

CVE-2026-41940: Critical cPanel Authentication Bypass Exposes Hosting Systems

April 30, 2026

Categories

Web Stories

Do This on Telegram, Your Bank Account Will Become Zero
Do This on Telegram, Your Bank Account Will Become Zero
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
Cricket World Cup Ticketing Systems Under Cybersecurity
Cricket World Cup Ticketing Systems Under Cybersecurity
Cyber Threats and Online Ticket Scams During the NBA Finals
Cyber Threats and Online Ticket Scams During the NBA Finals
Biometric Data Security: Protecting Sensitive Information
Biometric Data Security: Protecting Sensitive Information

About

The Cyber Express

#1 Trending Cybersecurity News and Magazine

The Cyber Express is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

 

Contact

For editorial queries: [email protected]

For marketing and Sales: [email protected]

 

Quick Links

  • About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
10080 North Wolfe Road, Suite SW3-200, Cupertino, CA, US 95014

 

India Office:

Cyber Express Media Network
HD-021, 4th Floor, C Wing, Building No.4. Nesco IT Park, WE Highway, Goregaon East, Mumbai, Maharashtra, India – 4000063

  • Privacy Statement
  • Terms of Use
  • Write For Us

© 2026 The Cyber Express - Cybersecurity News and Magazine.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Magazine
  • Firewall Daily
  • Essentials
    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board

© 2026 The Cyber Express - Cybersecurity News and Magazine.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?
-
00:00
00:00

Queue

Update Required Flash plugin
-
00:00
00:00
Do This on Telegram, Your Bank Account Will Become Zero If You Install the iOS 18 Beta, Your iPhone Could Be Hacked Cricket World Cup Ticketing Systems Under Cybersecurity Cyber Threats and Online Ticket Scams During the NBA Finals Biometric Data Security: Protecting Sensitive Information