{"id":96010,"date":"2026-01-17T09:30:00","date_gmt":"2026-01-17T08:30:00","guid":{"rendered":"https:\/\/ru.law\/?p=96010"},"modified":"2026-03-12T11:37:18","modified_gmt":"2026-03-12T10:37:18","slug":"kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht","status":"publish","type":"post","link":"https:\/\/ru.law\/nl\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\/","title":{"rendered":"Cryptofraude via deepfakes: hoe AI nieuwe oplichtingspraktijken mogelijk maakt."},"content":{"rendered":"<p>Cryptocurrencyfraude ontwikkelt zich razendsnel. Traditionele phishingmails worden steeds minder effectief, terwijl daders steeds vaker gebruikmaken van kunstmatige intelligentie en deepfake-technologie. Misleidend realistische video&#039;s, stemmen en live telefoongesprekken worden ingezet om vertrouwen te wekken en slachtoffers over te halen financi\u00eble transacties uit te voeren. Deze vorm van cryptofraude vertegenwoordigt een nieuwe escalatie in digitale economische criminaliteit.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Deepfakes als nieuw instrument bij beleggingsfraude<\/strong><\/h2>\n\n\n\n<p>Deepfakes zijn door AI gegenereerde content die op realistische wijze echte mensen nabootst. Stemmen, gezichtsuitdrukkingen en zelfs live reacties kunnen bijna perfect worden gerepliceerd. Deze technologie wordt steeds vaker gebruikt voor frauduleuze beleggingsaanbiedingen. Slachtoffers zien zogenaamd bekende persoonlijkheden, vertegenwoordigers van bedrijven of overheidsfunctionarissen die zogenaamd veilige crypto-investeringen aanprijzen of waarschuwen voor dringende veiligheidsproblemen.<\/p>\n\n\n\n<p>De combinatie van visuele en auditieve misleiding is bijzonder gevaarlijk. Wat eerst overduidelijk een poging tot fraude was, lijkt nu geloofwaardig en professioneel.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Enorme schade veroorzaakt door cryptofraude met behulp van AI.<\/strong><\/h2>\n\n\n\n<p>Internationale rapporten illustreren de omvang van deze trend. Alleen al in 2024 bedroegen de bekende verliezen door cryptovalutafraude wereldwijd enkele miljarden Amerikaanse dollars. Een aanzienlijk deel hiervan is toe te schrijven aan fraudeschema&#039;s die gebruikmaken van deepfakes. Rechtshandhavingsinstanties melden de ontdekking van tientallen fraudenetwerken, met name in Azi\u00eb, die specifiek gebruikmaken van AI-gebaseerde misleiding.<\/p>\n\n\n\n<p>Ook in westerse landen wordt een sterke stijging van het aantal gevallen gemeld. Het gebruik van AI leidt tot een hoger succespercentage per fraudegeval, omdat slachtoffers intensiever worden gemanipuleerd en langer betrokken blijven.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Schijnbaar authentieke autoriteit en gerichte manipulatie<\/strong><\/h2>\n\n\n\n<p>Een belangrijk kenmerk van moderne deepfake-fraude is de opzettelijke simulatie van autoriteit. Daders doen zich voor als bekende zakenmensen, beursmakelaars of overheidsfunctionarissen. In sommige gevallen gebruiken ze zelfs videogesprekken die meerdere dagen duren om slachtoffers onder psychologische druk te zetten. Deze vorm van zogenaamde digitale gijzeling combineert technologische misleiding met sociale dwang.<\/p>\n\n\n\n<p>Door middel van vervalste achtergronden, officieel ogende documenten en overtuigende taal wordt een situatie gecre\u00eberd waarin zelfs sceptische mensen beslissingen nemen die ze onder normale omstandigheden niet zouden nemen.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Deepfake-ondersteuningsgesprekken en toegang op afstand<\/strong><\/h2>\n\n\n\n<p>Een bijzonder wijdverbreide oplichtingstruc betreft deepfake-oproepen van zogenaamde supportmedewerkers van cryptobeursen. De door AI gegenereerde stemmen klinken authentiek en gebruiken technisch jargon. Slachtoffers worden gewaarschuwd voor vermeende beveiligingsincidenten en aangespoord om direct actie te ondernemen.<\/p>\n\n\n\n<p>Later vragen de daders vaak om toegang op afstand tot computers of smartphones. Onder het mom van een technische controle krijgen ze directe toegang tot digitale portemonnees, bankapps en beveiligingscodes. Binnen enkele minuten kunnen aanzienlijke bezittingen worden gestolen.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Doelgroep: oudere gebruikers en een groot aantal niet-gerapporteerde gevallen<\/strong><\/h2>\n\n\n\n<p>Statistieken tonen aan dat met name oudere gebruikers steeds vaker het slachtoffer worden. Velen zijn minder bekend met AI-stemklonen of nep-videogesprekken en vertrouwen op ogenschijnlijk offici\u00eble instructies. Het aantal niet-gemelde gevallen is hoog, omdat slachtoffers zich vaak schamen of de fraude pas laat herkennen.<\/p>\n\n\n\n<p>De werkelijke schade is daarom waarschijnlijk aanzienlijk hoger dan de bekende cijfers.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Juridische classificatie van deepfake-cryptofraude<\/strong><\/h2>\n\n\n\n<p>Vanuit juridisch oogpunt vormen deze situaties doorgaans beleggingsfraude, soms in combinatie met identiteitsdiefstal, computervraude en georganiseerde misdaad. De technische complexiteit bemoeilijkt onderzoeken, maar sluit juridische stappen niet uit. Betalingsstromen, communicatiegeschiedenis en technische toegangsgegevens kunnen aanknopingspunten bieden voor een onderzoek.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Waarom traditionele voorzichtigheid niet langer volstaat<\/strong><\/h2>\n\n\n\n<p>Deze ontwikkelingen tonen duidelijk aan dat visuele of auditieve verificatie alleen niet langer voldoende bescherming biedt. Deepfake-technologie omzeilt traditionele waarschuwingssignalen. De fraude berust niet langer op massale fraude, maar op gerichte, intensieve manipulatie van individuen, met aanzienlijke financi\u00eble verliezen tot gevolg.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Classificatie en juridische ondersteuning<\/strong><\/h2>\n\n\n\n<p>De professionalisering van cryptofraude met behulp van AI vereist een even professionele juridische reactie. <a href=\"https:\/\/ru.law\/nl\/kontakt\/\">RU-wet<\/a> is gespecialiseerd in het juridisch onderzoek naar cryptofraude en ondersteunt de gedupeerden bij het vaststellen van de feiten en het afdwingen van hun vorderingen.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-faqs-haufig-gestellte-fragen-zum-kryptobetrug\"><strong>Veelgestelde vragen over cryptofraude<\/strong><\/h2>\n\n\n<div class=\"wp-block-uagb-faq uagb-faq__outer-wrap uagb-block-ed0fa9cc uagb-faq-icon-row uagb-faq-layout-accordion uagb-faq-expand-first-true uagb-faq-inactive-other-true uagb-faq__wrap uagb-buttons-layout-wrap uagb-faq-equal-height\" data-faqtoggle=\"true\" role=\"tablist\"><div class=\"wp-block-uagb-faq-child uagb-faq-child__outer-wrap uagb-faq-item uagb-block-f9785a0e\" role=\"tab\" tabindex=\"0\"><div class=\"uagb-faq-questions-button uagb-faq-questions\">\t\t\t<span class=\"uagb-icon uagb-faq-icon-wrap\">\n\t\t\t\t\t\t\t\t<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox= \"0 0 448 512\"><path d=\"M432 256c0 17.69-14.33 32.01-32 32.01H256v144c0 17.69-14.33 31.99-32 31.99s-32-14.3-32-31.99v-144H48c-17.67 0-32-14.32-32-32.01s14.33-31.99 32-31.99H192v-144c0-17.69 14.33-32.01 32-32.01s32 14.32 32 32.01v144h144C417.7 224 432 238.3 432 256z\"><\/path><\/svg>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<span class=\"uagb-icon-active uagb-faq-icon-wrap\">\n\t\t\t\t\t\t\t\t<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox= \"0 0 448 512\"><path d=\"M400 288h-352c-17.69 0-32-14.32-32-32.01s14.31-31.99 32-31.99h352c17.69 0 32 14.3 32 31.99S417.7 288 400 288z\"><\/path><\/svg>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t<span class=\"uagb-question\">Wat is deepfake-cryptofraude?<\/span><\/div><div class=\"uagb-faq-content\"><p>Deepfake-cryptofraude verwijst naar oplichtingspraktijken waarbij kunstmatige intelligentie wordt gebruikt om bedrieglijk realistische video&#039;s of stemmen van echte mensen te cre\u00ebren. Deze content wordt gebruikt om vertrouwen te wekken en slachtoffers over te halen te investeren in cryptovaluta.<\/p><\/div><\/div><div class=\"wp-block-uagb-faq-child uagb-faq-child__outer-wrap uagb-faq-item uagb-block-eef02c53\" role=\"tab\" tabindex=\"0\"><div class=\"uagb-faq-questions-button uagb-faq-questions\">\t\t\t<span class=\"uagb-icon uagb-faq-icon-wrap\">\n\t\t\t\t\t\t\t\t<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox= \"0 0 448 512\"><path d=\"M432 256c0 17.69-14.33 32.01-32 32.01H256v144c0 17.69-14.33 31.99-32 31.99s-32-14.3-32-31.99v-144H48c-17.67 0-32-14.32-32-32.01s14.33-31.99 32-31.99H192v-144c0-17.69 14.33-32.01 32-32.01s32 14.32 32 32.01v144h144C417.7 224 432 238.3 432 256z\"><\/path><\/svg>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<span class=\"uagb-icon-active uagb-faq-icon-wrap\">\n\t\t\t\t\t\t\t\t<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox= \"0 0 448 512\"><path d=\"M400 288h-352c-17.69 0-32-14.32-32-32.01s14.31-31.99 32-31.99h352c17.69 0 32 14.3 32 31.99S417.7 288 400 288z\"><\/path><\/svg>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t<span class=\"uagb-question\">Hoe worden deepfakes gebruikt bij cryptofraude?<\/span><\/div><div class=\"uagb-faq-content\"><p>Daders gebruiken deepfakes om zich voor te doen als beroemdheden, zogenaamde beursmedewerkers of overheidsinstanties. Deze deepfake-video&#039;s of -gesprekken worden gebruikt om zogenaamd veilige crypto-investeringen te promoten of om te waarschuwen voor vermeende beveiligingsproblemen.<\/p><\/div><\/div><div class=\"wp-block-uagb-faq-child uagb-faq-child__outer-wrap uagb-faq-item uagb-block-7b6999cf\" role=\"tab\" tabindex=\"0\"><div class=\"uagb-faq-questions-button uagb-faq-questions\">\t\t\t<span class=\"uagb-icon uagb-faq-icon-wrap\">\n\t\t\t\t\t\t\t\t<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox= \"0 0 448 512\"><path d=\"M432 256c0 17.69-14.33 32.01-32 32.01H256v144c0 17.69-14.33 31.99-32 31.99s-32-14.3-32-31.99v-144H48c-17.67 0-32-14.32-32-32.01s14.33-31.99 32-31.99H192v-144c0-17.69 14.33-32.01 32-32.01s32 14.32 32 32.01v144h144C417.7 224 432 238.3 432 256z\"><\/path><\/svg>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<span class=\"uagb-icon-active uagb-faq-icon-wrap\">\n\t\t\t\t\t\t\t\t<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox= \"0 0 448 512\"><path d=\"M400 288h-352c-17.69 0-32-14.32-32-32.01s14.31-31.99 32-31.99h352c17.69 0 32 14.3 32 31.99S417.7 288 400 288z\"><\/path><\/svg>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t<span class=\"uagb-question\">Waarom zijn deepfake-fraudes bijzonder gevaarlijk?<\/span><\/div><div class=\"uagb-faq-content\"><p>Deepfakes lijken authentiek en negeren klassieke waarschuwingssignalen. Stem, gezichtsuitdrukkingen en spraak lijken geloofwaardig, waardoor zelfs sceptische mensen gemanipuleerd kunnen worden.<\/p><\/div><\/div><div class=\"wp-block-uagb-faq-child uagb-faq-child__outer-wrap uagb-faq-item uagb-block-a5f0bb69\" role=\"tab\" tabindex=\"0\"><div class=\"uagb-faq-questions-button uagb-faq-questions\">\t\t\t<span class=\"uagb-icon uagb-faq-icon-wrap\">\n\t\t\t\t\t\t\t\t<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox= \"0 0 448 512\"><path d=\"M432 256c0 17.69-14.33 32.01-32 32.01H256v144c0 17.69-14.33 31.99-32 31.99s-32-14.3-32-31.99v-144H48c-17.67 0-32-14.32-32-32.01s14.33-31.99 32-31.99H192v-144c0-17.69 14.33-32.01 32-32.01s32 14.32 32 32.01v144h144C417.7 224 432 238.3 432 256z\"><\/path><\/svg>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<span class=\"uagb-icon-active uagb-faq-icon-wrap\">\n\t\t\t\t\t\t\t\t<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox= \"0 0 448 512\"><path d=\"M400 288h-352c-17.69 0-32-14.32-32-32.01s14.31-31.99 32-31.99h352c17.69 0 32 14.3 32 31.99S417.7 288 400 288z\"><\/path><\/svg>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t<span class=\"uagb-question\">Welke rol spelen zogenaamde supportgesprekken bij deepfake-cryptofraude?<\/span><\/div><div class=\"uagb-faq-content\"><p>Daders doen zich vaak voor als medewerkers van de klantenservice van cryptobeursen. Met behulp van door AI gegenereerde stemmen eisen ze beveiligingsmaatregelen die in werkelijkheid leiden tot de overdracht van cryptovaluta of het verlenen van toegang op afstand.<\/p><\/div><\/div><div class=\"wp-block-uagb-faq-child uagb-faq-child__outer-wrap uagb-faq-item uagb-block-28b6f38a\" role=\"tab\" tabindex=\"0\"><div class=\"uagb-faq-questions-button uagb-faq-questions\">\t\t\t<span class=\"uagb-icon uagb-faq-icon-wrap\">\n\t\t\t\t\t\t\t\t<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox= \"0 0 448 512\"><path d=\"M432 256c0 17.69-14.33 32.01-32 32.01H256v144c0 17.69-14.33 31.99-32 31.99s-32-14.3-32-31.99v-144H48c-17.67 0-32-14.32-32-32.01s14.33-31.99 32-31.99H192v-144c0-17.69 14.33-32.01 32-32.01s32 14.32 32 32.01v144h144C417.7 224 432 238.3 432 256z\"><\/path><\/svg>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<span class=\"uagb-icon-active uagb-faq-icon-wrap\">\n\t\t\t\t\t\t\t\t<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox= \"0 0 448 512\"><path d=\"M400 288h-352c-17.69 0-32-14.32-32-32.01s14.31-31.99 32-31.99h352c17.69 0 32 14.3 32 31.99S417.7 288 400 288z\"><\/path><\/svg>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t<span class=\"uagb-question\">Kunnen ook ervaren gebruikers slachtoffer worden van deepfake-cryptofraude?<\/span><\/div><div class=\"uagb-faq-content\"><p>Ja. De technische kwaliteit van moderne deepfakes is zo hoog dat zelfs technisch onderlegde of economisch ervaren mensen de fraude niet direct herkennen.<\/p><\/div><\/div><div class=\"wp-block-uagb-faq-child uagb-faq-child__outer-wrap uagb-faq-item uagb-block-922e0bf1\" role=\"tab\" tabindex=\"0\"><div class=\"uagb-faq-questions-button uagb-faq-questions\">\t\t\t<span class=\"uagb-icon uagb-faq-icon-wrap\">\n\t\t\t\t\t\t\t\t<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox= \"0 0 448 512\"><path d=\"M432 256c0 17.69-14.33 32.01-32 32.01H256v144c0 17.69-14.33 31.99-32 31.99s-32-14.3-32-31.99v-144H48c-17.67 0-32-14.32-32-32.01s14.33-31.99 32-31.99H192v-144c0-17.69 14.33-32.01 32-32.01s32 14.32 32 32.01v144h144C417.7 224 432 238.3 432 256z\"><\/path><\/svg>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<span class=\"uagb-icon-active uagb-faq-icon-wrap\">\n\t\t\t\t\t\t\t\t<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox= \"0 0 448 512\"><path d=\"M400 288h-352c-17.69 0-32-14.32-32-32.01s14.31-31.99 32-31.99h352c17.69 0 32 14.3 32 31.99S417.7 288 400 288z\"><\/path><\/svg>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t<span class=\"uagb-question\">Welke waarschuwingssignalen duiden op cryptofraude met deepfakes?<\/span><\/div><div class=\"uagb-faq-content\"><p>Typische signalen zijn onder andere onverwachte telefoontjes, tijdsdruk, verzoeken om toegang op afstand, vermeende beveiligingsproblemen en ongebruikelijke betalingsinstructies in cryptovaluta.<\/p><\/div><\/div><div class=\"wp-block-uagb-faq-child uagb-faq-child__outer-wrap uagb-faq-item uagb-block-910f255b\" role=\"tab\" tabindex=\"0\"><div class=\"uagb-faq-questions-button uagb-faq-questions\">\t\t\t<span class=\"uagb-icon uagb-faq-icon-wrap\">\n\t\t\t\t\t\t\t\t<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox= \"0 0 448 512\"><path d=\"M432 256c0 17.69-14.33 32.01-32 32.01H256v144c0 17.69-14.33 31.99-32 31.99s-32-14.3-32-31.99v-144H48c-17.67 0-32-14.32-32-32.01s14.33-31.99 32-31.99H192v-144c0-17.69 14.33-32.01 32-32.01s32 14.32 32 32.01v144h144C417.7 224 432 238.3 432 256z\"><\/path><\/svg>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<span class=\"uagb-icon-active uagb-faq-icon-wrap\">\n\t\t\t\t\t\t\t\t<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox= \"0 0 448 512\"><path d=\"M400 288h-352c-17.69 0-32-14.32-32-32.01s14.31-31.99 32-31.99h352c17.69 0 32 14.3 32 31.99S417.7 288 400 288z\"><\/path><\/svg>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t<span class=\"uagb-question\">Waarom zijn cryptovaluta bijzonder geschikt voor deepfake-fraude?<\/span><\/div><div class=\"uagb-faq-content\"><p>Cryptovaluta maken snelle, grensoverschrijdende transacties mogelijk en bieden daders een hoge mate van anonimiteit. Eenmaal overgedragen, is de waarde meestal onomkeerbaar.<\/p><\/div><\/div><div class=\"wp-block-uagb-faq-child uagb-faq-child__outer-wrap uagb-faq-item uagb-block-44975cc3\" role=\"tab\" tabindex=\"0\"><div class=\"uagb-faq-questions-button uagb-faq-questions\">\t\t\t<span class=\"uagb-icon uagb-faq-icon-wrap\">\n\t\t\t\t\t\t\t\t<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox= \"0 0 448 512\"><path d=\"M432 256c0 17.69-14.33 32.01-32 32.01H256v144c0 17.69-14.33 31.99-32 31.99s-32-14.3-32-31.99v-144H48c-17.67 0-32-14.32-32-32.01s14.33-31.99 32-31.99H192v-144c0-17.69 14.33-32.01 32-32.01s32 14.32 32 32.01v144h144C417.7 224 432 238.3 432 256z\"><\/path><\/svg>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<span class=\"uagb-icon-active uagb-faq-icon-wrap\">\n\t\t\t\t\t\t\t\t<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox= \"0 0 448 512\"><path d=\"M400 288h-352c-17.69 0-32-14.32-32-32.01s14.31-31.99 32-31.99h352c17.69 0 32 14.3 32 31.99S417.7 288 400 288z\"><\/path><\/svg>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t<span class=\"uagb-question\">Hoe hoog is de schade die wordt veroorzaakt door cryptofraude met deepfakes?<\/span><\/div><div class=\"uagb-faq-content\"><p>Internationaal loopt de schade in de miljarden. Autoriteiten melden een sterke toename van het aantal gevallen, met name fraude met behulp van door AI aangedreven misleiding.<\/p><\/div><\/div><div class=\"wp-block-uagb-faq-child uagb-faq-child__outer-wrap uagb-faq-item uagb-block-7ab03cea\" role=\"tab\" tabindex=\"0\"><div class=\"uagb-faq-questions-button uagb-faq-questions\">\t\t\t<span class=\"uagb-icon uagb-faq-icon-wrap\">\n\t\t\t\t\t\t\t\t<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox= \"0 0 448 512\"><path d=\"M432 256c0 17.69-14.33 32.01-32 32.01H256v144c0 17.69-14.33 31.99-32 31.99s-32-14.3-32-31.99v-144H48c-17.67 0-32-14.32-32-32.01s14.33-31.99 32-31.99H192v-144c0-17.69 14.33-32.01 32-32.01s32 14.32 32 32.01v144h144C417.7 224 432 238.3 432 256z\"><\/path><\/svg>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<span class=\"uagb-icon-active uagb-faq-icon-wrap\">\n\t\t\t\t\t\t\t\t<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox= \"0 0 448 512\"><path d=\"M400 288h-352c-17.69 0-32-14.32-32-32.01s14.31-31.99 32-31.99h352c17.69 0 32 14.3 32 31.99S417.7 288 400 288z\"><\/path><\/svg>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t<span class=\"uagb-question\">Is cryptofraude met deepfakes strafbaar?<\/span><\/div><div class=\"uagb-faq-content\"><p>Ja. Juridisch gezien wordt het doorgaans beschouwd als beleggingsfraude, soms aangevuld met identiteitsdiefstal, computervraude of commerci\u00eble activiteiten.<\/p><\/div><\/div><div class=\"wp-block-uagb-faq-child uagb-faq-child__outer-wrap uagb-faq-item uagb-block-ab813d0e\" role=\"tab\" tabindex=\"0\"><div class=\"uagb-faq-questions-button uagb-faq-questions\">\t\t\t<span class=\"uagb-icon uagb-faq-icon-wrap\">\n\t\t\t\t\t\t\t\t<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox= \"0 0 448 512\"><path d=\"M432 256c0 17.69-14.33 32.01-32 32.01H256v144c0 17.69-14.33 31.99-32 31.99s-32-14.3-32-31.99v-144H48c-17.67 0-32-14.32-32-32.01s14.33-31.99 32-31.99H192v-144c0-17.69 14.33-32.01 32-32.01s32 14.32 32 32.01v144h144C417.7 224 432 238.3 432 256z\"><\/path><\/svg>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<span class=\"uagb-icon-active uagb-faq-icon-wrap\">\n\t\t\t\t\t\t\t\t<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox= \"0 0 448 512\"><path d=\"M400 288h-352c-17.69 0-32-14.32-32-32.01s14.31-31.99 32-31.99h352c17.69 0 32 14.3 32 31.99S417.7 288 400 288z\"><\/path><\/svg>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t<span class=\"uagb-question\">Wie biedt steun aan slachtoffers van deepfake-cryptofraude?<\/span><\/div><div class=\"uagb-faq-content\"><p>RU Law is gespecialiseerd in de juridische afhandeling van cryptofraude en ondersteunt slachtoffers bij het vaststellen van de feiten en het afdwingen van hun vorderingen.<\/p><\/div><\/div><\/div>\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>Der Betrug mit Kryptow\u00e4hrungen entwickelt sich rasant weiter. W\u00e4hrend klassische Phishing-Mails zunehmend an Wirkung verlieren, setzen T\u00e4ter vermehrt auf k\u00fcnstliche Intelligenz und Deepfake-Technologie. T\u00e4uschend echte [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":96007,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[1220,1448],"tags":[1415,1225,1419,1413,1408,1224],"class_list":["post-96010","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bank-und-kapitalmarktrecht","category-krypto","tag-anlagebtrug","tag-betrug","tag-deepfake","tag-kryptobetrug","tag-kryptowaehrung","tag-online-banking"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Kryptobetrug durch Deepfakes: KI erm\u00f6glciht neue Betrugsmasche - R&amp;U<\/title>\n<meta name=\"description\" content=\"Wie KI mit gef\u00e4lschten Videos und Stimmen neue Betrugsmaschen erm\u00f6glicht \u2013 Risiken, Sch\u00e4den und rechtliche Einordnung.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ru.law\/nl\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Kryptobetrug durch Deepfakes \u2013 wie KI neue Betrugsmaschen erm\u00f6glicht\" \/>\n<meta property=\"og:description\" content=\"Wie KI mit gef\u00e4lschten Videos und Stimmen neue Betrugsmaschen erm\u00f6glicht \u2013 Risiken, Sch\u00e4den und rechtliche Einordnung.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ru.law\/nl\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\/\" \/>\n<meta property=\"og:site_name\" content=\"R&amp;U\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/RogertUlbrich\/\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-17T08:30:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-12T10:37:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ru.law\/wp-content\/uploads\/2026\/01\/AdobeStock_747785012-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Stefan Selge\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@RogertUlbrich\" \/>\n<meta name=\"twitter:site\" content=\"@RogertUlbrich\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/ru.law\\\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ru.law\\\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\\\/\"},\"author\":{\"name\":\"Stefan Selge\",\"@id\":\"https:\\\/\\\/ru.law\\\/#\\\/schema\\\/person\\\/10e5b85e615f8a9d0bb96174432e1e1a\"},\"headline\":\"Kryptobetrug durch Deepfakes \u2013 wie KI neue Betrugsmaschen erm\u00f6glicht\",\"datePublished\":\"2026-01-17T08:30:00+00:00\",\"dateModified\":\"2026-03-12T10:37:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/ru.law\\\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\\\/\"},\"wordCount\":628,\"publisher\":{\"@id\":\"https:\\\/\\\/ru.law\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/ru.law\\\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ru.law\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/AdobeStock_747785012-scaled.jpeg\",\"keywords\":[\"Anlagebtrug\",\"Betrug\",\"Deepfake\",\"Kryptobetrug\",\"Kryptow\u00e4hrung\",\"Online-Banking\"],\"articleSection\":[\"Bank- und Kapitalmarktrecht\",\"Krypto\"],\"inLanguage\":\"nl-NL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ru.law\\\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\\\/\",\"url\":\"https:\\\/\\\/ru.law\\\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\\\/\",\"name\":\"Kryptobetrug durch Deepfakes: KI erm\u00f6glciht neue Betrugsmasche - R&amp;U\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ru.law\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/ru.law\\\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/ru.law\\\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ru.law\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/AdobeStock_747785012-scaled.jpeg\",\"datePublished\":\"2026-01-17T08:30:00+00:00\",\"dateModified\":\"2026-03-12T10:37:18+00:00\",\"description\":\"Wie KI mit gef\u00e4lschten Videos und Stimmen neue Betrugsmaschen erm\u00f6glicht \u2013 Risiken, Sch\u00e4den und rechtliche Einordnung.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ru.law\\\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\\\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ru.law\\\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/ru.law\\\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\\\/#primaryimage\",\"url\":\"https:\\\/\\\/ru.law\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/AdobeStock_747785012-scaled.jpeg\",\"contentUrl\":\"https:\\\/\\\/ru.law\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/AdobeStock_747785012-scaled.jpeg\",\"width\":2560,\"height\":1440,\"caption\":\"Deepfake deep learning fake news generator modern internet technology concept.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ru.law\\\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/ru.law\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Kryptobetrug durch Deepfakes \u2013 wie KI neue Betrugsmaschen erm\u00f6glicht\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ru.law\\\/#website\",\"url\":\"https:\\\/\\\/ru.law\\\/\",\"name\":\"R&U\",\"description\":\"Verbraucheranw\u00e4lte\",\"publisher\":{\"@id\":\"https:\\\/\\\/ru.law\\\/#organization\"},\"alternateName\":\"Rogert & Ulbrich\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ru.law\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/ru.law\\\/#organization\",\"name\":\"Kanzlei Rogert & Ulbrich\",\"url\":\"https:\\\/\\\/ru.law\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/ru.law\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/ru.law\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/logo-ru-law.svg\",\"contentUrl\":\"https:\\\/\\\/ru.law\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/logo-ru-law.svg\",\"width\":992,\"height\":259,\"caption\":\"Kanzlei Rogert & Ulbrich\"},\"image\":{\"@id\":\"https:\\\/\\\/ru.law\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/RogertUlbrich\\\/\",\"https:\\\/\\\/x.com\\\/RogertUlbrich\",\"https:\\\/\\\/www.instagram.com\\\/rogertulbrich\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/rogert-ulbrich\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCganCgpvwpPFqMFf1vVmG2A\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/ru.law\\\/#\\\/schema\\\/person\\\/10e5b85e615f8a9d0bb96174432e1e1a\",\"name\":\"Stefan Selge\",\"url\":\"https:\\\/\\\/ru.law\\\/nl\\\/author\\\/selge\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Kryptobetrug durch Deepfakes: KI erm\u00f6glciht neue Betrugsmasche - R&amp;U","description":"Wie KI mit gef\u00e4lschten Videos und Stimmen neue Betrugsmaschen erm\u00f6glicht \u2013 Risiken, Sch\u00e4den und rechtliche Einordnung.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ru.law\/nl\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\/","og_locale":"nl_NL","og_type":"article","og_title":"Kryptobetrug durch Deepfakes \u2013 wie KI neue Betrugsmaschen erm\u00f6glicht","og_description":"Wie KI mit gef\u00e4lschten Videos und Stimmen neue Betrugsmaschen erm\u00f6glicht \u2013 Risiken, Sch\u00e4den und rechtliche Einordnung.","og_url":"https:\/\/ru.law\/nl\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\/","og_site_name":"R&amp;U","article_publisher":"https:\/\/www.facebook.com\/RogertUlbrich\/","article_published_time":"2026-01-17T08:30:00+00:00","article_modified_time":"2026-03-12T10:37:18+00:00","og_image":[{"width":2560,"height":1440,"url":"https:\/\/ru.law\/wp-content\/uploads\/2026\/01\/AdobeStock_747785012-scaled.jpeg","type":"image\/jpeg"}],"author":"Stefan Selge","twitter_card":"summary_large_image","twitter_creator":"@RogertUlbrich","twitter_site":"@RogertUlbrich","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ru.law\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\/#article","isPartOf":{"@id":"https:\/\/ru.law\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\/"},"author":{"name":"Stefan Selge","@id":"https:\/\/ru.law\/#\/schema\/person\/10e5b85e615f8a9d0bb96174432e1e1a"},"headline":"Kryptobetrug durch Deepfakes \u2013 wie KI neue Betrugsmaschen erm\u00f6glicht","datePublished":"2026-01-17T08:30:00+00:00","dateModified":"2026-03-12T10:37:18+00:00","mainEntityOfPage":{"@id":"https:\/\/ru.law\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\/"},"wordCount":628,"publisher":{"@id":"https:\/\/ru.law\/#organization"},"image":{"@id":"https:\/\/ru.law\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\/#primaryimage"},"thumbnailUrl":"https:\/\/ru.law\/wp-content\/uploads\/2026\/01\/AdobeStock_747785012-scaled.jpeg","keywords":["Anlagebtrug","Betrug","Deepfake","Kryptobetrug","Kryptow\u00e4hrung","Online-Banking"],"articleSection":["Bank- und Kapitalmarktrecht","Krypto"],"inLanguage":"nl-NL"},{"@type":"WebPage","@id":"https:\/\/ru.law\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\/","url":"https:\/\/ru.law\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\/","name":"Kryptobetrug durch Deepfakes: KI erm\u00f6glciht neue Betrugsmasche - R&amp;U","isPartOf":{"@id":"https:\/\/ru.law\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ru.law\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\/#primaryimage"},"image":{"@id":"https:\/\/ru.law\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\/#primaryimage"},"thumbnailUrl":"https:\/\/ru.law\/wp-content\/uploads\/2026\/01\/AdobeStock_747785012-scaled.jpeg","datePublished":"2026-01-17T08:30:00+00:00","dateModified":"2026-03-12T10:37:18+00:00","description":"Wie KI mit gef\u00e4lschten Videos und Stimmen neue Betrugsmaschen erm\u00f6glicht \u2013 Risiken, Sch\u00e4den und rechtliche Einordnung.","breadcrumb":{"@id":"https:\/\/ru.law\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ru.law\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\/"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/ru.law\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\/#primaryimage","url":"https:\/\/ru.law\/wp-content\/uploads\/2026\/01\/AdobeStock_747785012-scaled.jpeg","contentUrl":"https:\/\/ru.law\/wp-content\/uploads\/2026\/01\/AdobeStock_747785012-scaled.jpeg","width":2560,"height":1440,"caption":"Deepfake deep learning fake news generator modern internet technology concept."},{"@type":"BreadcrumbList","@id":"https:\/\/ru.law\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/ru.law\/"},{"@type":"ListItem","position":2,"name":"Kryptobetrug durch Deepfakes \u2013 wie KI neue Betrugsmaschen erm\u00f6glicht"}]},{"@type":"WebSite","@id":"https:\/\/ru.law\/#website","url":"https:\/\/ru.law\/","name":"R&amp;U","description":"Consumentenadvocaten","publisher":{"@id":"https:\/\/ru.law\/#organization"},"alternateName":"Rogert & Ulbrich","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ru.law\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/ru.law\/#organization","name":"Advocatenkantoor Rogert &amp; Ulbrich","url":"https:\/\/ru.law\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/ru.law\/#\/schema\/logo\/image\/","url":"https:\/\/ru.law\/wp-content\/uploads\/2020\/12\/logo-ru-law.svg","contentUrl":"https:\/\/ru.law\/wp-content\/uploads\/2020\/12\/logo-ru-law.svg","width":992,"height":259,"caption":"Kanzlei Rogert & Ulbrich"},"image":{"@id":"https:\/\/ru.law\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/RogertUlbrich\/","https:\/\/x.com\/RogertUlbrich","https:\/\/www.instagram.com\/rogertulbrich\/","https:\/\/www.linkedin.com\/company\/rogert-ulbrich\/","https:\/\/www.youtube.com\/channel\/UCganCgpvwpPFqMFf1vVmG2A"]},{"@type":"Person","@id":"https:\/\/ru.law\/#\/schema\/person\/10e5b85e615f8a9d0bb96174432e1e1a","name":"Stefan Selge","url":"https:\/\/ru.law\/nl\/author\/selge\/"}]}},"uagb_featured_image_src":{"full":["https:\/\/ru.law\/wp-content\/uploads\/2026\/01\/AdobeStock_747785012-scaled.jpeg",2560,1440,false],"thumbnail":["https:\/\/ru.law\/wp-content\/uploads\/2026\/01\/AdobeStock_747785012-scaled.jpeg",128,72,false],"medium":["https:\/\/ru.law\/wp-content\/uploads\/2026\/01\/AdobeStock_747785012-scaled.jpeg",2560,1440,false],"medium_large":["https:\/\/ru.law\/wp-content\/uploads\/2026\/01\/AdobeStock_747785012-768x432.jpeg",768,432,true],"large":["https:\/\/ru.law\/wp-content\/uploads\/2026\/01\/AdobeStock_747785012-scaled.jpeg",2560,1440,false],"1536x1536":["https:\/\/ru.law\/wp-content\/uploads\/2026\/01\/AdobeStock_747785012-1536x864.jpeg",1536,864,true],"2048x2048":["https:\/\/ru.law\/wp-content\/uploads\/2026\/01\/AdobeStock_747785012-2048x1152.jpeg",2048,1152,true],"trp-custom-language-flag":["https:\/\/ru.law\/wp-content\/uploads\/2026\/01\/AdobeStock_747785012-18x10.jpeg",18,10,true]},"uagb_author_info":{"display_name":"Stefan Selge","author_link":"https:\/\/ru.law\/nl\/author\/selge\/"},"uagb_comment_info":0,"uagb_excerpt":"Der Betrug mit Kryptow\u00e4hrungen entwickelt sich rasant weiter. W\u00e4hrend klassische Phishing-Mails zunehmend an Wirkung verlieren, setzen T\u00e4ter vermehrt auf k\u00fcnstliche Intelligenz und Deepfake-Technologie. T\u00e4uschend echte [&hellip;]","_links":{"self":[{"href":"https:\/\/ru.law\/nl\/wp-json\/wp\/v2\/posts\/96010","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ru.law\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ru.law\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ru.law\/nl\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ru.law\/nl\/wp-json\/wp\/v2\/comments?post=96010"}],"version-history":[{"count":0,"href":"https:\/\/ru.law\/nl\/wp-json\/wp\/v2\/posts\/96010\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ru.law\/nl\/wp-json\/wp\/v2\/media\/96007"}],"wp:attachment":[{"href":"https:\/\/ru.law\/nl\/wp-json\/wp\/v2\/media?parent=96010"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ru.law\/nl\/wp-json\/wp\/v2\/categories?post=96010"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ru.law\/nl\/wp-json\/wp\/v2\/tags?post=96010"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}