Description: Fraudsters repurposed an old interview with Apple CEO Tim Cook using AI or video editing to promote a fake crypto event on YouTube. The altered video was designed to mislead viewers into believing Tim Cook endorsed a new cryptocurrency scheme. The stream attracted tens of thousands of viewers, potentially exposing them to the scam before it was removed for violating YouTube’s terms of service.
Entities
View all entitiesAlleged: Unknown deepfake technology developers developed an AI system deployed by Unknown deepfake creators and scammers, which harmed Tim Cook , Apple , YouTube viewers , Cryptocurrency investors and General public.
Incident Stats
Risk Subdomain
A further 23 subdomains create an accessible and understandable classification of hazards and harms associated with AI
4.3. Fraud, scams, and targeted manipulation
Risk Domain
The Domain Taxonomy of AI Risks classifies risks into seven AI risk domains: (1) Discrimination & toxicity, (2) Privacy & security, (3) Misinformation, (4) Malicious actors & misuse, (5) Human-computer interaction, (6) Socioeconomic & environmental harms, and (7) AI system safety, failures & limitations.
- Malicious Actors & Misuse
Entity
Which, if any, entity is presented as the main cause of the risk
Human
Timing
The stage in the AI lifecycle at which the risk is presented as occurring
Post-deployment
Intent
Whether the risk is presented as occurring as an expected or unexpected outcome from pursuing a goal
Intentional
Incident Reports
Reports Timeline
Someone on YouTube was live streaming an old interview with Tim Cook that was seemingly being used to attract attention to a crypto scam --- and when it was live, tens of thousands of viewers were tuning.
If you've seen crypto scams on YouT…
Apple's Far Out event, where it announced the new iPhone 14 and many other new devices, was immediately used to promote a crypto scam on YouTube.
Hijacking important events to promote or trick people into participating in crypto scams is be…
Variants
A "variant" is an incident that shares the same causative factors, produces similar harms, and involves the same intelligent systems as a known AI incident. Rather than index variants as entirely separate incidents, we list variations of incidents under the first similar incident submitted to the database. Unlike other submission types to the incident database, variants are not required to have reporting in evidence external to the Incident Database. Learn more from the research paper.
Similar Incidents
Did our AI mess up? Flag the unrelated incidents

Hackers Break Apple Face ID
· 24 reports

Images of Black People Labeled as Gorillas
· 24 reports
Similar Incidents
Did our AI mess up? Flag the unrelated incidents

Hackers Break Apple Face ID
· 24 reports

Images of Black People Labeled as Gorillas
· 24 reports