Technology
How sneaky scammers are using AI to get you to buy fake Super Bowl tickets
If you’re one of the lucky fans who managed to get tickets to the Super Bowl, congratulations. You’re in for a thrilling experience. But if you’re still looking for tickets and are tempted by offers on social media platforms, beware. You might end up with a fake ticket and a lot of disappointment.
Counterfeit tickets are a serious issue that affects many major events, especially the Super Bowl. According to members of the intelligence team at managed intelligence company Nisos, scammers are actively seeking victims who are hoping to get last-minute tickets to the Super Bowl, often preying on their desperation and the scarcity of tickets to take advantage of them.
Nisos has been compiling a data dive on counterfeit Super Bowl tickets for this Sunday’s big game and has uncovered some alarming findings.
CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS, AND EASY HOW-TO’S TO MAKE YOU SMARTER
NFL footballs and Lombardi Trophy (Kurt “CyberGuy” Knutsson)
What are the new tactics scammers are using to trick you into buying counterfeit Super Bowl tickets?
Scam tactic No. 1 — Using image editing software
One of the most common ways that scammers create fake tickets is by using image editing software to generate documents mimicking legitimate tickets, such as receipts. They may also use stolen or forged barcodes or QR codes to make the tickets look more authentic. Nisos found several instances of such fake tickets being advertised on social media platforms, such as Facebook, Instagram and X.
SERIAL FOOTBALL TICKET SCAMMER FUGITIVE WITH VICTIMS NATIONWIDE CAPTURED IN GEORGIA
Nisos found several instances of such fake tickets being advertised on social media platforms, such as Facebook, Instagram and X. The one below was posted on X.
Fake Super Bowl ticket ad on social media (Nisos)
MORE: THE MOST TALKED-ABOUT SUPER BOWL ADS OF 2024
Scam tactic No. 2 — Leveraging automation and AI
Another technique that scammers use is to leverage automation and potentially artificial intelligence in order to identify and target victims based on language used in posts. For example, Nisos received responses from scammers within less than a minute after including typical buzzwords and hashtags used by people wanting to buy tickets, such as #SuperBowl, #SuperBowlTickets or #LookingForTickets. These responses often contained links to other platforms, such as WhatsApp, Telegram or Cash App, where the scammers would try to finalize the deal.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
#SuperBowlTickets (Kurt “CyberGuy” Knutsson)
MORE: HOW TO SCORE GREAT DEAL ON TV BEFORE SUPER BOWL
Scam tactic No. 3 — Avoiding detection by using cross-platforms
Scammers also use cross-platform operations to evade detection and bans by social media platforms. They will identify and initiate communications with you on one social media platform before requesting you switch to another. This is likely in an attempt to prevent one social media platform from gaining full insight into the fraudulent activity and banning the accounts.
Nisos observed that scammers often used multiple accounts on different platforms, such as Facebook, Instagram, X, WhatsApp, Telegram, Cash App, Venmo, and Zelle, to conduct their scams.
MORE: HOW TO PROTECT YOURSELF FROM VENMO, ZELLE, CASH APP SCAM THAT CAN WIPE OUT YOUR SAVINGS IN SECONDS
Scam tactic No. 4 — Offering massive discounts
Finally, scammers may offer massive discounts for soon-occurring events, such as the Super Bowl, to entice you to buy quickly. They may state they just want to sell the tickets “last minute” to justify large, attractive discounts, such as 50% off or more. The discussion below started after Niso analysts put out a public post for Super Bowl tickets and the scammers engaged through DMs.
They may also claim to have a personal or professional reason for not being able to attend the event, such as a family emergency or a work conflict. Nisos found that scammers often used these excuses to pressure victims into making hasty decisions and transferring money without verifying the tickets.
MORE: HOW TO AVOID BEING VICTIM OF THIS SNEAKY FACEBOOK MARKETPLACE SCAM
How counterfeit ticket scammers use compromised and fake accounts to evade detection
One of the challenges of identifying and tracking the scammers behind counterfeit ticket scams is that they often use compromised social media accounts to carry out their operations. These accounts may belong to real people who have had their accounts hacked or stolen by the scammers, or to fake personas created by the scammers using stolen or fabricated personal information. Nisos identified multiple instances when the account’s username, display name, and names on their associated payment accounts were all attributed to separate individuals.
Scammers may also use identity fraud to create or access bank accounts and payment applications that they use to receive money from victims. They may use stolen or forged identification documents, such as driver’s licenses, passports, or social security cards, to open or verify these accounts. Nisos found that scammers often used different names and identities on different platforms, making it difficult to trace the money flow and the real identities of the scammers.
MORE: HOW CASH PAYMENT APP SCAMS ARE SWINDLING MONEY
How can you protect yourself from counterfeit ticket scams?
The best way to protect yourself from counterfeit ticket scams is to be vigilant and cautious when buying tickets online, especially through social media platforms. Here are seven tips that can help you spot and avoid potential scams:
1. Beware of scammers using social engineering techniques. For example, they may encourage you to transfer money immediately as they allegedly have other prospective buyers. They may also use emotional appeals, such as sympathy, guilt, or urgency, to manipulate you into making a decision. Nisos found that scammers often used these tactics to pressure victims into paying before verifying the tickets.
2. Be wary of individuals showing receipts or proof of purchase. This is not a guarantee that an individual is in possession of a ticket, and it can be easily faked. Nisos found several examples of fake receipts that scammers used to convince victims that they had bought the tickets from legitimate sources, such as Ticketmaster, StubHub, or SeatGeek.
GET MORE OF MY SECURITY ALERTS, QUICK TIPS & EASY VIDEO TUTORIALS WITH THE FREE CYBERGUY NEWSLETTER – CLICK HERE
3. Exercise caution when interacting with individuals asking for you to “name your price” or are selling below ticket value. This may be a sign that they are trying to lure you into a scam with a too-good-to-be-true offer. Nisos found that scammers often used this strategy to attract victims who were looking for cheap or affordable tickets.
4. Be cautious when interacting with people claiming to sell tickets on behalf of a friend or family member. This may provide an excuse for scammers using compromised bank accounts with the account holder’s name different from the social media account being used. Nisos found that scammers often used this pretext to explain the discrepancy between the names on the accounts.
5. Review the account’s recent history, as some scammers may claim to be selling tickets to multiple high-profile events, such as sports games, music concerts, and conferences at one time. This may indicate that they are running a large-scale scam operation and are not genuine sellers. Nisos found that scammers often posted multiple ads for different events on the same or different platforms, using the same or similar images and descriptions.
6. Exercise caution and validate ownership even when purchasing items from friends or friends of friends on social media. Nisos identified multiple instances when a family member or friend’s account was compromised and used by a scammer. Friends of the victim vouched for the account user as a legitimate seller, not realizing the account had been hacked.
SCAM ALERT: THAT PARKING TICKET MIGHT NOT BE REAL
7. Our No. 1 tip to avoid becoming a victim of purchasing counterfeit tickets is to avoid buying tickets through social media platforms. This exposes you to a high risk of getting scammed by counterfeit tickets and losing your money and your chance to enjoy the Super Bowl.
Instead, purchase tickets through official and reputable sources, such as the NFL, Ticketmaster, StubHub or SeatGeek. These platforms have security measures and guarantees that protect you from fraud and ensure that the tickets are authentic and valid.
Super Bowl tickets being sold on a legitimate site (StubHub)
MORE: HOW TO GET YOUR TV GAME-READY FOR THE SUPER BOWL
Kurt’s key takeaways
Counterfeit ticket scams are a serious and prevalent problem that affects many fans who want to attend the Super Bowl. Scammers use various tactics and techniques to create fake tickets, target and deceive victims and evade detection and attribution. You can protect yourself from these scams by being vigilant and cautious when buying tickets online, especially through social media platforms. The best way to avoid getting scammed by counterfeit tickets is to buy tickets through official and reputable sources, such as the NFL, Ticketmaster, StubHub, or SeatGeek. By following these tips, you can ensure that you get to enjoy the Super Bowl safely and securely without falling victim to crooks.
What do you think social media platforms and authorities can do more to prevent and combat counterfeit ticket scams? Let us know by writing us at Cyberguy.com/Contact.
For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.
Ask Kurt a question or let us know what stories you’d like us to cover.
Answers to the most asked CyberGuy questions:
Copyright 2024 CyberGuy.com. All rights reserved.
Technology
Anker’s last-gen sleep buds are nearly 40 percent off ahead of daylight saving time
Bad news: most Americans are about to lose an hour of sleep next week. Good news: if you have trouble falling (or staying asleep), Newegg is currently selling Anker’s Soundcore Sleep A20 earbuds for $113.99 ($66 off) when you use coupon code MMSF88 at checkout, which drops them to just $6 shy of their lowest price to date.
A couple of us here at The Verge are fans of Anker’s last-gen sleep buds, which do a good job of muffling disruptive noises (including snoring). They’re lightweight and comfortable enough to wear overnight, even while sleeping on your side, with multiple ear tips and wings for a personalized fit. In fact, in his review, my colleague Thomas Ricker said that they improved his average sleep time by nearly 30 minutes within a two-week period.
What’s even more convenient is that they offer a variety of sleep-focused features to help you rest better. For example, you can use them to play a range of relaxing sounds, from meditation exercises and nature clips to white noise. You can use them as a regular pair of Bluetooth earbuds, too, just in case you prefer to listen to audiobooks or your own curated sleep playlist. They even come with adjustable EQ as well, though we wouldn’t recommend using them as your primary earbuds for music, given that they can’t match the audio quality you’d get from a pair of midrange earbuds from Apple, Sony, or Bose.
In addition, the Sleep A20 offer up to 14 hours of battery life and sleep tracking, providing insights into how long and how well you’ve slept via a companion app that also details your sleep positions and movements. The newer Soundcore Sleep A30 feature active noise cancellation, which is more effective at masking sounds than the A20’s passive isolation, but Anker’s last-gen earbuds remain a decent, budget-friendly option that can help you comfortably tune out most nighttime distractions for nearly half the price.
Technology
Figure data breach exposes nearly 1M accounts
Cyber expert shares tips to avoid AI phishing scams
Kurt ‘The CyberGuy’ Knutsson shares practical ways to avoid falling victim to AI-generated phishing scams and discusses a report that North Korean agents are posing as I.T. workers to funnel money into the country’s nuclear program.
NEWYou can now listen to Fox News articles!
If you have applied for a loan online, you probably shared more than you realized. Your name. Your email. Your date of birth. Maybe even your home address and phone number. Now imagine all of that sitting on a dark web forum.
That is the reality for nearly 1 million people after hackers breached Figure Technology Solutions, a blockchain-focused fintech lender.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
What happened in the Figure data breach
Figure Technology Solutions, founded in 2018, uses the Provenance blockchain for lending, borrowing and securities trading. The company says it has unlocked more than $22 billion in home equity through partnerships with banks, credit unions, fintechs and home improvement companies. However, behind the scenes, attackers were working on a very different angle.
GOOGLE DROPPED DARK WEB MONITORING: SHOULD YOU CARE?
Nearly 1 million accounts were exposed after hackers breached fintech lender Figure Technology Solutions in a social engineering attack. (Felix Zahn/Photothek via Getty Images)
According to breach notification data shared by Have I Been Pwned, information from 967,200 accounts was exposed. The leaked data included more than 900,000 unique email addresses along with names, phone numbers, physical addresses and dates of birth. That is a gold mine for identity thieves. Figure says the incident stemmed from a social engineering attack. What that means in simple terms is that someone inside the company was tricked into handing over access.
“We recently identified that an employee was socially engineered, and that allowed an actor to download a limited number of files through their account,” a Figure Technology Solutions spokesperson told CyberGuy in a statement. “We acted quickly to block the activity and retained a forensic firm to investigate what files were affected. We understand the importance of these matters and are communicating with partners and those impacted as appropriate. We are also implementing additional safeguards and training to further strengthen our defenses. We are offering complimentary credit monitoring to all individuals who receive a notice. We continuously monitor accounts and have strong safeguards in place to protect customers’ funds and accounts.”
Social engineering is the real weapon
When people hear the word blockchain, they think secure and untouchable. But attackers did not break cryptography. They targeted a human being. Groups like ShinyHunters specialize in this playbook. They reportedly claimed responsibility for the breach and, according to BleepingComputer, posted 2.5GB of data allegedly tied to thousands of loan applicants.
In recent weeks, the same group has claimed breaches involving companies like Canada Goose, Panera Bread and SoundCloud. Not every case is connected. Still, security researchers have observed a troubling pattern. Attackers impersonate IT support. They call employees. They create urgency. Then they direct victims to fake login portals that look nearly identical to real ones.
Once employees enter credentials and even multi-factor authentication codes, attackers gain access to single sign-on systems tied to major platforms like Microsoft and Google. From there, one compromised account can unlock a web of connected tools and internal systems.
PANERA BREAD DATA BREACH EXPOSES 5.1M CUSTOMERS
Security researchers say the Figure data leak underscores how social engineering bypasses even blockchain-based platforms. (Maxim Konankov/NurPhoto via Getty Images)
Why this matters to you
If your information was part of the Figure data breach, criminals now have enough detail to craft convincing phishing emails or phone scams. They can reference your real name. They can cite your address. They can pretend to be a lender or bank calling about your application.
Even if you never applied for a loan with Figure, this incident highlights something bigger. No platform is immune to human error. And social engineering works because it targets trust, not technology.
The bigger lesson about blockchain and trust
Figure markets itself as blockchain native. Blockchain can provide transparency and strong cryptographic security. However, none of that protects against a well-crafted phone call.
Security failures often happen at the human layer. That is where attackers focus their energy. As more financial services move online, the attack surface grows. Loan applications, identity verification tools and cloud-based systems create convenience. They also create new targets.
How to protect yourself after the Figure data breach
You cannot control how companies secure their systems. You can control how you respond. Start by checking whether your email address appears in the exposed dataset, then take the steps below to lock down your accounts.
SUBSTACK DATA BREACH EXPOSES EMAILS AND PHONE NUMBERS
Figure says an employee was tricked into granting access, allowing attackers to download sensitive customer data. (Luke MacGregor/Bloomberg via Getty Images)
Check if your email was exposed
To see if your email address was affected, visit https://haveibeenpwned.com/. Enter your email address to find out whether your information appears in the leak. When finished, return here and begin Step 1 below.
Take these steps immediately
- Change any exposed passwords right away. Do not leave a known leaked password in place. Update it everywhere you used it. Use a password manager to create strong, unique passwords for every account. Check out the best expert-reviewed password managers of 2026 at Cyberguy.com
- Turn on multi-factor authentication wherever possible.
- Never share login codes with anyone, even if they claim to be IT support.
- Install strong antivirus software to help block phishing links, malicious downloads and ransomware that often follow major breaches. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.
- Consider a data removal service to reduce your personal information on data broker sites, which scammers often combine with breached data. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.
- Place a free fraud alert or credit freeze with the major credit bureaus.
- Monitor your bank and credit card statements weekly for suspicious activity.
Also, be cautious of unexpected calls about your accounts. If someone pressures you to act immediately, hang up and call the company directly using a number from its official website.
Kurt’s key takeaways
The Figure data breach is a reminder that technology alone cannot protect sensitive information. A single employee tricked into revealing credentials can expose hundreds of thousands of people. That is not a blockchain failure. It is a trust failure. If your data was involved, take action now. Even if it was not, treat this as a wake-up call. Your personal information has value. Criminals know it. Companies should know it too.
If one phone call can unlock nearly a million records, are companies investing enough in training people, or are they still betting everything on technology alone? Let us know by writing to us at Cyberguy.com
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
Apple’s website leaks MacBook ‘Neo,’ which could be its new cheaper laptop
During Apple’s week-long product launch event on Tuesday, a listing for the “MacBook Neo (Model A3404)” appeared on a regulatory compliance page on Apple’s website under its line-up of 2026 MacBooks. First spotted by MacRumors, the listing appears to be an accident and has since been removed, but may have been a leaked reference to a rumored entry-level MacBook. Unfortunately, it didn’t include any additional details beyond the device’s name and model number.
The lower price and an “entirely new design” could help the new MacBook appeal to students and casual users, competing with Chromebooks and low-cost Windows laptops. A more affordable MacBook could be especially appealing after Apple announced the M5 MacBook Air on Tuesday, which has a higher starting price than last year’s Air.
-
World6 days agoExclusive: DeepSeek withholds latest AI model from US chipmakers including Nvidia, sources say
-
Massachusetts7 days agoMother and daughter injured in Taunton house explosion
-
Denver, CO7 days ago10 acres charred, 5 injured in Thornton grass fire, evacuation orders lifted
-
Louisiana1 week agoWildfire near Gum Swamp Road in Livingston Parish now under control; more than 200 acres burned
-
Oregon5 days ago2026 OSAA Oregon Wrestling State Championship Results And Brackets – FloWrestling
-
Florida3 days agoFlorida man rescued after being stuck in shoulder-deep mud for days
-
Maryland3 days agoAM showers Sunday in Maryland
-
Culture1 week agoTry This Quiz on Thrilling Books That Became Popular Movies