INC-26-0001 confirmed high Disrupting malicious uses of AI: June 2025 | OpenAI (2026)
OpenAI (model developer) developed and Multiple state-affiliated and criminal threat actors deployed large language models, harming General public and Targeted individuals in influence operations ; possible contributing factors include weaponization and social engineering.
Incident Details
| Date Occurred | 2026-02-18 |
| Severity | high |
| Evidence Level | corroborated |
| Impact Level | Sector-wide |
| Domain | Information Integrity |
| Primary Pattern | PAT-INF-002 Deepfake Identity Hijacking |
| Secondary Patterns | PAT-INF-006 AI-Enabled Fraud |, PAT-SEC-009 AI-Powered Social Engineering |
| Regions | unknown |
| Sectors | Cross-Sector |
| Affected Groups | Business Organizations, Government Institutions |
| Exposure Pathways | Adversarial Targeting |
| Causal Factors | Weaponization, Social Engineering |
| Assets & Technologies | Large Language Models |
| Entities | OpenAI (model developer)(developer), ·Multiple state-affiliated and criminal threat actors(deployer) |
| Harm Types | societal, operational |
OpenAI published a report documenting how threat actors from multiple countries attempted to use its models for malicious purposes including surveillance, influence operations, and social engineering, detailing its disruption efforts. Named operations include 'Operation Date Bait' (Indonesian romance scam network), 'Operation False Witness' (fake FBI law firms for fraud), and 'Operation Fish Food' (Russia's Rybar propaganda campaign).
Incident Summary
OpenAI published its malicious use disruption report in February 2026, documenting multiple threat actor operations that exploited its AI models for fraud, propaganda, and social engineering.[1] Three named operations were disclosed: “Operation Date Bait,” an Indonesian romance scam network that used ChatGPT to generate convincing persona interactions and emotional manipulation scripts; “Operation False Witness,” which created fake FBI-affiliated law firm websites and communications for fraud; and “Operation Fish Food,” Russia’s Rybar propaganda campaign that used OpenAI models to generate and refine influence operation content.[2][3] The report represents OpenAI’s most detailed public disclosure of how its AI models are exploited by criminal and state-sponsored actors, providing named operations with enough specificity to enable industry-wide threat intelligence sharing.[4] The diversity of the operations — spanning romance fraud, legal impersonation, and state propaganda — demonstrates that AI-enabled malicious use is not concentrated in a single threat category but spans the full spectrum of social engineering and information manipulation.
Key Facts
- Operation Date Bait: Indonesian romance scam network using ChatGPT for victim manipulation[2]
- Operation False Witness: Fake FBI law firms created for fraud operations[2]
- Operation Fish Food: Russia’s Rybar propaganda campaign using OpenAI models[3]
- Disclosure: OpenAI’s most detailed public malicious use report[1]
- Scope: Criminal and state-sponsored operations across multiple countries
Threat Patterns Involved
Primary: Deepfake Identity Hijacking — Operation Date Bait and Operation False Witness both involve the creation of fake identities — romantic personas and fake law firms respectively — using AI to generate convincing communications that impersonate real or fabricated entities.
Secondary: AI-Enabled Fraud — The romance scam and fake law firm operations represent AI-enabled fraud at scale, where ChatGPT’s language generation capabilities enable more convincing and higher-volume fraud operations than manual approaches.
Secondary: Social Engineering via AI — All three operations leverage AI for social engineering — manipulating victims’ emotions (Date Bait), trust in institutions (False Witness), and information environment (Fish Food).
Significance
- Named operations enable threat intelligence — The disclosure of specific operation names and methods enables industry-wide threat intelligence sharing, allowing other platforms to detect similar patterns
- Criminal and state-sponsored convergence — The report documents both criminal (Date Bait, False Witness) and state-sponsored (Fish Food/Rybar) operations using the same AI platform, demonstrating convergence across threat actor types
- Romance scam AI automation — Operation Date Bait demonstrates that AI has been adopted for romance scam operations, enabling scammers to maintain more convincing and simultaneous conversations with multiple victims
- Institutional impersonation at scale — Operation False Witness’s creation of fake FBI-affiliated law firms demonstrates how AI enables the impersonation of trusted institutions with sufficient fidelity to deceive victims
Timeline
OpenAI publishes malicious use disruption report
Operation Date Bait disclosed: Indonesian romance scam network using ChatGPT
Operation False Witness disclosed: fake FBI law firms for fraud
Operation Fish Food disclosed: Russia's Rybar propaganda campaign
Outcomes
- Regulatory Action:
- OpenAI disrupted and disclosed multiple threat actor operations
Use in Retrieval
INC-26-0001 documents Disrupting malicious uses of AI: June 2025 | OpenAI, a high-severity incident classified under the Information Integrity domain and the Deepfake Identity Hijacking threat pattern (PAT-INF-002). It occurred in Unknown (2026-02-18). This page is maintained by TopAIThreats.com as part of an evidence-based registry of AI-enabled threats. Cite as: TopAIThreats.com, "Disrupting malicious uses of AI: June 2025 | OpenAI," INC-26-0001, last updated 2026-03-29.
Sources
- OpenAI Disrupting Malicious Uses of AI Report (research, 2026-02)
https://openai.com/global-affairs/disrupting-malicious-uses-of-ai-june-2025/ (opens in new tab) - OpenAI malicious use operations: Date Bait, False Witness, Fish Food (news, 2026-02)
https://helpnetsecurity.com (opens in new tab) - OpenAI disrupts romance scam and propaganda operations (news, 2026-02)
https://claimsjournal.com (opens in new tab) - AI-powered fraud and state-sponsored operations analysis (analysis, 2026-02)
https://pymnts.com (opens in new tab)
Update Log
- — Draft generated from discovery pipeline (Status: Emerging, Evidence: Single-source)
- — Updated with C80 data: added three named operations (Date Bait, False Witness, Fish Food), additional sources, timeline, upgraded status/severity/evidence