AI-Powered Obituary Scams: The New Frontier in Targeted Phishing
Threat actors now leverage language models to extract personal information from obituaries, creating hyper-personalized scams targeting grieving relatives. The elderly face heightened risk due to emotional vulnerability and limited AI literacy.

Dall-E 3
Public obituaries serve as digital memorials honoring loved ones. They also function as data goldmines for sophisticated scammers wielding artificial intelligence. This emerging threat exploits grief and technological unfamiliarity, creating a perfect storm for fraud targeting society’s most vulnerable members.
Cybercriminals now scan obituaries using AI tools, extracting intimate personal details to craft convincing impersonations. These hyper-personalized approaches exceed traditional phishing detection thresholds, particularly when targeting emotionally distressed individuals with limited technical awareness.
LEARN: What Is Narrative Intelligence?
The Anatomy of an Obituary-Based Scam
Consider the wealth of personal information in typical obituaries: birthplaces, career histories, hobbies, family connections, achievements, and sometimes addresses. This information provides scammers with everything needed to convincingly portray long-lost friends, former colleagues, distant relatives, school classmates, or professional acquaintances.
Even basic obituaries contain sufficient detail for language models to generate compelling personas. Take a hypothetical “William P. Anderson” obituary mentioning Harvard attendance, a finance career, and a passion for golf. A scammer can instantly become William’s Harvard classmate with shared memories, a colleague from his early banking days, a golf buddy from his club, a Massachusetts friend with a regional dialect, or a fellow finance professional using industry-specific terminology.
These scams succeed through strategic vulnerability exploitation. Bereaved individuals—particularly elderly spouses—experience cognitive impairment from grief, reducing their critical thinking abilities precisely when needed most. Furthermore, bereaved individuals are more likely to be older – therefore more likely to experience loss of loved ones – and less familiar with burgeoning tech that enables high resolution, tailored communication.
Amplified Vulnerability Factors
Several factors increase susceptibility to these sophisticated attacks. Emotional vulnerability fundamentally alters cognitive processing. Research shows bereaved individuals demonstrate a reduced ability to detect manipulation while simultaneously experiencing an increased desire for social connection. This creates optimal conditions for exploitation.
The generational digital divide compounds this vulnerability. Older populations typically possess less familiarity with artificial intelligence capabilities. Many cannot conceive that scammers access technology capable of generating authentic-sounding conversations with accurate personal references.
Wealth targeting is crucial as scammers deliberately focus on affluent communities, reviewing obituaries from high-income areas. They prioritize targets with significant financial assets and limited technical knowledge—a combination prevalent among elderly widows and widowers.
Advanced threat actors simultaneously deploy multiple fake identities, creating networks of seemingly legitimate contacts. Each validates the others, establishing false credibility through manufactured social proof. This multi-modal approach significantly enhances persuasiveness.
Scammers amplify obituary information with additional sources: news articles, corporate profiles, social media posts, and professional publications. This supplemental data integration creates comprehensive profiles, enabling hyper-targeted approaches that appear legitimate even under moderate scrutiny.
Real-World Application Methodology
The execution typically follows a systematic pattern. Scammers begin with identification, scanning obituaries, and focusing on financially comfortable families with elderly survivors. They then move to data extraction, using large language models to process the obituary and supplemental information, extracting relationship details, career information, locations, periods, and personal interests.
The persona generation phase involves AI creating complete character profiles matching the target’s life circumstances—someone who plausibly crossed paths with the deceased. Once developed, contact initiation begins through email, text, or social media, expressing condolences and establishing connections through shared memories.
Trust building forms the critical middle phase. The scammer shares specific fabricated memories with accurate contextual details, building psychological comfort through seemingly intimate knowledge. The exploitation phase begins only after establishing this foundation, with the scammer introducing financial requests, phishing links, or attempts to extract sensitive information.
The technical sophistication paired with emotional manipulation creates unprecedented effectiveness. Traditional advice like “verify sender addresses” proves insufficient against these contextually rich approaches designed to bypass common security awareness training.
Defensive Technologies and Strategies
Protection requires both technological solutions and increased awareness. Blackbird.AI’s Compass represents a crucial defensive technology designed to identify AI-generated content. The platform analyzes messages, images, and overall communication patterns, flagging suspicious elements before victims provide sensitive information.
Compass detects various AI manipulation signals, including generated images of purported “friends,” statistically improbable language patterns, inconsistencies between claimed identity and communication style, and contextual incongruities typical in AI-generated personas.
Verification protocols must evolve beyond simple checks. Families should establish multi-factor authentication processes for unexpected contacts, requiring verifiable connections through multiple known individuals before engaging in substantive discussions about personal or financial matters.
Family protection networks provide another critical defense layer. Families should implement monitoring systems for vulnerable members, particularly after significant loss events. Designated technology-savvy relatives should review suspicious communications and serve as verification intermediaries.
Institutional safeguards must adapt to these emerging threats. Financial institutions serving elderly clients should implement additional verification requirements for unusual transactions following documented life changes like spousal death. These protocols must balance security with dignity, avoiding patronizing approaches while ensuring adequate protection.
Education remains critical but must be approached thoughtfully. The imperative is to create awareness without inducing paralyzing anxiety by focusing on simple verification procedures rather than technical explanations. This approach empowers vulnerable individuals without overwhelming them with complex technological concepts.
Organizations serving elderly populations should enhance protective measures by implementing staff training addressing grief-targeted scams. This training should emphasize technical and emotional vulnerability factors while providing clear intervention protocols.
The Way Forward
Organizational leaders must prepare for the evolution of AI-powered scams targeting vulnerable populations. Key strategic priorities include:
- Develop Comprehensive Threat Models – Organizations must create specific defense plans against AI-powered impersonation attacks targeting emotionally vulnerable clients. These models should include both technical detection capabilities and human-centered validation processes.
- Implement Cognitive Security Training – Staff need specialized education focusing on grief-exploitation tactics. This training should emphasize identifying cognitive vulnerabilities during bereavement periods and establishing appropriate protection mechanisms.
- Deploy Cross-Generational Protection Networks – Organizations should facilitate family-based monitoring systems connecting technology-fluent younger relatives with vulnerable elderly clients, creating balanced protection that preserves autonomy while preventing exploitation.
The intersection of artificial intelligence, emotional vulnerability, and financial exploitation presents unprecedented challenges. Organizations can protect their most vulnerable community members from these sophisticated attacks through vigilance, education, and appropriate technological countermeasures.
- To receive a complimentary copy of The Forrester External Threat Intelligence Landscape 2025 Report, visit here.
- To learn more about how Blackbird.AI can help you in these situations, book a demo.

Rennie Westcott • Senior Intelligence Analyst
Rennie Westcott is a Senior Intelligence Analyst at Blackbird.AI - researching & uncovering disinformation networks and state-backed information campaigns for public sector and private enterprise clients. Rennie specializes in deep & dark web investigations, and has deep experience investigating chat and forum sites for foreign malign influence campaigns, propaganda, and fraud.
Rennie Westcott is a Senior Intelligence Analyst at Blackbird.AI - researching & uncovering disinformation networks and state-backed information campaigns for public sector and private enterprise clients. Rennie specializes in deep & dark web investigations, and has deep experience investigating chat and forum sites for foreign malign influence campaigns, propaganda, and fraud.
Need help protecting your organization?
Book a demo today to learn more about Blackbird.AI.