Dating Sites Fraudster Alert

UK online crime prevention agency Action Fraud have become aware of techniques used by romance fraudsters against people using dating sites. Not only will they steal your heart they will steal your money and your identification.

When you think you’ve met the perfect partner through an online dating website or app, but the other person is using a fake profile to form a relationship with you. They’re using the site to gain your trust and ask you for money or enough personal information to steal your identity.

A dating fraudster, previously involved in deceiving people that wanted a friendship explained how they would create fake accounts with social media platforms so that their details matched and could be searched. By appearing to be a real person their fake persona could be corroborated by prospective partners searching their background and believe them to be genuine. The fraudster said:

 “People like to live in fairy tales to say it won’t happen to me. I make sure all my conversations are bespoke. I will show insecurity myself about trusting people and this helps allude to them that I’m genuine.”

The fraudster will also utilise as many accessible online research tools to explore people’s information for their own personal gain or sell onwards. The fraudster elaborated and explained:

“I use various online directories to find out about the person. Once I have enough, I use it to milk everything I can using their details or sell them on to other fraudsters via the dark web”

When asked how people could check if a person is real. The romance fraudster offered advice for others searching for a relationship. They told us that after you see a picture of them:

 “Ask for them to send you another photo of themselves posing with their thumbs up or waving. It’s like a form of 2 factor authentication and makes it hard to do if it’s not an original picture”

What you need to do

  • Avoid sharing too many personal details when on online dating profiles. Revealing your full name, date of birth, or full home address may lead to your identity being stolen.
  • Never respond to any requests to send money, or have money transferred into your account by someone you don’t know and trust. These types of requests should always raise a red flag. If something feels wrong, then it is usually right to question it.
  • Pick a reputable dating website or app, and use the built-in messaging service. Fraudsters want to quickly switch to social media or texting so there’s no evidence of them asking you for money.

Action Fraud

You Might Also Read: 

Spies Use Tinder:

 

« Russian Hacking Intensifies Closer To Ukrainian Election
Take An Analytical Approach To Cybersecurity Training »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Slovenian Digital Coalition

Slovenian Digital Coalition

Slovenian Digital Coalition is a coalition working in the field of smart cities, e-commerce, e-skills, e-inclusion, cyber security, internet and other areas related to developing the digital society.

SITA

SITA

SITA is a multinational information technology company providing IT and telecommunication services to the air transport industry including vulnerability assessments and managed security services.

Lumu Technologies

Lumu Technologies

Lumu is a cybersecurity company that illuminates threats and attacks affecting enterprises worldwide.

Keeper Security

Keeper Security

Keeper is a leading enterprise password manager and cybersecurity platform for preventing password-related data breaches and cyberthreats.

Nexum

Nexum

Nexum takes a comprehensive approach to security, from detecting and preventing network threats, to equipping you with the information, tools and training you need to effectively manage IT risk.

RealCISO

RealCISO

RealCISO is a CISO grade cloud platform to help companies understand, manage, and mitigate their cyber risk.

Snowflake

Snowflake

Empower your cybersecurity and compliance teams with Snowflake. Gain full visibility into security logs, at massive scale, while reducing costs of Security Information and Event Management systems.

Netlinkz

Netlinkz

Netlinkz has developed the Virtual Secure Network (VSN) overlay technology platform, a breakthrough in connectivity security, speed, and simplicity.

OptimEyes.ai

OptimEyes.ai

OptimEyes.ai is a unique AI-powered, on-demand SaaS solution for cyber-security, data privacy and compliance risk modeling.

Commonwealth Scientific & Industrial Research Organisation (CSIRO)

Commonwealth Scientific & Industrial Research Organisation (CSIRO)

CSIRO is Australia's national science agency. We solve the greatest challenges through innovative science and technology.

Tozny

Tozny

Tozny offers products with security and privacy in mind that are built on the foundation of end-to-end encryption, and open-source verifiable software.

Telesign

Telesign

Telesign connect, protect, and defend online experiences with sophisticated digital identity and programmable communications solutions.

Oxford Information Labs (OXIL)

Oxford Information Labs (OXIL)

Oxford Information Labs brings together world-class software programmers and policy experts to provide a unique mix of expertise and hands on technical solutions.

appNovi

appNovi

appNovi inventories everything to map the attack surface, identify missing security agents, and prioritize vulnerabilities based on exposure.

Boston Government Services (BGS)

Boston Government Services (BGS)

Boston Government Services is an engineering, technology, and security firm providing mission-focused solutions for the clean energy, nuclear, and federal programs markets.

ZENDATA

ZENDATA

ZENDATA are an innovative provider of intelligent, tailored cybersecurity solutions to global companies and public sector institutions.