Dating Sites Fraudster Alert

UK online crime prevention agency Action Fraud have become aware of techniques used by romance fraudsters against people using dating sites. Not only will they steal your heart they will steal your money and your identification.

When you think you’ve met the perfect partner through an online dating website or app, but the other person is using a fake profile to form a relationship with you. They’re using the site to gain your trust and ask you for money or enough personal information to steal your identity.

A dating fraudster, previously involved in deceiving people that wanted a friendship explained how they would create fake accounts with social media platforms so that their details matched and could be searched. By appearing to be a real person their fake persona could be corroborated by prospective partners searching their background and believe them to be genuine. The fraudster said:

 “People like to live in fairy tales to say it won’t happen to me. I make sure all my conversations are bespoke. I will show insecurity myself about trusting people and this helps allude to them that I’m genuine.”

The fraudster will also utilise as many accessible online research tools to explore people’s information for their own personal gain or sell onwards. The fraudster elaborated and explained:

“I use various online directories to find out about the person. Once I have enough, I use it to milk everything I can using their details or sell them on to other fraudsters via the dark web”

When asked how people could check if a person is real. The romance fraudster offered advice for others searching for a relationship. They told us that after you see a picture of them:

 “Ask for them to send you another photo of themselves posing with their thumbs up or waving. It’s like a form of 2 factor authentication and makes it hard to do if it’s not an original picture”

What you need to do

  • Avoid sharing too many personal details when on online dating profiles. Revealing your full name, date of birth, or full home address may lead to your identity being stolen.
  • Never respond to any requests to send money, or have money transferred into your account by someone you don’t know and trust. These types of requests should always raise a red flag. If something feels wrong, then it is usually right to question it.
  • Pick a reputable dating website or app, and use the built-in messaging service. Fraudsters want to quickly switch to social media or texting so there’s no evidence of them asking you for money.

Action Fraud

You Might Also Read: 

Spies Use Tinder:

 

« Russian Hacking Intensifies Closer To Ukrainian Election
Take An Analytical Approach To Cybersecurity Training »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

SecDev

SecDev

SecDev is a consulting firm working at the intersection of geopolitical, digital, urban, energy and cyber risk.

GFI Software

GFI Software

GFI Software works with System Administrators, IT Professionals and IT Executives to ensure that their IT infrastructures are monitored, managed, secured and compliant.

Payload Security

Payload Security

Payload Security's VxStream Sandbox is a fully automated malware analysis system.

Foundation Futuristic Technologies (FFT)

Foundation Futuristic Technologies (FFT)

FFT is a global leader in computer forensics and digital investigation solutions.

Compass Security

Compass Security

Compass Security is a specialist IT Security consultancy firm based in Switzerland. Services include pentesting, security assessments, digital forensics and security training.

CyberPoint

CyberPoint

CyberPoint delivers innovative, leading-edge cyber security products, solutions, and services to customers worldwide.

Proteus

Proteus

Proteus is an Information Security consulting firm specialized in Risk Analysis and Executive Control.

Kuratorium Sicheres Österreich (KSO)

Kuratorium Sicheres Österreich (KSO)

KSO is an independent non-profit association that has set itself the goal of making Austria safer as a national networking and information platform for topics of internal security.

Elliptic

Elliptic

Elliptic solve the crucial problem of identity in cryptocurrencies, with the sole purpose of combating suspicious and criminal activity.

Matrix42

Matrix42

Matrix42 software for digital workspace experience manages devices, applications, processes and services simple, secure and compliant.

Combis

Combis

COMBIS is a regional high-tech ICT company focused on the development of application, communication, security and system solutions and the provision of services.

Data Security Inc

Data Security Inc

Data Security, Inc. is the leading American manufacturer and supplier of hard drive degaussers, magnetic tape degaussers as well as hard drive and solid state destruction devices.

TAC Security (TAC Infosec)

TAC Security (TAC Infosec)

TAC Security (aka TAC Infosec) is a leading and trusted cyber security consulting partner that specializes in securing the IT infrastructure and assets of enterprises.

National CyberWatch Center

National CyberWatch Center

National CyberWatch Center is a cybersecurity consortium working to advance cybersecurity education and strengthen the national workforce.

Elastio

Elastio

Elastio's cloud-native platform safeguards cloud data from the risks posed by ransomware, application failures and storage security vulnerabilities.

RealDefense

RealDefense

RealDefense develops and markets various privacy, security and optimization technologies and services for consumers and small businesses.

Ronet Cyber Security

Ronet Cyber Security

Ronet Cyber Security offers crypto forensics services for regulators, law enforcement, companies and individuals to ensure that your transactions are safe and secure.