Dating Sites Fraudster Alert

UK online crime prevention agency Action Fraud have become aware of techniques used by romance fraudsters against people using dating sites. Not only will they steal your heart they will steal your money and your identification.

When you think you’ve met the perfect partner through an online dating website or app, but the other person is using a fake profile to form a relationship with you. They’re using the site to gain your trust and ask you for money or enough personal information to steal your identity.

A dating fraudster, previously involved in deceiving people that wanted a friendship explained how they would create fake accounts with social media platforms so that their details matched and could be searched. By appearing to be a real person their fake persona could be corroborated by prospective partners searching their background and believe them to be genuine. The fraudster said:

 “People like to live in fairy tales to say it won’t happen to me. I make sure all my conversations are bespoke. I will show insecurity myself about trusting people and this helps allude to them that I’m genuine.”

The fraudster will also utilise as many accessible online research tools to explore people’s information for their own personal gain or sell onwards. The fraudster elaborated and explained:

“I use various online directories to find out about the person. Once I have enough, I use it to milk everything I can using their details or sell them on to other fraudsters via the dark web”

When asked how people could check if a person is real. The romance fraudster offered advice for others searching for a relationship. They told us that after you see a picture of them:

 “Ask for them to send you another photo of themselves posing with their thumbs up or waving. It’s like a form of 2 factor authentication and makes it hard to do if it’s not an original picture”

What you need to do

  • Avoid sharing too many personal details when on online dating profiles. Revealing your full name, date of birth, or full home address may lead to your identity being stolen.
  • Never respond to any requests to send money, or have money transferred into your account by someone you don’t know and trust. These types of requests should always raise a red flag. If something feels wrong, then it is usually right to question it.
  • Pick a reputable dating website or app, and use the built-in messaging service. Fraudsters want to quickly switch to social media or texting so there’s no evidence of them asking you for money.

Action Fraud

You Might Also Read: 

Spies Use Tinder:

 

« Russian Hacking Intensifies Closer To Ukrainian Election
Take An Analytical Approach To Cybersecurity Training »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

TitanFile

TitanFile

TitanFile is an award-winning, easy and secure way for professionals to communicate without having to worry about security and privacy.

CCN-CERT

CCN-CERT

CCN-CERT is the Spanish national government computer security incident response centre.

Allgress

Allgress

Allgress solutions converge disparate risk silos across enterprise networks and automate governance, risk and compliance management processes.

ABB

ABB

ABB is a pioneering technology leader in industrial digitalization. Services include cyber security for industrial control systems IoT.

Delta Risk

Delta Risk

Delta Risk is a global provider of managed security services and cyber security risk management solutions to government and private sector clients.

GOVCERT.lu

GOVCERT.lu

GOVCERT.lu is responsible for the treatment of all computer related incidents jeopardising the information systems of the government and defined critical infrastructure operators in Luxembourg.

Nextcloud

Nextcloud

Nextcloud offers offers solutions to the combined need of security and ubiquitous access to data and collaboration technology.

itbox.online

itbox.online

Itbox.online offers IT solutions to ensure that your company's technologies are always available and secure as your business demands.

ITonlinelearning

ITonlinelearning

ITonlinelearning specialises in providing professional certification courses to help aspiring and seasoned IT professionals develop their careers.

Cyber Resilience Centre for Wales (WCRC)

Cyber Resilience Centre for Wales (WCRC)

The Cyber Resilience Centre for Wales (WCRC) is part of the national roll out of Cyber Resilience Centres in the UK which began in 2019.

Cisco Systems

Cisco Systems

Cisco helps seize the opportunities of tomorrow by proving that amazing things can happen when you connect the unconnected.

Curatrix Technologies

Curatrix Technologies

Curatrix Technologies is a Managed IT Service provider based in Hampshire, UK, providing high quality and reliable Managed IT Services since 2015.

CV-Library

CV-Library

Start your job search with 216,931 live UK vacancies on award-winning CV-Library. Register your CV and find local jobs near you today!

Cyber Suraksa

Cyber Suraksa

We make security simple and hassle-free by offering a sustained and secure IT environment with next-gen cybersecurity solutions through a scalable security-as-a-service model.

Allstate Identity Protection

Allstate Identity Protection

Allstate make it easy to provide complete identity protection, so everyone can live more confidently online.

Dev Information Technology (Dev IT)

Dev Information Technology (Dev IT)

Dev IT delivers digital transformation and end-to-end information technology services.