Dating Sites Fraudster Alert

UK online crime prevention agency Action Fraud have become aware of techniques used by romance fraudsters against people using dating sites. Not only will they steal your heart they will steal your money and your identification.

When you think you’ve met the perfect partner through an online dating website or app, but the other person is using a fake profile to form a relationship with you. They’re using the site to gain your trust and ask you for money or enough personal information to steal your identity.

A dating fraudster, previously involved in deceiving people that wanted a friendship explained how they would create fake accounts with social media platforms so that their details matched and could be searched. By appearing to be a real person their fake persona could be corroborated by prospective partners searching their background and believe them to be genuine. The fraudster said:

 “People like to live in fairy tales to say it won’t happen to me. I make sure all my conversations are bespoke. I will show insecurity myself about trusting people and this helps allude to them that I’m genuine.”

The fraudster will also utilise as many accessible online research tools to explore people’s information for their own personal gain or sell onwards. The fraudster elaborated and explained:

“I use various online directories to find out about the person. Once I have enough, I use it to milk everything I can using their details or sell them on to other fraudsters via the dark web”

When asked how people could check if a person is real. The romance fraudster offered advice for others searching for a relationship. They told us that after you see a picture of them:

 “Ask for them to send you another photo of themselves posing with their thumbs up or waving. It’s like a form of 2 factor authentication and makes it hard to do if it’s not an original picture”

What you need to do

  • Avoid sharing too many personal details when on online dating profiles. Revealing your full name, date of birth, or full home address may lead to your identity being stolen.
  • Never respond to any requests to send money, or have money transferred into your account by someone you don’t know and trust. These types of requests should always raise a red flag. If something feels wrong, then it is usually right to question it.
  • Pick a reputable dating website or app, and use the built-in messaging service. Fraudsters want to quickly switch to social media or texting so there’s no evidence of them asking you for money.

Action Fraud

You Might Also Read: 

Spies Use Tinder:

 

« Russian Hacking Intensifies Closer To Ukrainian Election
Take An Analytical Approach To Cybersecurity Training »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

it-sa 365

it-sa 365

it-sa 365 is a digital platform for connecting IT security vendors and experts with those who bear responsibility for IT security in management and technology.

AMETIC

AMETIC

AMETIC, is the Association of Electronics, Information and Communications Technologies, Telecommunications and Digital Content Companies in Spain.

Advanced Systems International SAC

Advanced Systems International SAC

Advanced Systems international is a global company dedicated to data security software design, development, support, and licensing.

Shape Security

Shape Security

Shape Security provide best-in-class defense against malicious automated cyberattacks on web and mobile applications.

Garrison Technology

Garrison Technology

Garrison SAVI® is a unique technology for secure remote browsing that can dramatically change the risk profile for enterprise cyber security.

Belden

Belden

Belden is a global leader in signal transmission and security solutions for mission-critical applications in enterprise and industrial markets. Belden brands include Hirschmann and Tofino Security.

Fraugster

Fraugster

Fraugster provides the most precise anti-fraud solution for e-commerce businesses.

Tailscale

Tailscale

Tailscale is a VPN service that makes the devices and applications you own accessible anywhere in the world, securely and effortlessly.

Exalens

Exalens

With deep roots in AI-driven cyber-physical security research and intrusion detection, at Exalens, we are enhancing operational resilience for cyber-physical systems at the OT edge.

Comcast Technology Solutions (CTS)

Comcast Technology Solutions (CTS)

Comcast Technology Solutions delivers proven technologies for global video, media, communications, data applications, and cybersecurity & compliance.

Praxis Security Labs

Praxis Security Labs

Praxis Security Labs is a research driven cybersecurity company that helps our customers to reduce risk and improve security.

Judy Security

Judy Security

Judy (formerly AaDya Security) provides smart, simple, effective, all-in-one cybersecurity for SMBs. Get the 24/7 protection and support you deserve, at a price you can afford.

Operational Systems (OpSys)

Operational Systems (OpSys)

OpSys is a leading Managed IT and Cyber Security provider protecting the critical elements of businesses across the globe.

Cyber Castle

Cyber Castle

Linux Demands Sophisticated, Purpose-Built Security. Cyber Castle is the solution. A safe, deployable platform down to the edge device for monitoring Linux security anywhere across the globe.

UrbanFox

UrbanFox

UrbanFox’ powerful AI provides a simple and intuitive way to reduce fraud risk, whilst isolating potential fraudsters that cost your business money.

Actfore

Actfore

Actfore offers advanced AI/ML-powered data mining solutions to swiftly detect and uncover sensitive information compromised in cyber breaches.