Dating Sites Fraudster Alert

UK online crime prevention agency Action Fraud have become aware of techniques used by romance fraudsters against people using dating sites. Not only will they steal your heart they will steal your money and your identification.

When you think you’ve met the perfect partner through an online dating website or app, but the other person is using a fake profile to form a relationship with you. They’re using the site to gain your trust and ask you for money or enough personal information to steal your identity.

A dating fraudster, previously involved in deceiving people that wanted a friendship explained how they would create fake accounts with social media platforms so that their details matched and could be searched. By appearing to be a real person their fake persona could be corroborated by prospective partners searching their background and believe them to be genuine. The fraudster said:

 “People like to live in fairy tales to say it won’t happen to me. I make sure all my conversations are bespoke. I will show insecurity myself about trusting people and this helps allude to them that I’m genuine.”

The fraudster will also utilise as many accessible online research tools to explore people’s information for their own personal gain or sell onwards. The fraudster elaborated and explained:

“I use various online directories to find out about the person. Once I have enough, I use it to milk everything I can using their details or sell them on to other fraudsters via the dark web”

When asked how people could check if a person is real. The romance fraudster offered advice for others searching for a relationship. They told us that after you see a picture of them:

 “Ask for them to send you another photo of themselves posing with their thumbs up or waving. It’s like a form of 2 factor authentication and makes it hard to do if it’s not an original picture”

What you need to do

  • Avoid sharing too many personal details when on online dating profiles. Revealing your full name, date of birth, or full home address may lead to your identity being stolen.
  • Never respond to any requests to send money, or have money transferred into your account by someone you don’t know and trust. These types of requests should always raise a red flag. If something feels wrong, then it is usually right to question it.
  • Pick a reputable dating website or app, and use the built-in messaging service. Fraudsters want to quickly switch to social media or texting so there’s no evidence of them asking you for money.

Action Fraud

You Might Also Read: 

Spies Use Tinder:

 

« Russian Hacking Intensifies Closer To Ukrainian Election
Take An Analytical Approach To Cybersecurity Training »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Sapphire

Sapphire

Sapphire deliver flexible and scalable cybersecurity solutions, helping organisations to detect, protect, respond and remediate against cyber threats.

2|SEC Consulting (2-SEC)

2|SEC Consulting (2-SEC)

At 2|SEC Consulting, we deliver an end-to-end service of cyber and information security solutions which are tailored to each client’s exact security needs.

Centre for Secure Information Technologies (CSIT)

Centre for Secure Information Technologies (CSIT)

CSIT is a UK Innovation and Knowledge Centre (IKC) for secure information technologies. Our vision is to be a global innovation hub for cyber security.

Zerto

Zerto

Zerto provides enterprise-class disaster recovery and business continuity software specifically for virtualized data centers and cloud environments.

Cura Software Solutions

Cura Software Solutions

Cura Software Solutions (formerly Cura Technologies) is a market-leader in Governance, Risk and Compliance (GRC) enterprise applications.

Centripetal Networks

Centripetal Networks

Centripetal Networks was founded with one vision - to protect networks from advanced threats by simplifying intelligence-driven security.

Be Cyber Aware At Sea

Be Cyber Aware At Sea

Be Cyber Aware At Sea is a global maritime and offshore industry initiative to raise awareness and educate crew members and the offshore workforce.

Consortium for Information & Software Quality (CISQ)

Consortium for Information & Software Quality (CISQ)

The mission of CISQ is to develop international standards for software quality and to promote the development and sustainment of secure, reliable, and trustworthy software.

Ntirety

Ntirety

Ntirety Managed Security Services offer enterprise businesses the advanced tools, processes, and support to ensure your infrastructure, networks, and mission-critical applications are secure.

Eclypsium

Eclypsium

Eclypsium protects organizations from the foundation of their computing infrastructure upward, controlling the risk and stopping threats inside firmware of laptops, servers, and networks.

Octiga

Octiga

Octiga is an office 365 cloud security provider. It offers Office 365 monitoring, incident response and recovery tools.

Defscope

Defscope

Defscope is an Azerbaijani company entirely focused on cybersecurity offering training, security consulting, and other professional services.

Conversant Group

Conversant Group

Conversant Group is an IT infrastructure and security consulting company, providing technical, organizational, procedural, and process consulting internationally.

Converged Communication Solutions

Converged Communication Solutions

Converged is an independent Internet Service Provider, telephony, IT support and security specialist.

Dotsquares

Dotsquares

Dotsquares leverage the latest web and mobile technologies to build, grow and support your business.

LetsData

LetsData

LetsData uses AI to provide governments, intergovernmental organizations, civil society, and businesses with data-empowered decisions on communication in the age of online disinformation.