Cybercriminals have sunk to a new low with this latest scam

Romance Scams
(Image credit: FBI)

Cybercrooks attacking overbooked hospitals during the Covid-19 pandemic was low, but a new scheme proves that for some fraudsters, there’s no bottom to which they cannot sink.

A disturbing new campaign has been spotted, in which photos of abuse victims were being used to trick people into paying recurring fees for a non-existent service. 

Reports claim that there are dozens of fake ID verification services out there that promise to cross-reference registered accounts with known sex offender databases. However, all these “services” do is take people’s credit card info, possibly stealing their identities in the process, and setting them up for a recurring payment service.

Criminal scams

To get people to “register”, the fraudsters create fake accounts on hookup platforms such as Tinder. As multiple people confirmed to the publication, the fraudster would create an account of an attractive woman, and after chatting a little bit with the target, would say they were victims of abuse in the past. They would even share actual photos of the woman, abused, to back up their claims. 

Then, they would demand their new love interest to register on one of these sites, to “confirm” they were not an abusive individual. Most of the sites (of which there are many, as the publication discovered), were registered to an entity in Cyprus, which was unavailable for comment. 

The sites feature user testimonials which turned out to be fake, as the images of the people were found on stock photo sites. What’s more, instead of the actual payment form, the sites hold an HTML iFrame served from domains that read as if someone just hit the keyboard - ndwhvl.com, ntrfrnc.com, pcngyh.com - to name a few.

Those that fall for the trick and decide to “register”, can choose among multiple membership options, ranging from $1.99, all the way up to $100, depending on the website and the membership package. 

Next only to Elon Musk-related schemes, romance frauds are one of the most popular types of scams on the internet, right now. Users are advised to be extra vigilant with everything they do online, and activate two-factor authentication wherever available. 

Via: BleepingComputer

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
A light pink gift box with blush pink bow, red hearts and confetti on a pastel pink background.
How to spot Valentine’s Day scams - stay safe on this most special day with our security tips
Shopping scams
New wave of sextortion scams uses personal details and images to intimidate targets while bypassing traditional security measures
Closeup image of an eye with a heart on a screen reflected within
Bad romance: how to take control of your dating data and avoid a clinch from a cyberstalker
Woman on bed looking at phone.
Don’t fall for these AI chatbot scams this Valentine’s Day – here’s how they could play with your heart strings
An illustration of a hooded hacker with an obscured face holding a large fingerprint against a red background.
ID theft – what happens when someone steals your identity
Someone checking their credit card details online.
Hackers use CAPTCHA scam in PDF files on Webflow CDN to get past security systems
Latest in Security
NordProtect logo
Standalone identity theft protection from Nord Security is now available
A man holds a smartphone iPhone screen showing various social media apps including YouTube, TikTok, Facebook, Threads, Instagram and X
Ofcom cracks down on UK tech firms, will issue sanctions for illegal content
A fish hook is lying across a computer keyboard, representing a phishing attack on a computer system
These fake GitHub "security alerts" could actually let hackers hijack your account
3d rendering of a submarine power cable on the seabed
Subsea internet cables can now ‘listen’ for sabotage using irregular pulses of light
Dark Web monitoring
A worrying critical security flaw in Apache Tomcat could let hackers take over servers with ease
A graphic showing someone on a tablet working through a supply chain.
Security issue in open source software leaves businesses concerned for systems
Latest in News
an image of the Samsung Galaxy S24 Ultra
Finally! One UI 7 has a release date - here are the Samsung phones that’ll get it first
Google Cloud logo
Google to acquire cloud security platform Wiz in $32 billion deal
GIMP 3.0 interface from the website
Our favorite free photo editor finally got the update it deserves - and these are the top 5 features designers should know about
A still from a promo image for the second season of Severance showing the character Mark holding blue balloons in a hallway
Macrodata Refiners rejoice, Google has rewarded us with a virtual balloon party ahead of the Severance season 2 finale
FCC filing for the Nothing CMF Buds 2 Plus
Nothing’s next-gen CMF cheap earbuds slated to arrive within the month, but don’t expect hi-res audio support
John Loeffler holding the Ryzen 7 7800X3D
Great news! The best gaming CPU ever made is finally available for it's original MSRP again