Fraud on dating sites. How do pen pals extort money?

Lord777

Professional
Messages
2,581
Reputation
15
Reaction score
1,331
Points
113
Dating sites are a place where people go in a good mood and with the hope of at least interesting communication. When you have already found an interlocutor or interlocutor, and there is a mutual interest, hormones are included in the game. They are poor advisors in situations that require a sober calculation. And scammers know this very well.

The scheme of divorce through a dating site is time-consuming, but does not require hacking someone else's account.

Cheater:
  • registered on the site, usually under a female name
  • puts attractive photos (often found in social networks)
  • creates a plausible profile that will appeal to many users
  • starts communication: waits for responses and responds on its own
A few days, weeks, or even months of virtual flirting-and the moment comes when it's time to meet live. It is very likely that by this time the attacker has already carried out the necessary training and communicates with the victim not on the site, but in a messenger or social network.

Why is this transition important? The fact is that chats of dating services do not skip links. This function is extremely important for an attacker.

Now the task of the scam artist is to wait until the victim is ready to ask the girl out on a date. He provokes the interlocutor to take this step, and if the young man is too timid, he offers a meeting.

The place for a date is chosen, of course, by a girl. The victim doesn't get suspicious when she offers to go to a movie, stand-up show, or concert. Meeting a strange man for the first time in a crowded place is a rule that many people follow. Since the place is chosen by her, the link where you need to buy tickets also looks absolutely natural.

Why should a man buy them? Because he's a man.

If, as is less common, but sometimes happens, the victim is a woman, another stereotype works: "He invited me to the movies!". Then the fraudster has to get out of it, saying, " How embarrassing it turned out, I don't have any money on the card. Well, you buy it, we'll meet and I'll give it back." Although there are also unusual variations. For example, in the practice there was a girl who was convinced by a fraudster to pay for a bouquet of flowers as a gift.

The messenger receives a link to the site of a cultural institution (or a flower shop). A well-crafted victim enters the card details, then an SMS code, and... no tickets are purchased. Further options are possible:
  • "girl" offers to try to pay for the purchase again, distracting the victim from carefully reading the SMS, and then again and again;
  • if the victim contacts the site's technical support, they are convinced that you need to enter an SMS code to get a refund, and the person does not pay attention to the word "payment" (and not a refund, for which no codes are required at all) in the sms.;
  • scammers simply replace the amount on the phishing site at the time of payment, and instead of a couple of thousand, a couple of tens of thousands are debited from the card.
The latter scheme is infrequent. For it to succeed, you need to know at least approximately how much money is on the victim's card, and this is not always possible. If there are not enough funds, the client will receive a notification about a failed payment, and a strange amount will probably alert them. Although even in such cases, the "girl" managed to convince the cavalier that he probably made a mistake when entering the amount.

How to protect yourself?​

Do not transfer communication to messenger at least until you actually meet someone.

Invite a new friend or acquaintance to talk via video link.

If you are not in touch with a girl at all, the conversation will not take place under any pretext. A few bounces make you think hard. A normal phone conversation is a less reliable option: voice substitution technology is much easier and cheaper than video simulation. If a criminal group operates, then the fake girl will only agree to a telephone conversation and will not be aware of some of the nuances of obviously long-term communication.

When clicking on links (no matter who sent them), pay attention to the address. The domain name (part of the address before the dot) must match up to the symbol with the official site that is being searched through the search engine. The domain zone (.ru, .com, .rf, and so on) must be the same as the official site. It is important to follow this rule for any clicks on the sent links, including those from real friends. After all, their account can be hacked and dangerous messages can be sent on their behalf.

Take 3 seconds and read the full text message from the bank with the code. It must contain information about what exactly the code was sent for, and where you are going to pay for the purchase. Does the information not match what you expect to see? Just don't enter the code.

Even if you caught yourself in time and didn't transfer money to the attackers, the card will have to be reissued. When a person enters payment details on a phishing site, they pass them on to fraudsters. They already have a lot of information about the victim. This means that they will either soon call back on behalf of the victim's bank and try to steal a large sum, or pass the information on to "colleagues".

If you didn't enter your payment details, but you came to the site using a link, carefully check your computer or smartphone for viruses: phishing sites are often created for this purpose, too.
 
Top