blockisthenewchain.com
  • Home
  • Cybersecurity
    • All
    • Corporate Security
    • Data Security
    • System security
    • Web Security
    edge computing

    How important is Edge Computing Security?

    Enhance Smart Cybersecurity

    Three Cognitive Technologies to Enhance Smart Cybersecurity

    phishing_result

    An 11-fold increase in phishing attacks exploiting SaaS platforms

    phishing attacks exploiting saas

    A Simple Guide to Manually Renewing an SSL Certificate

    Protecting Your WordPress Site

    6 Tips for Protecting Your WordPress Site

    Secure SSH Server

    8 Ways to Secure SSH Server Connections on Linux

    Trending Tags

    • Vulnerability
    • IoT-Security
    • Metaverse
    • Application Security
    • Cloud-Security
  • Hacking stories
    • All
    • Apps Hacking stories
    • Exchange Hacking stories
    protect your smart home

    How to protect your Smart Home from hackers

    Hacking Anonymous

    6 ways the hacker group Anonymous is waging cyber-war against Russia

    Investment scammers

    Investment scammers target dating app users

    Axie-Infinity-AXS-Metaverse

    Hacking Story: How a fake job offer took down the world’s most popular crypto game?

    Trending Tags

    • Artificial-Intelligence
    • website security
    • Deep-Learning
    • Hacker-Attack-and-Defense
  • News
    • All
    • Business
    • Crypto News
    • Cybersecurity News
    • World News
    Vitalik-meta

    Meta’s metaverse is doomed, says Vitalik Buterin

    Tiner metaverse

    Tinder puts its metaverse and digital currency project on hold

    bernard arnault

    Bernard Arnault’s investment fund will invest 100 million euros in Web3

    invest in cybersecurity startup

    How can VCs invest in cybersecurity startups in challenging times?

    Venture-Capital-decline

    Cybersecurity Venture Capital Investments: Severe Decline in Q2 2022

    SaaS Security Certification

    A Comprehensive Guide to SaaS Security Certification

    Trending Tags

    • WEB3
    • DEFI
    • Crypto
    • Blockchain
    • Data Security
  • Blockchain
    • All
    • Cryptocurrency
    • Metaverse
    • NFT
    • Trends and DEFI
    • Web3
    blockchain API

    Excellent blockchain API for developers

    The next generation of blockchains

    The next generation of blockchains – cross-chain interoperability

    massa-autonomous-smart-contracts

    Can autonomous smart contracts be the future of blockchain technology?

    blockchain-Blockisthenewchain

    Blockchain Basics – What is Blockchain Technology

    metaverse-cloud

    How will the metaverse affect cloud security?

    What is MetaMask

    What is MetaMask? And is it safe to use?

  • Startups
  • Login
No Result
View All Result
  • Home
  • Cybersecurity
    • All
    • Corporate Security
    • Data Security
    • System security
    • Web Security
    edge computing

    How important is Edge Computing Security?

    Enhance Smart Cybersecurity

    Three Cognitive Technologies to Enhance Smart Cybersecurity

    phishing_result

    An 11-fold increase in phishing attacks exploiting SaaS platforms

    phishing attacks exploiting saas

    A Simple Guide to Manually Renewing an SSL Certificate

    Protecting Your WordPress Site

    6 Tips for Protecting Your WordPress Site

    Secure SSH Server

    8 Ways to Secure SSH Server Connections on Linux

    Trending Tags

    • Vulnerability
    • IoT-Security
    • Metaverse
    • Application Security
    • Cloud-Security
  • Hacking stories
    • All
    • Apps Hacking stories
    • Exchange Hacking stories
    protect your smart home

    How to protect your Smart Home from hackers

    Hacking Anonymous

    6 ways the hacker group Anonymous is waging cyber-war against Russia

    Investment scammers

    Investment scammers target dating app users

    Axie-Infinity-AXS-Metaverse

    Hacking Story: How a fake job offer took down the world’s most popular crypto game?

    Trending Tags

    • Artificial-Intelligence
    • website security
    • Deep-Learning
    • Hacker-Attack-and-Defense
  • News
    • All
    • Business
    • Crypto News
    • Cybersecurity News
    • World News
    Vitalik-meta

    Meta’s metaverse is doomed, says Vitalik Buterin

    Tiner metaverse

    Tinder puts its metaverse and digital currency project on hold

    bernard arnault

    Bernard Arnault’s investment fund will invest 100 million euros in Web3

    invest in cybersecurity startup

    How can VCs invest in cybersecurity startups in challenging times?

    Venture-Capital-decline

    Cybersecurity Venture Capital Investments: Severe Decline in Q2 2022

    SaaS Security Certification

    A Comprehensive Guide to SaaS Security Certification

    Trending Tags

    • WEB3
    • DEFI
    • Crypto
    • Blockchain
    • Data Security
  • Blockchain
    • All
    • Cryptocurrency
    • Metaverse
    • NFT
    • Trends and DEFI
    • Web3
    blockchain API

    Excellent blockchain API for developers

    The next generation of blockchains

    The next generation of blockchains – cross-chain interoperability

    massa-autonomous-smart-contracts

    Can autonomous smart contracts be the future of blockchain technology?

    blockchain-Blockisthenewchain

    Blockchain Basics – What is Blockchain Technology

    metaverse-cloud

    How will the metaverse affect cloud security?

    What is MetaMask

    What is MetaMask? And is it safe to use?

  • Startups
No Result
View All Result
blockisthenewchain.com
No Result
View All Result
Home Cybersecurity

Investment scammers target dating app users

Users of dating apps like Tinder, Match and Bumble should be wary of investment scammers.

BlockIsTheNewChain by BlockIsTheNewChain
August 3, 2022
in Cybersecurity, Apps Hacking stories, Blockchain, Cryptocurrency
497 32
0
Investment scammers
35
SHARES
1.8k
VIEWS
Share on TwitterShare on LinkedinShare on FacebookShare on Telegram

Due to the massive increase in the number of users of dating apps, cybercriminals have taken advantage of this opportunity by using a sophisticated scam to convince victims to join their investments and ultimately leave victims penniless.

Due to the COVID-19 pandemic, more people are choosing to communicate online in a state of isolation. Especially using online dating apps like Tinder, Bumble, Match, etc. This presents a good target for scammers to target, the International Criminal Police Organization (Interpol) warned in an advisory issued on Tuesday.

According to INTERPOL’s “Purple Notice” advisory to 194 countries, “Interpol’s Financial Crimes Unit has received numerous reports of this type of scam from around the world and has alerted users to the use of dating apps to develop Be vigilant, be skeptical, and stay safe when it comes to interpersonal relationships.” The purpose of INTERPOL’s “Purple Notice” is to publish information on criminals’ modus operandi, target, equipment and concealment methods.

In the initial stages of the scam, the scammers connect with the victims through dating apps (Interpol did not specify which dating app platforms the attackers used).

According to Interpol, “Once communication has become clear and a certain level of trust is established, criminals will share investment skills with victims and encourage them to join an investment scheme.”

They then persuaded victims to download an app that claimed to be a trading platform and asked users to open an account. In the app, victims buy various “financial products” after being persuaded by the scammers and work their way up the so-called investment chain. Interpol said victims would be convinced they could achieve “gold” or “VIP” status.

Interpol did not provide further information about the malicious apps, other than to say that attackers skillfully disguised malicious apps as legitimate ones. Interpol said: “As is often the case with financial fraud, everything was disguised as legitimate. According to the screenshots provided by the victim, the domain name was extremely similar to the real one, and the customer service staff pretended to help the victim. Choose the right product.”

However, after defrauding the victim of a certain amount of cash, suddenly one day, all contact ceased and the victim’s account was locked.

Hank Schless, senior manager of security solutions at Lookout, told Threatpost that malicious attacks such as scams or phishing launched through dating app platforms can be very clear to see how communication-enabled mobile apps are being exploited by malicious attackers.

Schless told Threatpost: “Because there are already pictures, profiles and names associated with individuals in dating apps, it is very easy for both parties to establish trust, and in addition to dating apps, attackers can also use This type of scamming is brought to apps with social features such as gaming, shopping, exercise or travel. If someone is particularly accustomed to connecting on these apps, they are likely to be scammed by malicious attackers.”

Dating apps like Match and Tinder have been criticized for their privacy policies and various security concerns.

However, scams targeting victims looking for love are another type of security challenge that dating apps need to address, especially with the current pandemic and individual isolation. These types of scams have previously been shown to be very easy to implement. In 2019, for example, a scammer managed to defraud a “substantial” amount of money from a Jason Statham fan after approaching her while she was only following the actor on Facebook Such scams are also used for other malicious activities, including spreading malware such as the Necurs botnet.

Setu Kulkarni, VP of Strategy at WhiteHat Security, told Threatpost: “Exploiting people’s desires and fears is a tactic that scammers often use, and when scammers are dominated by personal desires and fears, human logic fails. Think first, then Action will soon be replaced by action first, thinking later.”

Interpol warns users of dating apps to be vigilant when contacted by people they don’t know, especially when strangers ask to send money; think twice before sending money; and affiliated e-mail addresses, etc., to conduct research and investigations on suspicious applications.

Tags: Data SecurityHacker-Attack-and-DefenseVulnerabilitywebsite security

Related Posts

blockchain API
Blockchain

Excellent blockchain API for developers

by BlockIsTheNewChain
March 27, 2023

Blockchain technology has been applied in many industries and has steadily gained the support and trust of users. Many startups and...

Read more
The next generation of blockchains

The next generation of blockchains – cross-chain interoperability

October 31, 2022
massa-autonomous-smart-contracts

Can autonomous smart contracts be the future of blockchain technology?

October 27, 2022
blockchain-Blockisthenewchain

Blockchain Basics – What is Blockchain Technology

October 27, 2022
edge computing

How important is Edge Computing Security?

October 12, 2022

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

  • Vulnerability Scanning

    The most popular Web vulnerability scanning tools

    36 shares
    Share 14 Tweet 9
  • Excellent blockchain API for developers

    29 shares
    Share 12 Tweet 7
  • 6 ways the hacker group Anonymous is waging cyber-war against Russia

    31 shares
    Share 12 Tweet 8
  • Blockchain Basics – What is Blockchain Technology

    28 shares
    Share 11 Tweet 7
  • Can autonomous smart contracts be the future of blockchain technology?

    28 shares
    Share 11 Tweet 7

  • About
  • terms-and-conditions
  • Privacy & Policy
  • Contact

© 2022 Blockisthenewchain - The latest Blockchain, Cybersecurity News, and Startup Reviews by BLOCKisthenewCHAIN.

No Result
View All Result
  • Home
  • Cybersecurity
  • Hacking stories
  • News
  • Blockchain
  • Startups

© 2022 Blockisthenewchain - The latest Blockchain, Cybersecurity News, and Startup Reviews by BLOCKisthenewCHAIN.

Welcome Back!

Sign In with Facebook
Sign In with Google
OR

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.