"When can we be together (2024)

Scammers use psychology to create some of the most convincing internet cons – here's how to advise your customers on what to watch out for.

Today’s most common crime is not burglary, car theft or even shoplifting - it’s online fraud. And this includes pitfalls such as emotional scamming. Not to mention, anyone with an internet connection (in other words, all your customers) is a potential victim. So what do you need to know, and how can you advise your customers, to help keep them safe online from this particular kind of scam?

What is emotional scamming?

Emotional scamming is a sophisticated kind of online fraud that exploits human psychology to achieve its aims. We all have biases and psychological blind spots that make us susceptible to scammers, which is why even people who consider themselves ‘intelligent’ can still be deceived if they are approached in a way which gets under their radar.

Specifically, the key emotional scams to be aware of are:

  • Romance scams
  • Sextortion or sexploitation emails
  • ‘Pig butchering’ (hybrid, long-term deceptions)
  • Payment scams
  • Missing person scams
  • Fake app alerts

Let’s examine each one, along with the steps your customers can take to avoid becoming a scammers’ next victim.

Romance scams

A romance scam is a deception that is usually initiated online and often preys on vulnerable people. It starts when a scammer builds an emotional connection with someone, often on dating platforms, with the intention of exploiting their trust for financial gain. The success of a romance scam lies in the scammer's ability to manipulate emotions and create a false sense of intimacy. Scammers craft personas that appeal to the victim's desires for love, companionship, and understanding. They share seemingly personal stories, dreams, and vulnerabilities, creating an illusion of a genuine connection. The emotional bond intensifies, making it difficult for victims to see through the deception. The scammer avoids detection by maintaining a facade of authenticity. They may operate from locations with limited law enforcement cooperation, making it challenging to track them. The emotional toll on victims is profound, as the scammer exploits trust and love for financial gain.

And though Avast researchers have detected a sharp uptick in romance scams, there are steps you can take to avoid becoming a victim.

Sextortion

This is old-fashioned blackmail brought up to date and exploiting the same old vulnerabilities: sex and the threat of exposure. It begins with an email such as this one:

"When can we be together (1)

Despite the poor English, receiving this kind of email can be frightening. First, it makes specific threats. Second, it uses some fairly believable terminology (‘my trojan captured all your private data and switched on your camera’). And third, it plays on the kind of fears around technology which those without much tech knowledge may wonder about, like whether someone can remotely access and record a webcam.

The most important thing you can tell a customer who has been threatened in this way is to not respond at all. The next is to reassure them that this kind of email is generally not based on truth. In 99% of these cases, there is nothing to expose.

A scammer remotely accessing and recording someone’s webcam is highly unlikely. Remote access without permission is possible, but it would require the presence of downloaded malware that came from a malicious site on the owner’s computer.

Many of these emails augment the fear factor by appearing to come from the victim’s own email address. This makes the approach seem personally targeted rather than random. However, it is relatively simple for a scammer to manipulate the ‘From’ field in an email, and is a well-known trick to make it appear that they have access to the recipient’s computer and data.

Sometimes the email may include one of the recipient’s old passwords. Again, this is simply a method of increasing the apparent authenticity of the scammer’s claim to have access, but in reality, it is meaningless. The password will have been acquired through a data breach rather than directly from the recipient. If it is out of date and hasn’t been used by a hacker, then it is no more of a threat than using the recipient’s email address.

One thing to note is that the email doesn’t use the victim’s name. Regardless of how individually targeted it appears, this is another indication that it is a mass-mailed scam.

Also, the recipient’s phone number being included in the email can be equally frightening. But it is not evidence that the scammer has more useful information about the victim. Phone numbers can be acquired from data breaches just as passwords can – and since phone numbers change less often, it’s more likely they will be current. It’s also unlikely that the scammer would ever escalate to making telephone contact. So recipients can simply ignore, delete, and forget the email, without expecting things to progress any further.

However, this doesn’t mean that the scammer won’t try again. There may be some kind of countdown or time limit included in the email. If the scammer receives no response, they can use this to increase the pressure. Alternatively, they may claim they are offering more time to give the recipient another chance. This could go on for days or even weeks. The best option is to block the emails, delete them as soon as possible, and forget about them.

Advice to help your customers avoid being sexploited

  • Do not click on links in the email
  • Do not respond in any way
  • Ignore, delete, and block
  • If a password that’s currently active is included in the email, change it [see below for password advice]
  • Install anti-malware software and regularly update software

    When your customers are creating a password, the key pieces of advice you can give them are to:

  • Make it random – not a pet’s name with a few numbers or characters added. Cybercriminals know how to use social engineering to get someone to disclose their pet’s name.
  • Use a minimum of twelve characters
  • Include uppercase and lowercase letters
  • Include symbols and numbers
  • Never disclose a password to anyone online (or off)

A word of warning

There is a possibility that a customer receiving one of these emails is actually being personally targeted. They may have previously interacted with the sender in some way. If this is the case, then this is blackmail and the customer should notify the relevant authorities.

Pig Butchering

Obviously not what it sounds like, but just as unpleasant. The name comes from the way that the victim is ‘fattened-up’ by being fed affection, before being ‘slaughtered’.

This is a long-term scam that often starts with a text, social media message, or introduction through a job board site. The scammer starts slowly, gaining the victim’s trust, and then ultimately leading to an online ‘romance’ which often involves constant email contact. However, this is all a ‘fattening-up’ (or softening-up) for the next stage of the scam, which proposes an investment of some kind – usually in cryptocurrency.

Fake platforms and websites will be used to show the victim’s supposedly successful returns, but in reality, the money ‘invested’ is going straight to the scammer. The victim will be encouraged to invest more and more heavily – and this is where the psychological aspect comes into play. Research shows that people will ignore signs that things are not going in their favor if they have already spent substantial money, time, and effort. To put it another way, people are more likely than not to ‘throw good money after bad’.

However, when the victim runs out of money to ‘invest’, or tries to withdraw some of their ‘profits’, they will be blocked and unable to contact their scammer. The supposed romantic relationship aspect of the scam often leaves victims too embarrassed to admit it to friends and relatives, or to report it to the authorities.

A recent news story about a scam that began via Tinder illustrates “pig butchering.”

The scam began via Tinder, where a professional chef was matched with a woman who introduced him to her ‘uncle’, a supposed professional cryptocurrency trader. Starting with just £850, the chef ultimately ‘invested’ £40,000 which he was inevitably unable to reclaim when both his Tinder date and her uncle disappeared, and blocked his messages.

Advice to help your customers avoid being ‘butchered’

  • Be suspicious of any proposal for online investment – particularly from someone you have never met in person
  • Discuss apparent investment opportunities with family, friends, or professionals
  • Be suspicious of any romantic declarations – especially from someone you have never met in real life
  • Be aware that scammers often use fake photos and fake profiles. They are not who they claim to be
  • Be cautious, take time, think twice

Payment scams

Another flaw in human psychology is to always trust authority. So, your customer may be inclined to believe an email that’s apparently from a payment app, whether it tells them that they have received a payment or have overpaid, have suspicious activity on their account, need to verify their account, or makes one of several other spurious claims. The aim is to get the potential victim to click on a link, or occasionally to call a number where the scammer will use their apparent legitimacy as an employee of the payment app company to extract valuable customer information for fraudulent purposes.

Alternatively, it there is a link to click on, it will lead to a fake website with a legitimate-looking address and appearance, where the victim will be asked to enter their account information and password. This is all the scammer needs to access and exploit the victim’s account.

Advice to help your customers avoid payment app scams

  • Don’t be panicked by the sense of urgency the email tries to imply
  • Take the time to check the email carefully
  • Genuine payment apps tend to use their customers’ first and last names in correspondence. Does this email do the same?

Missing person scams

Another scam which – whether the scammer is really aware of it or not – uses psychological techniques to lure in the victim. It exploits innate kindness, and the tendency of people to follow and copy the behavior of others.

An initial post poses as a plea to help find a missing person. There is, of course, no one missing. However, people will be inclined to like and share the post, which increases its credibility.

The scammer will then edit the content so that the likes and shares now appear to be lending credibility to an investment scheme. The bait has been set, and the scammer is now ready to attract money from gullible potential investors who are reassured by the seeming endorsem*nts of the edited post, which have actually been ‘stolen’ from the original missing person post.

If the initial missing person story is examined more closely, it can be easy to identify flaws. For example, one such scam reported a missing girl – but depending on the post you saw, reported her as missing in Cambridgeshire or Wales. The post also included a photograph of a girl who had actually previously gone missing, but in Ohio – and she was subsequently found.

Advice to help your customers avoid Missing Person scams

  • As with ‘pig butchering’, be suspicious of any proposal for online investment – even if it appears to be widely and heavily endorsed and liked
  • Discuss apparent investment opportunities with family, friends or professionals
  • Be cautious, take time, think twice

Fake apps scam

A natural trust of authority is the psychological emotional flaw exploited by this scam.

A mobile app posted on the Google Play or Apple app store gains legitimacy simply because it is available from a legitimate site. Even a fake app posted here will often have a genuine function. But this will merely be a shield to hide the fake apps’ main purpose: stealing users’ personal information once downloaded.

An example, recently identified and removed from the Apple App Store, is the ‘LassPass Password Manager’, which relied on the trust invested in the genuine LastPass app.

Advice to help your customers avoid Fake App scams

  • Be suspicious of any deviation from the usual process for downloading an app: for example, being redirected to a different site or a different log-on process
  • Always keep your phone updated with the latest version of its operating system
  • Keep existing apps on your phone up to date

Summary

Emotional scamming exploits deep-seated human traits such as the need for affection or a trust of authority. Scammers also rely on people failing to take the time to read emails carefully, or to spot small differences, flaws, or changes in – for example – website URLs and the websites themselves.

They depend on the embarrassment factor, which makes victims less likely to discuss the potential scam with others until (or even when) it’s too late. This may also prevent victims from reporting the scam to the authorities – which lets the scammers scam another day.

Your advice could make the difference between your customer becoming a victim or the one that got away.


"When can we be together (2024)
Top Articles
How to choose towels for an Airbnb?
Eight Ways to Avoid Overdraft Fees
DPhil Research - List of thesis titles
Libiyi Sawsharpener
Fredatmcd.read.inkling.com
Farepay Login
J & D E-Gitarre 905 HSS Bat Mark Goth Black bei uns günstig einkaufen
Stadium Seats Near Me
Ross Dress For Less Hiring Near Me
Wannaseemypixels
King Fields Mortuary
W303 Tarkov
Charmeck Arrest Inquiry
Pittsburgh Ultra Advanced Stain And Sealant Color Chart
Top tips for getting around Buenos Aires
Maplestar Kemono
9044906381
Brett Cooper Wikifeet
Honda cb750 cbx z1 Kawasaki kz900 h2 kz 900 Harley Davidson BMW Indian - wanted - by dealer - sale - craigslist
Moving Sales Craigslist
Aps Day Spa Evesham
Ivegore Machete Mutolation
Somewhere In Queens Showtimes Near The Maple Theater
Caring Hearts For Canines Aberdeen Nc
Craigslist Alo
F45 Training O'fallon Il Photos
How Taraswrld Leaks Exposed the Dark Side of TikTok Fame
Delectable Birthday Dyes
Workshops - Canadian Dam Association (CDA-ACB)
Rugged Gentleman Barber Shop Martinsburg Wv
Pioneer Library Overdrive
LG UN90 65" 4K Smart UHD TV - 65UN9000AUJ | LG CA
Salemhex ticket show3
Gridwords Factoring 1 Answers Pdf
Syracuse Jr High Home Page
Mg Char Grill
Puretalkusa.com/Amac
Composite Function Calculator + Online Solver With Free Steps
Steven Batash Md Pc Photos
Joe's Truck Accessories Summerville South Carolina
Mckinley rugzak - Mode accessoires kopen? Ruime keuze
Trivago Myrtle Beach Hotels
What Does Code 898 Mean On Irs Transcript
Sand Castle Parents Guide
ESA Science & Technology - The remarkable Red Rectangle: A stairway to heaven? [heic0408]
Az Unblocked Games: Complete with ease | airSlate SignNow
Ouhsc Qualtrics
Shiftselect Carolinas
Craiglist.nj
Subdomain Finer
Fetllife Com
Latest Posts
Article information

Author: Barbera Armstrong

Last Updated:

Views: 5988

Rating: 4.9 / 5 (79 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Barbera Armstrong

Birthday: 1992-09-12

Address: Suite 993 99852 Daugherty Causeway, Ritchiehaven, VT 49630

Phone: +5026838435397

Job: National Engineer

Hobby: Listening to music, Board games, Photography, Ice skating, LARPing, Kite flying, Rugby

Introduction: My name is Barbera Armstrong, I am a lovely, delightful, cooperative, funny, enchanting, vivacious, tender person who loves writing and wants to share my knowledge and understanding with you.