Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

Scammers Fall in Love with Valentine's Day

Online dating profiles and social media accounts add to the rich data sources that allow criminals to tailor attacks.

US-CERT and Cupid don't often keep company, but this Valentine's Day is being marked by new threats to those seeking romance and new warnings from the federal cybersecurity group.

A notice from US-CERT points to an FTC blog post about how consumers can protect themselves from online scams involving dating sites, personal messaging systems, and the promise of romance and companionship from online strangers.

The general warning comes as specific scams are being exposed by online researchers. For example, researchers at Agari Data have followed a Nigeria-based group dubbed "Scarlet Widow" since 2017 as they exploited vulnerable populations, moving from romantic "attacks" against isolated farmers and individuals with disabilities to business email compromises that raised the financial stakes.

Security experts aren't optimistic about finding a quick solution.

"These types of scams will not be disappearing anytime soon," says Anupam Sahai, vice president of product management at Cavirin. "Certain times of the year, Valentine's Day included, bring out both the best and the worst in us. Here, hackers prey on those most vulnerable, especially those who are possibly recovering from a family tragedy without a support network. Given the emotions, it is no surprise that romance scam losses, averaging $2,600 each, are seven times greater than most other frauds."

The primary issue is that these attacks aren't assaults on technology vulnerabilities — they prey on human limitations.

"These kinds of romance scams are very targeted social engineering attacks, effectively 'hacking' the victim's emotions rather than trying to perform a technical assault," says Nathan Wenzler, senior director of cybersecurity at Moss Adams. "Unfortunately, these kinds of attacks are becoming more and more commonplace, not only because of the large financial incentive, but because it has become easier than ever to tailor these scams for each individual victim."

Online dating profiles and social media accounts add to the rich data sources that allow criminals to tailor attacks as they look to exploit individuals in the same way that spear-phishing attacks exploit corporate employees to extract credentials and critical business data.

The FTC provides tips for avoiding victimization that include never sending money to an online romantic contact, taking the relationship slowly, doing an online image search to see whether the photo for the person's account appears with a different name, and discussing the relationship with friends and family members from real life. US-Cert has its own set of tips for staying safe on social media.

"No matter how desirable a person may sound online, everyone must tread with caution," says Chris Morales, head of security analytics at Vectra. "Only trust those you know in person, and even then be cautious. In our connected society, everyone needs to remember a basic rule we were taught as a child, especially with people you can’t even look in the eye: Don't talk to strangers."

Related Content:

 

 

 

Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industry's most knowledgeable IT security experts. Check out the Interop agenda here.

Curtis Franklin Jr. is Senior Editor at Dark Reading. In this role he focuses on product and technology coverage for the publication. In addition he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Doug1433
50%
50%
Doug1433,
User Rank: Apprentice
7/26/2019 | 8:09:41 PM
Ghana scam
Let me share my story,am no more ashamed as I start to campaign against romance scam in the future Unfortunately I was scammed thousands of dollars in 2017 and found out when I contacted the Ghana Crime Unit-info.ghanapolice at consultant dot com and was given full details of the scam and played along and was exact ,evidence and receipt of money transfer was sent to the Unit and they checked the bank and got the person arrested and justice was served. They used look alike bank websites from hsbc and other official government sites..
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-1817
PUBLISHED: 2019-11-20
MediaWiki before 1.19.4 and 1.20.x before 1.20.3 contains an error in the api.php script which allows remote attackers to obtain sensitive information.
CVE-2013-2091
PUBLISHED: 2019-11-20
SQL injection vulnerability in Dolibarr ERP/CRM 3.3.1 allows remote attackers to execute arbitrary SQL commands via the 'pays' parameter in fiche.php.
CVE-2012-1257
PUBLISHED: 2019-11-20
Pidgin 2.10.0 uses DBUS for certain cleartext communication, which allows local users to obtain sensitive information via a dbus session monitor.
CVE-2013-1816
PUBLISHED: 2019-11-20
MediaWiki before 1.19.4 and 1.20.x before 1.20.3 allows remote attackers to cause a denial of service (application crash) by sending a specially crafted request.
CVE-2011-4455
PUBLISHED: 2019-11-20
Multiple cross-site scripting vulnerabilities in Tiki 7.2 and earlier allow remote attackers to inject arbitrary web script or HTML via the path info to (1) tiki-admin_system.php, (2) tiki-pagehistory.php, (3) tiki-removepage.php, or (4) tiki-rename_page.php.