Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

Scammers Fall in Love with Valentine's Day

Online dating profiles and social media accounts add to the rich data sources that allow criminals to tailor attacks.

US-CERT and Cupid don't often keep company, but this Valentine's Day is being marked by new threats to those seeking romance and new warnings from the federal cybersecurity group.

A notice from US-CERT points to an FTC blog post about how consumers can protect themselves from online scams involving dating sites, personal messaging systems, and the promise of romance and companionship from online strangers.

The general warning comes as specific scams are being exposed by online researchers. For example, researchers at Agari Data have followed a Nigeria-based group dubbed "Scarlet Widow" since 2017 as they exploited vulnerable populations, moving from romantic "attacks" against isolated farmers and individuals with disabilities to business email compromises that raised the financial stakes.

Security experts aren't optimistic about finding a quick solution.

"These types of scams will not be disappearing anytime soon," says Anupam Sahai, vice president of product management at Cavirin. "Certain times of the year, Valentine's Day included, bring out both the best and the worst in us. Here, hackers prey on those most vulnerable, especially those who are possibly recovering from a family tragedy without a support network. Given the emotions, it is no surprise that romance scam losses, averaging $2,600 each, are seven times greater than most other frauds."

The primary issue is that these attacks aren't assaults on technology vulnerabilities — they prey on human limitations.

"These kinds of romance scams are very targeted social engineering attacks, effectively 'hacking' the victim's emotions rather than trying to perform a technical assault," says Nathan Wenzler, senior director of cybersecurity at Moss Adams. "Unfortunately, these kinds of attacks are becoming more and more commonplace, not only because of the large financial incentive, but because it has become easier than ever to tailor these scams for each individual victim."

Online dating profiles and social media accounts add to the rich data sources that allow criminals to tailor attacks as they look to exploit individuals in the same way that spear-phishing attacks exploit corporate employees to extract credentials and critical business data.

The FTC provides tips for avoiding victimization that include never sending money to an online romantic contact, taking the relationship slowly, doing an online image search to see whether the photo for the person's account appears with a different name, and discussing the relationship with friends and family members from real life. US-Cert has its own set of tips for staying safe on social media.

"No matter how desirable a person may sound online, everyone must tread with caution," says Chris Morales, head of security analytics at Vectra. "Only trust those you know in person, and even then be cautious. In our connected society, everyone needs to remember a basic rule we were taught as a child, especially with people you can’t even look in the eye: Don't talk to strangers."

Related Content:

 

 

 

Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industry's most knowledgeable IT security experts. Check out the Interop agenda here.

Curtis Franklin Jr. is Senior Editor at Dark Reading. In this role he focuses on product and technology coverage for the publication. In addition he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Doug1433
50%
50%
Doug1433,
User Rank: Apprentice
7/26/2019 | 8:09:41 PM
Ghana scam
Let me share my story,am no more ashamed as I start to campaign against romance scam in the future Unfortunately I was scammed thousands of dollars in 2017 and found out when I contacted the Ghana Crime Unit-info.ghanapolice at consultant dot com and was given full details of the scam and played along and was exact ,evidence and receipt of money transfer was sent to the Unit and they checked the bank and got the person arrested and justice was served. They used look alike bank websites from hsbc and other official government sites..
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-17230
PUBLISHED: 2020-04-03
includes/theme-functions.php in the OneTone theme through 3.0.6 for WordPress allows unauthenticated options changes.
CVE-2019-17231
PUBLISHED: 2020-04-03
includes/theme-functions.php in the OneTone theme through 3.0.6 for WordPress has multiple stored XSS issues.
CVE-2020-10689
PUBLISHED: 2020-04-03
A flaw was found in the Eclipse Che up to version 7.8.x, where it did not properly restrict access to workspace pods. An authenticated user can exploit this flaw to bypass JWT proxy and gain access to the workspace pods of another user. Successful exploitation requires knowledge of the service name ...
CVE-2020-10960
PUBLISHED: 2020-04-03
In MediaWiki before 1.34.1, users can add various Cascading Style Sheets (CSS) classes (which can affect what content is shown or hidden in the user interface) to arbitrary DOM nodes via HTML content within a MediaWiki page. This occurs because jquery.makeCollapsible allows applying an event handler...
CVE-2020-11500
PUBLISHED: 2020-04-03
Zoom Client for Meetings through 4.6.9 uses the ECB mode of AES for video and audio encryption. Within a meeting, all participants use a single 128-bit key.