Cat Phishing & Indentity Fraud

Cat Phishing & Indentity Fraud

🇰ꪖꪶỉ᭢ᦋꪹꪖꪖ🇯‌™ 🧡✺💚

So today we are going to learn about what is cat phishing and identity fraud .

How scammers can scam you and take your money in name of fake relationship

catphishing


So let's learn how they attack!!

So attacker first check your profile(by doxing you) after gaining good info about your background , they interact you socially . Boys and girls of 30+ age mostly got scammed by this....

What Is Catfishing?

Catfishing refers to a type of online fraud in which the cybercriminal creates a false online identity. Oftentimes, the purpose of catfishing is to steal the victim’s identity. It is a type of social engineering scheme, in which one or more perpetrators use deceptive tactics to retrieve personally identifiable information (PII) from unsuspecting victims.

Due to covid lockdown many users search GFs and BFs on matrimonial apps and site!! And its a golden time for attacker to attack.....


They create their false identity , and they show that they belongs to very rich family , they have very less time to chat you, they like you!!


All attackers having only two to three months time because have to attack victim so they propose you and gave proposal for a marriage !!

And our innocent victim got phished in their fake relationships and got scammed !! Their target mostly rich villagers and those who are 30+ and not getting married yet!!

They make their fake business sites and social profiles and shows that they are very rich !!

They target user for their skills or money!!

Example:::Suppose a girl knows that you are good web developer she'll propose you for using the guy for making sites .


They seduce you day by day and at last they request for nudes !!

After getting nudes they will bully you and demand for money!!

They assure you that they will not leak after getting money but they leak your photo when you send money!!


When teenage relationships start

There isn’t a ‘right age’ to start having relationships – every child is different, and every family will feel differently about this issue. But here are some averages:

  • From 9-11 years, your child might start to show more independence from your family and more interest in friends.
  • From 10-14 years, your child might want to spend more time in mixed gender groups, which might eventually end up in a romantic relationship.
  • From 15-19 years, romantic relationships can become central to social life. Friendships might become deeper and more stable.

Many teenagers spend a lot of time thinking and talking about being in a relationship. In these years, teenage relationships might last only a few weeks or months. It’s also normal for children to have no interest in romantic relationships until their late teens. Some choose to focus on schoolwork, sport or other interests.

First crushes

Before children start having relationships, they might have one or more crushes.

An identity crush is when your child finds someone they admire and want to be like.

A romantic crush is the beginning of romantic feelings. It’s about your child imagining another person as perfect or ideal. This can tell you a lot about the things that your child finds attractive in people.

Romantic crushes tend not to last very long because ideas of perfection often break down when your child gets to know the other person better. But your child’s intense feelings are real, so it’s best to take crushes seriously and not make fun of them.

Early teenage relationships

Younger teenagers usually hang out together in groups. They might meet up with someone special among friends, and then gradually spend more time with that person alone.

If your child wants to go out alone with someone special, talking about it together can help you get a sense of whether your child is ready. Does your child want a boyfriend or girlfriend just because their friends do? Does your child think it’s the only way to go out and have fun? Or does your child want to spend time getting to know someone better?

If the person your child is interested in is older or younger, it could be worth mentioning that people of different ages might want different things from relationships.


Relationship not means using a person or making friendship only for money!!

identity theft

Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable information (PII), such as Social Security or driver's license numbers, in order to impersonate someone else.


Types of identity theft


Identity theft is categorized in two ways: true name and account takeover. True-name identity theft means the thief uses personal information to open new accounts. The thief might open a new credit card account, establish cellular phone service or open a new checking account to obtain blank checks.


Account-takeover identity theft is when the imposter uses personal information to gain access to the person's existing accounts. Typically, the thief will change the mailing address on an account and run up a huge bill before the victim realizes there is a problem. The internet has made it easier for identity thieves to use the information they've stolen since transactions can be made without any personal interaction.


There are many different examples of identity theft, including:


Financial identity theft. This is the most common type of identity theft. Financial identity theft seeks economic benefits by using a stolen identity.

Tax-related identity theft. In this type of exploit, the criminal files a false tax return with the Internal Revenue Service (IRS). Done by using a stolen Social Security number.

Medical identity theft. Where, the thief steals information like health insurance member numbers, to receive medical services. The victim's health insurance provider may get the fraudulent bills. This will be reflected in the victim's account as services they received.

Criminal identity theft. In this example, a person under arrest gives stolen identity information to the police. Criminals sometimes back this up with a containing stolen credentials. If this type of exploit is successful, the victim is charged instead of the thief.

Child identity theft. In this exploit, a child's Social Security number is misused to apply for government benefits, opening bank accounts and other services. Children's information is often sought after by criminals because the damage may go unnoticed for a long time.

Senior identity theft. This type of exploit targets people over the age of 60. Because senior citizens are often identified as theft targets, it is especially important for this seniors to stay on top of the evolving methods thieves use to steal information.

Identity cloning for concealment. In this type of exploit, a thief impersonates someone else in order to hide from law enforcement or creditors. Because this type isn't explicitly financially motivated, it's harder to track, and there often isn't a paper trail for law enforcement to follow.

Synthetic identity theft. In this type of exploit, a thief partially or completely fabricates an identity by combining different pieces of PII from different sources. For example, the thief may combine one stolen Social Security number with an unrelated birthdate. Usually, this type of theft is difficult to track because the activities of the thief are recorded files that do not belong to a real person.

Identity theft techniques


Although an identity thief might hack into a database to obtain personal information, experts say it's more likely the thief will obtain information by using social engineering techniques. These techniques includes the following:

Mail theft. This is stealing credit card bills and junk mail directly from a victim's mailbox or from public mailboxes on the street.

Dumpster diving. Retrieving personal paperwork and discarded mail from trash dumpsters is an easy way for an identity thief to get information. Recipients of preapproved credit card applications often discard them without shredding them first, which greatly increases the risk of credit card theft.

Shoulder surfing. This happens when the thief gleans information as the victim fills out personal information on a form, enter a passcode on a keypad or provide a credit card number over the telephone.

Phishing. This involves using email to trick people into offering up their personal information. Phishing emails may contain attachments bearing malware designed to steal personal data or links to fraudulent websites where people are prompted to enter their information.

How to get safe from this type of attacks?

👍Never show that you are rich!!

👍Never show that you are interested in

making new friends . As some user

mention that they are single .

👍Some users show off their skills also get scammed .

👍Never share your personal info specially financial data with anyone.

👍Stay away from strangers

👍Never share your important personal pics online.


I am not saying that every girl or boy is a scammers!! But be careful while making new friends , they just use you as a puppet for their needs !!

Relational depends on your nature, means your

Communication style

Your logics

Your support to your loved one

Caring Nature

Respect = Respect


If really your loved one loves only because of your caring nature and interactive sense the she or he'll never ask for gifts or your personal pics!


This post is just for educational purpose !!

Its not for hurting sentiments or feelings of anyone !!

I hope you all properly understand what i mean to say!!

So be careful be safe, Be ethical !!

Read below article for getting to know what attacker can do with your pic and videos!!

https://telegra.ph/DEEPFAKE-Guide-03-10


❤REGARDS💙

@Its_me_kali