Search

Relationship and romance

Scam medium:

  • Email and text
  • Internet

Targeting:

  • Individuals

A scammer convinces you to enter a virtual, online relationship so the scammer can gain your trust and affection. This can occur through:

Eventually, the scammer may ask you:

Scammers will try to use any means necessary to convince you that their requests are legitimate. The majority of fraud is not committed by amateurs and they will use technology to their advantage.

Variations

Combining romance and investment scams

The CAFC is noticing an increase in a combination of romance and investment scams which are often referred to as "pig butchering". In these scams, you are contacted on dating apps or social media by a fraudster who is attempting to develop a relationship with you to gain your trust. After trust is gained, the fraudster will claim that they have been a successful investor in cryptocurrency and can help you also make money and "get rich" and convince you to invest.

They may even let you cash out some of your investment returns only to get you to invest a larger amount. Suspects will “coach” you on how to invest in their fraudulent crypto currency platforms. Unfortunately, once you request to withdraw their investment, you can’t.

Relationship investment fraud phishing

Sometimes reffered to as approval phishing. Fraudsters deceive you into granting access to your cryptocurrency accounts by those posing as trusted services. After they coach you on how to acquire cryptocurrency like Etherium or Tron, they send you a fake request appears to come from the crypto service, asking you to “approve” access to your wallet. By clicking “approve,” you unknowingly give control of you funds fraudster. The fake requests closely mimic legitimate apps and services, making them look authentic. In some cases, you may receive a transfer request asking you to click on a link to accept and you may unknowingly be providing the “approval” to access your wallet.

Look out for these red flags and be suspicious:

How to protect yourself

Date modified: