We've all heard of catfish scams. This is when someone pretends to be their lover on the other side of the screen, but after their real face is revealed, they are not who they say they are. Now similar scams are on the rise and are much more sophisticated as scammers can also spoof their faces. This scam is known as the “Yahoo Boys” scam and it takes “catfishing” to a whole new level.
Click to receive Kurt's free CYBERGUY newsletter with security alerts, quick video tips, tech reviews, and easy ways to make you smarter.
How does deepfake technology work?
Deepfake technology uses AI to allow people to impersonate others through audio or video. This technology can essentially replicate someone's face, facial expressions, gestures, voice, etc., allowing a scammer to pretend to be someone they are not with almost perfect accuracy. Deepfake technology may be intended for good purposes, such as in the film industry or advertising (although the ethics of it are debatable), but it is usually used for more nefarious purposes than anything else.
Because it is very difficult to tell whether a deepfake is a real person or a deepfake (and because deepfakes are relatively new), deepfakes have the potential to cause a lot of damage. From the larger implications of being used to spread inaccurate news stories that can sway public opinion and the political process to the larger implications of being used to harm individuals through fraud, it's important to know what to look out for.
More: Top Scams Targeting Costco Shoppers Exposed
What is the ‘Yahoo Boys’ scam?
“Yahoo Boys” scams involve a group of sophisticated cybercriminals, primarily based in Nigeria, who use this technique to carry out what are known as romance scams. As with some catfishing attempts, they first build trust with their victims through personal, romantic interactions through messaging and eventually via video calls, manipulating their appearance in real time to match the descriptions and profiles they have shared up to that point. .
This will trick the victim into trusting you more. This is because most of us still use video as a way to verify a person's identity when the message is not compelling enough. Lastly, victims are often persuaded to transfer money at the right time and according to various fabricated scenarios, resulting in significant financial losses. in fact, FBI reported Romance scams like this have resulted in $650 million in losses.
Additional Information: Don't fall for these sneaky tax scams that try to steal your identity and your money.
How does it actually work?
In the case of “Yahoo Boys” scams, scammers do their dirty work by:
Level 1: Scammers use two smartphones or a combination of a smartphone and a laptop. One device is used to make a video call with the victim, while the other device is used to run face swap software.
Step 2: The scammer activates face swap software on the secondary device. The device's camera takes a picture of the scammer's face, and software adds a digital mask over it. These masks are realistic replicas of the facial features of another person the scammer has chosen to impersonate. The software is sophisticated enough to track and mimic an imposter's facial movements and expressions in real time, altering everything from skin color and facial structure to hair and gender to match the chosen identity.
Step 3: For video calls, scammers use the primary device with the rear camera aimed at the secondary device's screen. This screen shows a deepfake, which is a digitally altered face. The rear camera captures this and transmits it to the victim, who sees the deepfake as if it were the scammer's real face. To make the illusion even more convincing, the device is fixed on a stand and ring lights provide even and attractive illumination. This setting ensures that deepfakes appear clearly and reliably, tricking victims into believing they are seeing a real person.
Step 4: Throughout the call, the scammer will speak using their own voice, but some setups may even use voice-changing technology to match their voice to a fake face. This comprehensive disguise allows the scammer to interact naturally with the victim, which reinforces the illusion.
Although each deepfake scam is different, having a basic level of understanding of how these scams work can help you identify them.
How to Stay Safe from Deepfake Scams
Here's what you can do to protect yourself from deepfake scams like the “Yahoo Boys” scam.
identity verification: Always verify the identity of individuals you meet online through video calls by having them perform unpredictable actions in real time, such as writing specific words on paper and showing them to the camera.
Be skeptical of unusual requests.: Be careful if someone you only met online asks for money, personal information, or other sensitive information.
Strengthen your privacy settings: Adjust your privacy settings on social media and other platforms to limit the amount of publicly available personal information that can be used to create deepfake content.
Use secure communication channels: Prefer secure, encrypted platforms for communication and avoid sharing sensitive content through less secure channels.
Educate Yourself About Deepfakes: Stay up to date on the latest developments in deepfake technology to better recognize potentially manipulated content.
Report suspicious activity: If there is a possibility of a fraud or deepfake attempt, report it to the relevant authorities or platform to prevent further incidents.
Following these guidelines can help reduce your risk of becoming a victim of sophisticated digital fraud and help keep your personal and financial information out of the hands of these scammers.
Read more: Could AI Help Someone Run a Fake Kidnapping Scam Against Your Family?
Protect your identity in the age of deepfakes
As deepfake technology becomes more accessible and persuasive, so does the risk of identity theft. Fraudsters can use stolen personal information to create more believable deepfakes, making the scam harder to detect. Additionally, the sophistication of deepfakes allows criminals to bypass biometric security measures, potentially allowing unauthorized access to personal accounts and sensitive financial information. This is where identity theft prevention services become very important.
Identity theft companies can monitor your personal information, such as social security numbers, phone numbers, and email addresses, and send you alerts if that information is being sold on the dark web or used to open accounts. It can also help you freeze bank and credit card accounts to prevent further unauthorized use by criminals.
One of the best things about using some services is that they may include identity theft insurance, including: Up to $1 million to cover losses and legal costs And the White Glove Fraud Resolution Team Our US-based case managers can help you recover your losses.. Get tips and best options on how to protect yourself from identity theft..
Signing up for a reputable identity theft prevention service can add an extra layer of security, monitoring and protecting your digital presence from the ever-evolving tactics of cybercriminals like the “Yahoo Boys.”
See more: Unforgettable Mother's Day Gifts 2024
Kurt’s Key Takeaways
The primary targets of “Yahoo Boys” scams are individuals who form online romantic relationships with the scammers. There is not necessarily a specific age or demographic that can become a victim, as these victims are often emotionally invested and more vulnerable to manipulation. And since we know that the root of all these scams is deepfake technology, anyone can be a target. So, I hope you find this helpful and please spread the word to your friends and family.
Have you ever heard of other types of deepfake scams? Or do you know someone who has fallen victim to this type of scam? Please let us know by sending a letter to: Cyberguy.com/Contact Us.
For more tech tips and security alerts, subscribe to the free CyberGuy Report newsletter by going to: Cyberguy.com/Newsletter.
Ask Kurt a question or let him know what story you'd like us to cover..
Answers to CyberGuy's most frequently asked questions:
Copyright 2024 CyberGuy.com. All rights reserved.