top of page

Tips to check the authenticity of your scammer

作家相片: Global Anti-Scam OrgGlobal Anti-Scam Org

已更新:1月11日


Below is a collection of additional scam-spotting tips based on common tactics scammers use—particularly romance or investment scammers. While these tips are not foolproof, they can help you detect and avoid potential scams. Always stay vigilant and trust your instincts.

1. Video Chat Red Flags
  • Short, Poorly Synced Videos
    • Some scammers use pre-recorded videos or deepfakes and will only video-chat for a few seconds. If someone’s lips don’t match the audio or the call drops abruptly, these could be signs of fakery.
    • Tip: Make sure the video chat lasts more than one minute and watch closely for any mismatch between their speech and lip movements.

2. In-Person Meetings That Never Happen
  • Always “Busy” or Last-Minute Cancellations
    • A scammer might claim to live nearby but will repeatedly cancel or ghost you on the day of the meet-up, citing vague emergencies or sudden business trips.
    • Tip: If they have a never-ending list of excuses and refuse to meet in person, consider it a red flag.

3. Shifting Communication to WeChat or Another App
  • Refusal to Communicate on Certain Platforms
    • In some cases, scammers will insist on switching to a specific messaging app (e.g., WeChat), claiming they don’t use more mainstream services.
    • Tip: Scammers aware of anti-fraud efforts might avoid sharing suspicious links on monitored platforms. If they’re oddly resistant to using popular, secure apps or are evasive about their identity, proceed with caution.

4. Reverse Image Searches
  • Detecting Stolen or Stock Images
    • Scammers often use attractive stolen photos (sometimes from Thai or other non-mainstream influencers) to build a false persona.
    • Tip: Use reverse image search tools such as Google Images, Baidu, Yandex, TinEye, YouTuTu, Sogou, or PimEyes to verify if the photos appear elsewhere under different names.
    • Pro Tip: Choose photos where the face is clearly visible or facing forward. Cropping/zooming in on the face can yield better results.

5. Suspicious Contact Numbers
  • Frequent Use of Certain Country Codes
    • Many reported scam calls or WhatsApp numbers come from country codes like +852 (Hong Kong), +60 (Malaysia), +44 (UK), or any country code known for easy SIM registration with no strict ID checks.
    • Tip: If you only have their app-based number, try calling them directly (traditional voice call). If the number is always unreachable or they dodge normal calls, be extra cautious.
6. Fake Passports or IDs
  • Scammers Providing “Proof”
    • To build trust, scammers may send an image of a supposed passport, driver’s license, or ID card—often poorly doctored.
    • Tip: If they claim to hold a Chinese ID, you can check (in limited capacity) via nciic.com.cn (the National Citizen Identity Information Center in China). However, note that detailed verification might require official protocols, so remain skeptical if the ID looks odd or the details don’t match their story.

7. Fraudulent Investment Websites
  • Asking for “Security Fees” or “Country Tax Fees”
    • Legitimate investment platforms do not typically require extra charges just to withdraw your own funds.
    • Tip: If you must talk to their “customer service” only via WhatsApp, LINE, or other informal channels, that is a red flag. Real companies use official email domains or ticketing systems.
    • Domain Checks
      • You can look up domains at whois365.com to see if they are newly created or have suspicious registration details.
    • Cryptocurrency Redirection
      • If they ask you to deposit funds into a legitimate cryptocurrency exchange (e.g., Binance, Coinhako, Coinbase, etc.) and then move it to their “platform,” be extremely wary. Once funds move to a personal wallet or questionable website, it’s nearly impossible to recover them.
    • Real Crypto Websites for Illicit Purposes
      • Some scammers use legitimate crypto websites (like Binance) purely as a conduit for money laundering. The transactions become untraceable, making it hard for victims (and law enforcement) to retrieve funds.

8. Final Safety Reminders
  1. Cross-Verification
    • If in doubt, ask the person for multiple forms of verification (e.g., a longer video call, social media profiles with consistent activity, or official documentation).
    • Search their name, photos, and any suspicious details online to see if others have reported similar scams.
  2. Trust Your Instincts
    • If a scenario sounds too good to be true or feels off—like someone pushing you to invest quickly, claiming a romantic interest at lightning speed, or refusing to meet—it probably is.
  3. Slow Down
    • Scammers thrive on creating urgency. Never let anyone rush you into a financial transaction or handing over personal information.
  4. Report and Block
    • If you suspect a scam, block the individual on all platforms and report them to the relevant authorities (e.g., your local anti-scam hotline, consumer protection agency, or cybercrime unit). This helps protect you and others.

Key Takeaway
Scammers constantly adapt their tactics to bypass detection. Stay informed, maintain healthy skepticism, and protect yourself and your loved ones by knowing the warning signs and verifying identities through trusted means. If you’ve been targeted by a scam, alert your local authorities or anti-fraud organizations—your report could help others avoid the same pitfalls.









 
bottom of page