Social Media Money Flipping ScamScam A Scam is a confidence trick - a crime -  is an attempt to defraud a person or group after first gaining their trust through deception. Scams or confidence tricks exploit victims using their credulity, naïveté, compassion, vanity, irresponsibility, or greed and exploiting that. Researchers have defined confidence tricks as "a distinctive species of fraudulent conduct ... intending to further voluntary exchanges that are not mutually beneficial", as they "benefit con operators ('con men' - criminals) at the expense of their victims (the 'marks')". A scam is a crime even if no money was lost.

How ScamsScams A Scam is a confidence trick - a crime -  is an attempt to defraud a person or group after first gaining their trust through deception. Scams or confidence tricks exploit victims using their credulity, naïveté, compassion, vanity, irresponsibility, or greed and exploiting that. Researchers have defined confidence tricks as "a distinctive species of fraudulent conduct ... intending to further voluntary exchanges that are not mutually beneficial", as they "benefit con operators ('con men' - criminals) at the expense of their victims (the 'marks')". A scam is a crime even if no money was lost. Work

A SCARSSCARS SCARS - Society of Citizens Against Relationship Scams Inc. A government registered crime victims' assistance & crime prevention nonprofit organization based in Miami, Florida, U.S.A. SCARS supports the victims of scams worldwide and through its partners in more than 60 countries around the world. Incorporated in 2015, its team has 30 years of continuous experience educating and supporting scam victims. Visit www.AgainstScams.org to learn more about SCARS. Insight

Social Media Scams Come In Every Imaginable Kind! This IS Just One More!

In this case, scammers are using social media platforms and banking appsApps Applications or Apps An application (software), commonly referred to as an ‘app’ is a program on a computer, tablet, mobile phone or device. Apps are designed for specific tasks, including checking the weather, accessing the internet, looking at photos, playing media, mobile banking, etc. Many apps can access the internet if needed and can be downloaded (used) either for a price or for free. Apps are a major point of vulnerability on all devices. Some are designed to be malicious, such as logging keystrokes or activity, and others can even transport malware. Always be careful about any app you are thinking about installing. to solicit large sums of cash from victims.

This is very similar to Pig ButcheringPig Butchering Sha Zhu Pan 殺主盤 “Pig Butchering” This is a scam type that originated in China involving the scammer developing a relationship with the victim - sometimes romantic sometimes not - and leading the victim to invest in a fake company or asset. These typically target smart younger women. scams.

Money Flipping

Social media companies are seeing a series of legitimate accounts being hijacked by scammers advertising unrealistic money-flipping opportunities.

These fraudsters claim they will exponentially increase a victim’s funds once provided via Cash App. These scammers will often have legitimate-looking profiles displaying strangers with large sums of cash resulting from their participation in these fraudulent investments.

Do not be confused, these are not traditional romance scams or ever Pig Butchering scams, they do not depend on a romantic interest in the scammers to triggerTRIGGERS A trigger is a stimulus that sets off a memory of a trauma or a specific portion of a traumatic experience. the trust. However, these are definitely impersonationImpersonation An impersonator is someone who imitates or copies the behavior or actions of another. There are many reasons for impersonating someone, such as: part of a criminal act such as identity theft, online impersonation scam, or other fraud. This is usually where the criminal is trying to assume the identity of another, in order to commit fraud, such as accessing confidential information or to gain property not belonging to them. Also known as social engineering and impostors. scams.

How It is Implemented

  1. Scammers contact the victim directly via private messenger, often using accounts stolen from the victim’s friends.
  2. The scammers will offer returns larger than the victim’s investment at no interest and no risk.
  3. If the victim sends money, communications are either ceased or scammers will send fake Cash App screenshots indicating the victim’s money has already increased.
  4. They then request more money with the promise of more returns that the victim will never see.
  5. If the victim sent money or not, the scammers often suggest money is pending in the victim’s Cash App account but requires replacing the email address connected to the victim’s social media account with one provided by the scammers.
  6. Once done, the scammers reset the password and take control of the account.
  7. Once they have control, the cycle continues, now against the victim’s followers, friends, or family.

Means Of Defense

Use dual-factor authentication (DFA) or multi-factor authentication (MFA) when available (almost all social media platforms offer it). Though many find this inconvenient, having DFA prevents accounts from being hijacked simply by email reset. This helps prevent many forms of account hijacking and can also alert users of hijack attempts.

Do not change your account information based on outside requests. There is no legitimate reason to change your account information to that of someone else’s. Cash App is not locked by social media settings and anyone that attempts to convince you otherwise is likely attempting to gain access to your information. Be cautious.

Do not click on links and verify who you’re conversing with. If you are having an unusual conversation with someone on social media and they attempt to solicit money or account information, question this and give them a phone call. Talk to your friends live, ask questions, be skeptical, and do not click on links as they may be directing you to a malicious webpage. Online, anyone can be anyone else. Trust, but verify. If the money transfer application has a security pin feature that requires PIN entry before authorizing a transfer, use it!

Essential Tools For Every Scam Victim From SCARS Publishing

Visit shop.AgainstScams.org

Each is based on our SCARS Team’s 31 plus years of experience.

SCARS Website Visitors get an Extra 10% Discount
Use Discount Code “romanacescamsnow” at Checkout

SCARS GREN BOOK - The SCARS STEPS Guide to Scam Victim Recovery
SCARS RED BOOK - Your Personal Scam Evidence & Crime Record Organizer
SCARS BLUE BOOK - Survivor's Recovery Journal
SCARS SLATE BOOK - A Guide For Families & Friends Of Scam Victims
SCARS LIME BOOK - Wisdom & Motivation for Scam Victims
SCARS CHERRY BOOK - A Guide To Understanding Your Fear
SCARS WORKBOOK - 8 Steps To Improvement
SCARS WORKBOOK - Understanding Self-Blame, Guilt, and Shame
100% of all profit goes to support FREE Scam Victims' Services

100% of all profit goes to help SCARS help more scam victims worldwide.

Your generous purchase allows us to maintain our scam avoidance, support, and recovery services. Please help SCARS and stand proud.

Always Report All Scams – Anywhere In The World To:

U.S. FTCFTC The Federal Trade Commission (FTC) is an independent agency of the United States government whose principal mission is the enforcement of civil (non-criminal) U.S. antitrust law and the promotion of consumer protection. The FTC can also act as a clearinghouse for criminal reports sent to other agencies for investigation and prosecution. To learn more visit www.FTC.gov or to report fraud visit ReportFraud.FTC.gov at https://reportfraud.ftc.gov/#/?orgcode=SCARS and SCARS at www.Anyscams.com

Find Real ScammerScammer A Scammer or Fraudster is someone that engages in deception to obtain money or achieve another objective. They are criminals that attempt to deceive a victim into sending more or performing some other activity that benefits the scammer. & Fake Stolen Photos On ScamsONLINE.org

Scroll to the bottom to leave a comment!