Understanding Online Scams

What is Scammer?

A scammer is an individual or entity that uses deception to cheat people out of their money or personal information. They use various tactics to mislead victims, such as posing as legitimate businesses, offering fake prizes or investment opportunities, or pretending to be government officials. Scammers target individuals through phone calls, emails, text messages, and websites, manipulating emotions and using pressure tactics to elicit quick decisions.

Being skeptical of unsolicited offers, verifying the identity of the contact, and keeping personal information secure are critical measures to avoid falling victim to a scammer.

What is Scambaiting?

Scambaiting is the act of posing as a potential victim to a scammer in order to waste their time, gather information, and divert them from scamming real victims. This is often done by individuals or organizations who aim to protect vulnerable populations and expose scamming practices. Many scam baiters also aim to frustrate or trick the scammers to discourage them from continuing their malicious practices.

If the Caller says, "I'm not a Scammer", chances are, the caller is TOTALLY a SCAMMER!

What is a Spam Call?

Spam calls are unsolicited calls commonly made by automated systems known as "robocalls" to a large number of people aimed to sell products or services. However, these calls can also be attempts by scammers, typically from overseas (India, Nigeria, etc.) to scam innocent people out of personal information or money.

To protect your information, it is essential to be cautious about sharing personal details, especially online, and to use services such as the National Do Not Call Registry (in the U.S.) to opt-out of telemarketing calls. Using spam call-blocking applications on your phone, careful when giving out your phone number, and regularly checking privacy settings on social media and other platforms can also help safeguard your personal information from falling into the wrong hands.

General Tips

  • Be careful about which spam-blocking app you choose, as their effectiveness can vary.

  • Regularly update the spam-blocking app to benefit from improved features and databases.

  • Review the app’s blocked calls periodically to make sure legitimate numbers haven't been blocked accidentally.

1. Tech Support Scams: Scammers pretend to be technical support personnel, reaching out to victims via phone, email, or pop-up messages. They claim that the victim's computer is infected with viruses and offer to fix the issue for a fee. In reality, they may install malware or steal personal information.

2. Phishing Scams: Scammers send emails or messages impersonating legitimate institutions, such as banks, requesting personal information or login credentials. This information is then used for identity theft or financial fraud.

3. Romance/Online Dating Scams: Scammers create fake profiles on dating websites or social media platforms and establish romantic relationships with victims. They then manipulate victims emotionally and request money for various reasons, such as medical emergencies or travel expenses.

4. Identity Theft: Scammers obtain personal information, such as credit card details or Social Security numbers, to use fraudulently, opening accounts or making purchases in the victim's name.

5. Online Purchase Scams: Scammers create fake websites or listings, offering products or services at attractive prices. They may collect payment but never deliver the items or provide poor-quality goods.

6. Advance Fee Fraud/419 Scams: This type of scam typically involves promising a large sum of money to the victim in exchange for an upfront fee or personal information. The scammer may pose as a wealthy individual or a representative of a prestigious organization, enticing the victim to provide financial assistance.

7. Lottery Scams: Scammers inform victims that they have won a lottery or sweepstakes, often by impersonating well-known companies or organizations. To claim the prize, victims are required to pay processing fees or provide personal details for identity theft purposes.

8. Employment Scams: Scammers pose as recruiters or employers, promising lucrative job opportunities in exchange for payment or personal information. These may include work-from-home scams or pyramid schemes.

9. Investment and Ponzi Schemes: Scammers promise high returns on investments or invite individuals to join schemes where earlier investors are paid with the money from new investors. Eventually, the scheme collapses, and the majority of participants lose their funds.

YouTube video- Scambaiter MidnightSB

Romance Scam "Catfish Video" from YouTuber Bait Scammers Trilogy Media

The Tools Scammers Use

While there are various legitimate uses for remote desktop software, scammers often misuse any software that can provide them remote access capabilities. Some scammers who are well-educated in software development can develop their own remote software application that requires the user to simply go to their website link and enter a passcode provided to the user by the scammer. Some commonly known remote desktop software that scammers may exploit include:

  • AnyDesk: As mentioned earlier, while AnyDesk is a legitimate remote desktop software, scammers can abuse it for fraudulent purposes.

  • TeamViewer: Similarly, TeamViewer is a widely used remote desktop software that scammers may misuse to gain unauthorized access to victims' computers, extract sensitive information, or carry out fraudulent activities.

  • LogMeIn: LogMeIn is another legitimate remote desktop software that scammers can misuse to gain unauthorized access or deceive victims into providing sensitive information.

  • Chrome Remote Desktop: Although Chrome Remote Desktop is a legitimate software developed by Google, scammers might use it to gain control over victims' computers and manipulate or steal data.

It is important to note that the software mentioned above are tools that facilitate remote access and control. The misuse and exploitation come from the actions and intentions of the scammers who misuse them.

To protect yourself, it is important to:

2. Exercise caution and NEVER, EVER give access to your bank account or other financial institution.

3. Verify the identity of individuals requesting remote access. You can do this by not listening to the scammer and contacting the company (Amazon, Microsoft, Netflix, Google, etc.) that they are representing, directly, and speaking to an actual representative reputable support teams.

The scammer might say they have a sick parent, or other family member that relies on them, and if you don't do what they need, you are putting them all in jeopardy of starvation, or losing their homes.

They will always tell you they love you. How can you love someone you never met unless you let them manipulate you with tragic stories or heartbreaking trauma?

They may actually tell you they will commit suicide if you don't help them.

Bottom Line: Scammers are masters at manipulation. Don't let them coerce you into anything. Take a step back and look at what is happening. Be in the moment! And then call someone who can help you decide what to do. Never be afraid to ask for help. If you don't know anyone, contact any of the Scam Baiters provided on this site. They will come to your rescue!

How They Try to Bait You

Scammers are Shameless

In this video, Indian Scammer, "Praveen" aka "Sean Smith" was confronted by YouTube Scam Baiter, Jim Browning.