Home Forum Identity Theft Pretending someone else by using her photo

  • Pretending someone else by using her photo

    Posted by Jennie on October 20, 2021 at 1:26 pm

    I was sent this on messenger few days ago. It was not sent sent from my friend. They had her photo and were pretending to be her. I did not accept the link she wanted to send and blocked this scammer.

    Be aware guys 🙂

    Iqra replied 2 years, 6 months ago 4 Members · 3 Replies
  • 3 Replies
  • Gavin

    Member
    October 20, 2021 at 4:23 pm
    Newbie

    If people stopped replying to message and friend requests from people they don’t know …the talk of payment would never come up. Better to ignore the requests, report and block . Done

    • Iqra

      Member
      October 20, 2021 at 5:54 pm
      Newbie

      You’re right I don’t know why people respond to strangers 😏

  • Jasmine

    Member
    October 20, 2021 at 4:36 pm
    Newbie

    Yeah!! It’s easy you need to send pics of the person and somethings they text …

Log in to reply.

Trustscore

Domain: dropbox.com

Established: 1995-06-28

Server IP Address: 205.251.193.59

Domain Blacklisted: No

In computing, a blacklist, disallowlist, blocklist, or denylist is a basic access control mechanism that blocks all malicious elements (email addresses, websites users, …)

Suspended Site: No

When your website account is suspended, it means the hosting provider has temporarily taken it offline. Website hosts often suspend websites for a myriad of reasons ranging from malware to spam.

Email (MX) Configured: Yes

Verification that the website has its entity’s proper IMAP (Inbox) and SMTP (Outbox) mailbox servers configured correctly.

DMARC Configured: Yes

DMARC is an open email authentication protocol that provides domain-level protection of the email channel. DMARC authentication detects and prevents email spoofing techniques used in phishing, business email compromise (BEC), and other email-based attacks.

SSL Cert Blacklisted: No

Hackers have discovered ways to circumvent, alter, or abuse SSL certificates. An SSL certificate blacklist is a list of untrustworthy SSL certificates that have been created and can potentially harm users.

Website Popular: No

Risky TLD: No

The TLD (Top Level Domain) are the last characters of an entity’s website name, such as .com, .org, etc. Cyber-criminals and threat actors prefer a small set of 25 out of the thousands of available extensions, which accounts for 90% of all malicious sites. A Risky TLD is verification that the domain name is not to be trusted.

Heuristic Pattern: No

If a website uses Heuristics, then it is a scanning method that looks for malware-like behavior patterns. It is commonly used to detect new or not-yet-known malware.

Risky Geolocation: No

Verification to an entity’s geolocation status being labeled as ‘Risky’.

Suspicious Domain: No

Verification the entity’s domain is not listed as being “Suspicious”.