
Redazion RHC: December 7, 2025 08:45
Criminals are increasingly using photos and videos from public sources to pass off as evidence in suspected kidnappings. FBI warns criminals I am modifying the images I find to make them look as authentic as possible. describe Detaining a specific person against his or her will and sending him to a relative with threats .
Often these are completely fabricated stories and the victims are sleeping peacefully at home, unaware of what is happening. But law enforcement officials are also noticing a more disturbing trend: scammers. They monitor missing person posters, select photos of missing persons, and use them to put pressure on families.
Essentially, these schemes recreate old telephone scams in which elderly people were approached with stories about recently deceased relatives. Then the scammers demanded Money for “treatment” and “liberation” They hope to shock and disappoint the recipient. Last year, the FBI received 357 complaints about such incidents, totaling losses. 2.7 million dollars. Newer versions of this scheme work as well. However, it is complemented by the “evidence” produced, which at first glance appears convincing. The person is usually depicted as Fear, fatigue, being exposed to an unfamiliar situation, etc. are enough to give the recipient a real sense of threat.
Identity theft is made possible by the fact that virtually everyone has numerous public photos online. Social media platforms allow attackers to: Immediately identify a potential victim's circle of friends and family. Artificial intelligence based tools Change facial expressions, backgrounds, image details, or even create fully composite images . But as experts point out, upon closer inspection, Such materials often contain errors, such as characteristic features disappearing, proportions changing, and distortions appearing.
To prevent people from calmly verifying the authenticity of images, Criminals often use suicide messages. The image disappears after a few seconds, so you have little time to compare it with a real photo or consult your acquaintances. This race against time is an important part of the plan.
Meanwhile, cybersecurity analysts admit: Sometimes they come across fakes that are so convincing that they mistake them for the real thing. On the other hand, Underground Resources sells the following tools: Worm GPT helps attackers create phishing scams, create operational scripts, and automate attacks.
To protect yourself and your loved ones, The FBI recommends avoiding sharing personal information while traveling and agreeing to a code word that only your family knows. If you receive a threat, try contacting the person listed in the message. This often quickly reveals fraud.
Similar deceptive techniques have plagued the corporate world for years. Companies are facing more and more problems Fake candidates looking for remote IT jobs . The US Department of Justice reported that participants in such networks earned at least $88 million over six years.
Most of these cases have traces that lead to North Korea. People using fake IDs find jobs at companies, work as developers, and remit their earnings. In addition to fake documents, we now have generation tools to create resumes, create interview scripts, and even change your appearance on video calls. As a result, employers will not be able to communicate with the person seen on the screen. But it's not that scary, right?
redazionRed Hot Cyber's editorial team is comprised of a group of individuals and anonymous sources who actively work together to provide early information and news about cybersecurity and computing in general.
List of articles
