Knowledge is power
Cloning Scams: What You Need to Know
Cloning scams involve fraudsters creating fake profiles or accounts that look identical to real ones, often impersonating friends, family members, or trusted organisations. These fake profiles are used to trick people into sharing personal information, sending money, or clicking on malicious links. Cloning scams are especially common on social media platforms, where scammers copy names, photos, and details to make their profiles look authentic.
Whats the thinking
How Cloning Scams Work
In a cloning scam, a scammer duplicates a legitimate profile by copying photos, names, and personal details. They then send friend requests or messages to the original person’s contacts, posing as them. Common strategies include:
- Requesting Money for Emergencies: The cloned account claims to need urgent financial help.
- Sending Malicious Links: The fake account sends links, supposedly for an event, video, or promotion, which lead to phishing sites or malware.
- Asking for Sensitive Information: The imposter might request personal information under the pretext of a trusted contact.
- Soliciting “Donations”: Scammers posing as public figures or brands may ask for donations to fake causes.
Once contacts respond, the scammer may gather information for financial fraud or identity theft.
Whats the thinking
Why Do People Fall for Cloning Scams?
Cloning scams succeed because people inherently trust messages or requests that appear to come from someone they know or a trusted organisation. When a message seems urgent—like a request for help from a “friend” or “family member”—people often act quickly, especially if they feel their loved one is in trouble. The familiarity of the cloned profile makes it easy to believe that the request is genuine, particularly when the message seems casual or personalised.
Whats the thinking
The Mindset Behind Cloning Scams
Cloning scams rely heavily on the exploitation of trust and familiarity. Scammers know that people are more likely to share information or offer help when they believe it’s for someone they know personally. By mirroring an existing profile, scammers bypass usual suspicion, creating a façade that feels safe and authentic. Their strategy capitalises on both the trust built by the real individual or brand and the immediate emotional reactions to personalised requests.
This scam is based on social engineering rather than technology, using familiarity and urgency to get what they want.
What to Look For
Common Phishing Warning Signs
To avoid falling victim to phishing, here are some common warning signs
Show me
Common Phishing Examples
Here are a few examples to show how phishing scams work in the real world
