Ben Tasker recounts his experience "catfishing" a suspected romance scammer who targeted his mother. After his mother was approached online by a supposedly successful businessman, Tasker took over communication, creating a fictional persona named "Sarah." He strung the scammer along with an elaborate, increasingly ridiculous story involving a fake inheritance and a need for financial assistance. Tasker's goal was not to extract money, but to waste the scammer's time and resources, preventing them from targeting vulnerable individuals. He documented the elaborate ruse, detailing the scammer's progressively desperate attempts to extract money despite Sarah's outlandish tales and constant avoidance of video calls. The post highlights the common tactics used by romance scammers and serves as a cautionary tale about online relationships.
The FBI and Dutch police have disrupted the "Manipulaters," a large phishing-as-a-service operation responsible for stealing millions of dollars. The group sold phishing kits and provided infrastructure like bulletproof hosting, allowing customers to easily deploy and manage phishing campaigns targeting various organizations, including banks and online retailers. Law enforcement seized 14 domains used by the gang and arrested two individuals suspected of operating the service. The investigation involved collaboration with several private sector partners and focused on dismantling the criminal infrastructure enabling widespread phishing attacks.
Hacker News commenters largely praised the collaborative international effort to dismantle the Manipulaters phishing gang. Several pointed out the significance of seizing infrastructure like domain names and bulletproof hosting providers, noting this is more effective than simply arresting individuals. Some discussed the technical aspects of the operation, like the use of TOX for communication and the efficacy of taking down such a large network. A few expressed skepticism about the long-term impact, predicting that the criminals would likely resurface with new infrastructure. There was also interest in the Dutch police's practice of sending SMS messages to potential victims, alerting them to the compromise and urging them to change passwords. Finally, several users criticized the lack of detail in the article about how the gang was ultimately disrupted, expressing a desire to understand the specific techniques employed by law enforcement.
Summary of Comments ( 52 )
https://news.ycombinator.com/item?id=43339212
HN commenters generally enjoyed the author's playful approach to wasting a romance scammer's time. Several pointed out the scammer's poor operational security (OpSec), like using easily traceable gift card services and reusing the same fake persona across multiple victims. Some praised the author's creativity and dedication, while others debated the ethics and effectiveness of such "scambaiting" tactics. A few users shared similar experiences or suggested further ways to frustrate scammers, like engaging them in pointless tasks or feeding them false information. A recurring sentiment was the frustration with the prevalence of these scams and the difficulty in holding perpetrators accountable.
The Hacker News post "My Scammer Girlfriend: Baiting a Romance Fraudster" generated a moderate amount of discussion, with several commenters sharing their thoughts and experiences.
A recurring theme is the prevalence and sophistication of these scams. Several commenters highlighted how convincing these scammers can be, preying on vulnerable individuals seeking connection. One commenter expressed concern about the emotional toll these scams take on victims, emphasizing the manipulative tactics employed by the perpetrators. This comment underscored the seriousness of the issue beyond just financial loss.
Some commenters discussed the ethical implications of the author's actions, questioning whether "baiting" a scammer is justified. One argued that while entertaining, it ultimately doesn't prevent the scammer from targeting others. Another countered this by suggesting that any distraction, even temporary, could potentially save someone from becoming a victim. This back-and-forth highlighted the complex ethical considerations surrounding engaging with scammers.
Several commenters shared anecdotes of similar experiences, either personally or through acquaintances. One detailed a sophisticated scam involving fake video calls and deepfakes, emphasizing the increasing technological sophistication of these operations. Another shared a story about a friend who fell victim to a romance scam, highlighting the devastating financial and emotional consequences. These personal accounts lent further weight to the discussion and provided real-world context to the author's experience.
A few comments focused on the technical aspects of the scam, speculating on the scammer's methods and infrastructure. One user questioned the likelihood of the scammer being an individual versus part of a larger organization. Another commented on the use of cryptocurrency in these scams, highlighting the difficulty in tracing funds and recovering losses.
Finally, some comments simply expressed amusement at the author's narrative and the scammer's increasingly absurd requests. These lighter comments provided a counterpoint to the more serious discussion surrounding the ethical and emotional aspects of romance scams. Overall, the comments section presented a multifaceted view of the issue, combining personal experiences, ethical considerations, and technical insights.