This scam involves malicious actors utilizing deepfake technology to impersonate individuals on social media platforms. They may offer various services or engage in fraudulent activities under the guise of someone else, exploiting trust and credibility for malicious purposes.
Be cautious of sudden changes in behavior or communication style from familiar contacts. Watch out for requests for sensitive information or financial transactions that seem out of character. Verify the identity of individuals through alternative means, such as a phone call or video chat, if suspicions arise.
Red Flags:
- Inconsistent or suspicious behavior from known contacts.
- Requests for sensitive information or financial.
- Poor quality or unnatural appearance in profile pictures or videos.
- Unusual activity, such as posting at odd hours or sharing unusual content.
Examples:

