WhatsApp impersonation scams family

WhatsApp impersonation scams family

It’s well-known that scammers like to use instant messaging apps to scam and impersonate, falling many people into their traps. In this post, we’ll explore how WhatsApp impersonation scams happen, and why WhatsApp family scams would be more successful from a scammer’s perspective.

WhatsApp impersonation scams

Many reasons make WhatsApp an interesting app for scammers:

  1. A popular Messaging App!: According to bankmycell.com, “WhatsApp Business has reached 3,031.23 million users in 2024.” This vast number of active users makes it the ideal platform for spreading spam and phishing messages, as scammers aim to reach as many potential victims worldwide as possible.
  2. The easiest way!: Creating a new WhatsApp account is easy and convenient for everyone. You can sign up in moments just using your phone number. Additionally, WhatsApp has added a new feature to log in to multiple accounts in the same app. This will be extremely useful for social media managers and people who have more than one account. However, this feature is also going to be advantageous for scammers.
  3. Anonymity: It requires less information from new users compared to other instant messaging apps. That’s why scams on WhatsApp have increased incredibly.

There are two main methods: fake results on the Google search engine and social engineering.

Social Engineering has become increasingly popular for fraud. For those unfamiliar with the term, Social Engineering is a technique used by malicious individuals to manipulate others into divulging confidential information, performing actions, or making decisions they wouldn’t typically do under normal circumstances.

It involves exploiting human psychology rather than exploiting software vulnerabilities. There are numerous tricks scammers use to deceive victims. For example, consider a scenario where someone you trust sends you a message on WhatsApp from a new number, claiming to be in urgent need of money because they lost their phone.

They might say something like, “Hello, I’m Mohammed. This is my new number, and I urgently need some money. Can you please help me out?” (picture1: WhatsApp-impersonation-scam.png) I believe that while this trick may not fool you, other people could easily fall victim to this type of scam, especially the WhatsApp impersonation family scam. Don’t you believe your sister or one of your parents crying on WhatsApp to send money??!

According to pcgamer.com, scammers are purchasing top spaces in Google search results as advertisements. They create their own fake websites and pay for Google ads to appear at the top of search results! (picture2: scam-on-whatsapp.jpg) This is extremely dangerous because it allows scammers to target many people who are searching for WhatsApp Web to scan the barcode and log in to their accounts. Additionally, it provides attackers with access to steal chats!


Well, scammers typically try to impersonate your family for these reasons: Emotional Manipulation: Malicious actors exploit the emotions of their targets by pretending to be a loved one in distress, thus increasing the likelihood of the victim complying with their demands. Trust: People are more likely to trust someone they believe to be a family member. Scammers leverage this trust to deceive individuals into providing sensitive information or sending money. Familiarity: Impersonating a family member allows scammers to gather personal details about the target more easily. They may reference shared experiences or family members to make their story more convincing.

Scammers become more intelligent! Spotting WhatsApp impersonation scams in 2024 without taking action is increasingly difficult due to the availability of AI tools. It’s incredibly easy to generate very convincing messages free of grammatical errors using ChatGPT in just a few seconds.

And it’s not just limited to text messages. The alarming fact is that scammers can now even impersonate someone’s voice using AI. Imagine receiving a message from what appears to be your dad’s new number, and when you call to confirm, you hear his voice. But in reality, it’s a fake voice! You see how is this dangerous!?


Defending yourself is necessary, not only against WhatsApp impersonation family scams but also against every type of WhatsApp scam. Awareness is crucial. Implement the following strategies to protect yourself from scammers:

Trusting unknown numbers in WhatsApp is not a good idea, Be aware of unusual messages from suspicious phone numbers. Don’t believe everything on WhatsApp because it’s full of scammers and fraud. Only confirm payments by calling the number or meeting the person whom you are contracting with if it’s possible.

Some ads are triggering victims to scammers traps be extremely sure while using WhatsApp web, Make sure to choose the correct domain (web.whatsapp.com).

Staying updated on the latest scams in WhatsApp is crucial to protect yourself from fraud. In case you get scammed, then you should promptly report the scam on WhatsApp or local police to take the necessary actions this will help you a lot to mitigate further risks. And remember that awareness is key in defending against any cybersecurity attacks.

It-Pillars - Request A Demo

If you would like the Technical Support team to make a web-based demonstration of the product features, please fill the form below. Your technical questions will also be answered.

Frequently Asked Questions

When ordering or registering on our site, as appropriate, you may be asked to enter your name, email address, phone number, Company Name or other details to help you with your experience.

We collect information from you when you place an order, subscribe to a newsletter or enter information on our site.
 

We may use the information we collect from you when you register, make a purchase, sign up for our newsletter, respond to a survey or marketing communication, surf the website, or use certain other site features in the following ways:

  • To personalize your experience and to allow us to deliver the type of content and product offerings in which you are most interested.
  • To improve our website in order to better serve you.
  • To administer a contest, promotion, survey or other site feature.
  • To send periodic emails regarding your order or other products and services.
  • To follow up with them after correspondence (live chat, email or phone inquiries)
  • Our website is scanned on a regular basis for security holes and known vulnerabilities in order to make your visit to our site as safe as possible.
  • We use regular Malware Scanning.
  • Your personal information is contained behind secured networks and is only accessible by a limited number of persons who have special access rights to such systems, and are required to keep the information confidential. In addition, all sensitive/credit information you supply is encrypted via Secure Socket Layer (SSL) technology.
  • We implement a variety of security measures when a user enters, submits, or accesses their information to maintain the safety of your personal information.
  • All transactions are processed through a gateway provider and are not stored or processed on our servers.
  • If there are any questions regarding this privacy policy, you may contact us using the information below.

    • www.it-pillars.com
    • #303, Salma Center, Medina Rd., Jeddah 23216, Saudi Arabia
    • info@it-pillars.com

We do not sell, trade, or otherwise transfer to outside parties your Personally Identifiable Information.

 

We do not include or offer third-party products or services on our website.

 

Google’s advertising requirements can be summed up by Google’s Advertising Principles. They are put in place to provide a positive experience for users.

Google, as a third-party vendor, uses cookies to serve ads on our site. Google’s use of the DART cookie enables it to serve ads to our users based on previous visits to our site and other sites on the Internet. Users may opt-out of the use of the DART cookie by visiting the Google Ad and Content Network privacy policy.

We have implemented the following:

  • Google Display Network Impression Reporting
  • Demographics and Interests Reporting

We, along with third-party vendors such as Google use first-party cookies (such as the Google Analytics cookies) and third-party cookies (such as the DoubleClick cookie) or other third-party identifiers together to compile data regarding user interactions with ad impressions and other ad service functions as they relate to our website.

Opting out:

Users can set preferences for how Google advertises to you using the Google Ad Settings page. Alternatively, you can opt out by visiting the Network Advertising Initiative Opt-Out page or by using the Google Analytics Opt-Out Browser Add-on.

How does our site handle Do Not Track signals?

We honor Do Not Track signals and Do Not Track, plant cookies, or use advertising when a Do Not Track (DNT) browser mechanism is in place.

Does our site allow third-party behavioral tracking?

It’s also important to note that we do not allow third-party behavioral tracking

COPPA (Children Online Privacy Protection Act)

  • When it comes to the collection of personal information from children under the age of 13 years old, the Children’s Online Privacy Protection Act (COPPA) puts parents in control. The Federal Trade Commission, United States’ consumer protection agency, enforces the COPPA Rule, which spells out what operators of websites and online services must do to protect children’s privacy and safety online.
  • We do not specifically market to children under the age of 13 years old.
  • Do we let third-parties, including ad networks or plug-ins, collect PII from children under 13

The Fair Information Practices Principles form the backbone of privacy law in the United States and the concepts they include have played a significant role in the development of data protection laws around the globe. Understanding the Fair Information Practice Principles and how they should be implemented is critical to comply with the various privacy laws that protect personal information.

In order to be in line with Fair Information Practices we will take the following responsive action, should a data breach occur:

We will notify you via email

  • Within 7 business days

We will notify the users via in-site notification

  • Within 7 business days

We also agree to the Individual Redress Principle which requires that individuals have the right to legally pursue enforceable rights against data collectors and processors who fail to adhere to the law.

This principle requires not only that individuals have enforceable rights against data users, but also that individuals have recourse to courts or government agencies to investigate and/or prosecute non-compliance by data processors.

The CAN-SPAM Act is a law that sets the rules for commercial email, establishes requirements for commercial messages, gives recipients the right to have emails stopped from being sent to them, and spells out tough penalties for violations.

We collect your email address in order to:

  • Send information, respond to inquiries, and/or other requests or questions
  • Process orders and to send information and updates pertaining to orders.
  • Send you additional information related to your product and/or service
  • Market to our mailing list or continue to send emails to our clients after the original transaction has occurred.

To be in accordance with CAN-SPAM, we agree to the following:

  • Not use false or misleading subjects or email addresses.
  • Identify the message as an advertisement in some reasonable way.
  • Include the physical address of our business or site headquarters.
  • Monitor third-party email marketing services for compliance, if one is used.
  • Honor opt-out/unsubscribe requests quickly.
  • Allow users to unsubscribe by using the link at the bottom of each email.

If at any time you would like to unsubscribe from receiving future emails, you can email us at

  • Follow the instructions at the bottom of each email and we will promptly remove you from ALL correspondence.