Romance scams (long-term catfishing, sharing of personal info, makes it easy to manipulate victim)
These usually happen online (dating sites, social media, games). The scammer pretends to be romantically interested and spends weeks or months building trust. They often share fake stories, pictures, and emotions to make the victim feel a deep connection. Once the victim is emotionally invested, the scammer asks for money, gifts, or personal details (like bank info) and uses guilt or love as pressure.
Banking/Investment scams (they ask for money and claim they can double it, one way or another)
These scams promise huge returns with little or no risk, often through fake investment platforms, cryptocurrency schemes, or “get rich quick” opportunities. Victims are told to deposit money. Eventually, the scammer either disappears or pressures the victim to “invest more” before they can withdraw anything.
Impersonation scams (pretending to be a loved one, typically requesting financial support due to an emergency)
Here, the scammer contacts the victim claiming to be a friend, relative, or partner in trouble. They might say they’ve been in an accident, arrested abroad, or stuck with unexpected expenses. They usually demand urgent money transfers and rely on panic and concern, so the victim doesn’t stop to verify the situation.
Blackmail scams (claiming to have private data they will leak)
The scammer says they’ve hacked into the victim’s accounts or devices and claim to have compromising photos, videos, or sensitive information. They threaten to share this with family, friends, or employers unless the victim pays (often in cryptocurrency). In most cases, they actually have no real data — they just rely on fear and embarrassment.
Technical support scams (claim that you have a virus and need to download an app or visit a website—which is usually the real virus—to get rid of it)
The scammer poses as a tech support agent from companies like Microsoft, Apple, or your internet provider. They warn you about a fake virus or security breach, then tell you to install software or visit a website. The software is actually malware that lets them steal data, lock your files (ransomware), or demand payment for fake fixes.





