LIVE NEWS
  • United Airlines Pilots Call in a Bomb Threat Over Mysterious Beeping
  • Army’s HADES spy plane on track for first delivery later this year
  • Marvell shares gain on report of deal talks with Google to develop two AI chips
  • Baltic nations brace for impact of Iran war delaying US weapons shipments
  • After 200 years scientists finally crack the “dolomite problem”
  • Japan issues an advisory for northern coastal areas for a slightly increased risk of a mega-quake
  • Spot Bitcoin ETFs Near $1 Billion in Weekly Inflows, Best Stretch Since Mid-January
  • NCSC Outlines Coordinated Plan to Boost NHS Cyber Resilience
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • See More
    • Artificial Intelligence
    • Climate Risks
    • Defense
    • Healthcare Innovation
    • Science
    • Technology
    • World
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • Artificial Intelligence
  • Climate Risks
  • Defense
  • Healthcare Innovation
  • Science
  • Technology
  • World
Home»Cybersecurity»FBI warns of virtual kidnapping scams using altered social media photos
Cybersecurity

FBI warns of virtual kidnapping scams using altered social media photos

primereportsBy primereportsDecember 5, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
FBI warns of virtual kidnapping scams using altered social media photos
Share
Facebook Twitter LinkedIn Pinterest Email


FBI warns of virtual kidnapping scams using altered social media photos

The FBI warns of criminals altering images shared on social media and using them as fake proof of life photos in virtual kidnapping ransom scams.

This is part of a public service announcement published today about criminals contacting victims via text message, claiming to have kidnapped a family member and demanding ransom payments.

However, as the FBI explained, virtual kidnapping scams involve no actual abduction. Instead, criminals use manipulated images found on social networks and publicly available information to create convincing scenarios designed to pressure victims into paying ransoms before verifying that their loved ones are safe.

“Criminal actors typically will contact their victims through text message claiming they have kidnapped their loved one and demand a ransom be paid for their release,” the FBI said on Friday.

“Oftentimes, the criminal actor will express significant claims of violence towards the loved one if the ransom is not paid immediately. The criminal actor will then send what appears to be a genuine photo or video of the victim’s loved one, which upon close inspection often reveals inaccuracies when compared to confirmed photos of the loved one.”

The law enforcement agency advised the public to be cautious of scammers who often create a false sense of urgency and to carefully assess the validity of the kidnappers’ claims.

To defend against such scams, the FBI recommends taking several protective measures, such as avoiding providing personal information to strangers while traveling and establishing a code word known only to the family to verify communications during emergencies.

Additionally, when sharing information about missing persons online, one should remain vigilant, as scammers might reach out with false information.

The FBI also recommends taking screenshots or recording proof-of-life photos whenever possible for later analysis during investigations, since scammers sometimes deliberately send these photos using timed message features to limit the time victims have to analyze the images.

While the FBI didn’t share how many complaints regarding these virtual kidnapping scams have been filed with its Internet Crime Complaint Center or how widespread this type of fraud is at the moment, BleepingComputer has found multiple instances of people targeted by similar scams that spoofed their loved ones’ phone numbers.


tines

Broken IAM isn’t just an IT problem – the impact ripples across your whole business.

This practical guide covers why traditional IAM practices fail to keep up with modern demands, examples of what “good” IAM looks like, and a simple checklist for building a scalable strategy.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleNow just ‘Speak to Pay’ via Google assistant
Next Article Musicians must embrace ‘unstoppable force’ of AI, Eurythmics’ Dave Stewart urges | Dave Stewart
primereports
  • Website

Related Posts

Cybersecurity

NCSC Outlines Coordinated Plan to Boost NHS Cyber Resilience

April 20, 2026
Cybersecurity

I stopped using my iPhone’s hotspot after testing this 5G router – and that won’t change

April 19, 2026
Cybersecurity

Apple account change alerts abused to send phishing emails

April 19, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Global Resources Outlook 2024 | UNEP

December 6, 20258 Views

The D Brief: DHS shutdown likely; US troops leave al-Tanf; CNO’s plea to industry; Crowded robot-boat market; And a bit more.

February 14, 20264 Views

German Chancellor Merz faces difficult mission to Israel – DW – 12/06/2025

December 6, 20254 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Latest Reviews

Subscribe to Updates

Get the latest tech news from FooBar about tech, design and biz.

PrimeReports.org
Independent global news, analysis & insights.

PrimeReports.org brings you in-depth coverage of geopolitics, markets, technology and risk – with context that helps you understand what really matters.

Editorially independent · Opinions are those of the authors and not investment advice.
Facebook X (Twitter) LinkedIn YouTube
Key Sections
  • World
  • Geopolitics
  • Popular Now
  • Artificial Intelligence
  • Cybersecurity
  • Crypto
All Categories
  • Artificial Intelligence
  • Climate Risks
  • Crypto
  • Cybersecurity
  • Defense
  • Economy
  • Geopolitics
  • Global Markets
  • Healthcare Innovation
  • Politics
  • Popular Now
  • Science
  • Technology
  • World
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
  • Disclaimer
  • Cookie Policy
  • DMCA / Copyright Notice
  • Editorial Policy

Sign up for Prime Reports Briefing – essential stories and analysis in your inbox.

By subscribing you agree to our Privacy Policy. You can opt out anytime.
Latest Stories
  • United Airlines Pilots Call in a Bomb Threat Over Mysterious Beeping
  • Army’s HADES spy plane on track for first delivery later this year
  • Marvell shares gain on report of deal talks with Google to develop two AI chips
© 2026 PrimeReports.org. All rights reserved.
Privacy Terms Contact

Type above and press Enter to search. Press Esc to cancel.