{"id":8271,"date":"2024-12-18T19:42:51","date_gmt":"2024-12-18T19:42:51","guid":{"rendered":"https:\/\/www.digitalforensics.com\/blog\/?p=8271"},"modified":"2025-04-23T19:09:49","modified_gmt":"2025-04-23T19:09:49","slug":"catfish","status":"publish","type":"post","link":"https:\/\/www.digitalforensics.com\/blog\/extortion\/catfish\/","title":{"rendered":"Signs of Catfishing Online: How to Tell and Avoid Catfish Scams"},"content":{"rendered":"\n<p>Catfishing has become the go-to tactic for cybercriminals, luring victims into their web of deception with alarming effectiveness. Almost every application that allows you to interact with others online lets you change aspects of your identity through beauty filters, face swaps, and voice manipulation. &nbsp;<\/p>\n\n\n\n<p>This technology has created a whole new world where it is harder to detect which profiles are real and fake, making it that much easier for scammers to swindle their victims. Why do they do it? By crafting the fa\u00e7ade of the ideal partner, they use these <a href=\"https:\/\/www.digitalforensics.com\/blog\/extortion\/online-dating-scams\/\">online dating scams<\/a> to lure victims into factitious relationships that can enable <a href=\"\/blog\/extortion\/cyber-extortion\/\">cyber extortion <\/a>and other cybercrimes.&nbsp;<\/p>\n\n\n\n<p>Many people may not fully understand the extent of these fallacious tactics and could already be interacting with multiple fake profiles, but what is the real danger? Keep reading to learn more about catfishing scams.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-is-catfishing-meaning-and-origin\"><span class=\"ez-toc-section\" id=\"What_is_Catfishing_Meaning_and_Origin\"><\/span>What is Catfishing? Meaning and Origin<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>The term catfish was originally coined in a 2010 documentary film appropriately titled \u2018Catfish\u2019<sup>(1)<\/sup>, which followed a young man named Nev Schulman and his fraudulent relationship with a woman he met on <a href=\"https:\/\/www.digitalforensics.com\/blog\/extortion\/facebook-dating-scam\/\">Facebook<\/a>. Building on the film\u2019s popularity, MTV launched a series in 2012<sup>(2)<\/sup> that exposed online scammers on a weekly basis.&nbsp;&nbsp;<\/p>\n\n\n\n<p>But why the Catfish? The name originates from a quote by Schulman explaining that catfish were historically used to keep cod active during transport on commercial fishing vessels. While the connection seems non-sensical, the term carries intriguing metaphorical parallels.<\/p>\n\n\n\n<p>A stronger link might come from the practice of hand-fishing, or \u201cnoodling,\u201d where fishermen attract catfish by leading them to believe their fingers are worms and making a fist to hook the fish once they bite. Regardless of the logic behind the naming, \u201ccatfishing\u201d has become firmly embedded in public consciousness as the term for cases of online deception and fraud.&nbsp;<\/p>\n\n\n\n<p>So catfishing scams are when someone uses a fake online identity to trick you into a relationship so they can deceive you emotionally or financially.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"8 Ways to Spot a Catfish Scam | Part 1\" width=\"1200\" height=\"675\" src=\"https:\/\/www.youtube.com\/embed\/fKsstLPQib0?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-why-are-catfishing-scams-so-effective\"><span class=\"ez-toc-section\" id=\"Why_Are_Catfishing_Scams_So_Effective\"><\/span>Why Are Catfishing Scams So Effective?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>These schemes exploit individuals who are looking for a connection online. The perpetrators of catfishing scams manipulate the emotions of their targets by conducting extensive research into their victim\u2019s online presence and crafting the identity of their perfect match. To learn how you can avoid giving these scammers information they can use against you, check out our article on oversharing online.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-the-connection-between-catfishing-and-sextortion\"><span class=\"ez-toc-section\" id=\"The_Connection_Between_Catfishing_and_Sextortion\"><\/span>The Connection Between Catfishing and Sextortion<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Hiding behind a false identity, the catfishing scammers can entice their victims into sharing explicit photos of themselves through <a href=\"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/different-types-of-sextortion\/\">sextortion schemes<\/a>. This can be done by simply requesting them or utilizing the intimate content they\u2019ve received from another victim. Once they\u2019ve convinced the victim to send this content, they then begin to <a href=\"https:\/\/www.digitalforensics.com\/blog\/online-blackmail\/what-to-do-if-someone-is-blackmailing-you-with-photos\/\">blackmail them with threats to leak photos<\/a>.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-is-catfishing-online-illegal\"><span class=\"ez-toc-section\" id=\"Is_Catfishing_Online_Illegal\"><\/span>Is Catfishing Online Illegal?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Yes, catfishing scams are considered illegal depending on the circumstances and motivation. In most countries, the use of someone else\u2019s information is enough to be considered fraud. But the cases in which these perpetrators are most commonly prosecuted are some form of <a href=\"https:\/\/www.digitalforensics.com\/blog\/online-blackmail\/what-to-do-if-you-are-being-extorted-online\/\">extortion<\/a>. Of these crimes,\u202fsextortion,\u202f <a href=\"https:\/\/www.digitalforensics.com\/blog\/online-blackmail\/avoid-online-blackmail\/\">online blackmail<\/a>, and extortion via\u202f<a href=\"https:\/\/www.digitalforensics.com\/blog\/extortion\/romance-scams\/\">romance scams<\/a>\u202fare the most popular.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-8-signs-someone-is-catfishing-you-online\"><span class=\"ez-toc-section\" id=\"8_Signs_Someone_is_Catfishing_You_Online\"><\/span>8 Signs Someone is Catfishing You Online<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>There are many different approaches to committing a catfishing scam, but there are some common signs to look for that may help you see through their false identity.&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Refusal to Show Themself<\/strong> \u2013 If the person you are speaking with refuses to join video or voice calls, has a limited number of photos of themself, and constantly makes excuses to avoid meeting in person, they may be hiding for a reason.&nbsp;<\/li>\n\n\n\n<li><strong>Their Profile is New<\/strong> \u2013 If they have recently created their profile and have a limited following, it may be a sign that they are not who they say they are.&nbsp;<\/li>\n\n\n\n<li><strong>Love Bombing <\/strong>\u2013 This is a common <a href=\"https:\/\/www.digitalforensics.com\/blog\/extortion\/romance-scam-phrases\/\">tactic and behavior in all romance scams<\/a>. The perpetrator may flood you with compliments and declare their love for you early into the conversation to emotionally manipulate you.&nbsp;<\/li>\n\n\n\n<li><strong>Things Don\u2019t Add Up <\/strong>\u2013 If they can\u2019t keep the details of their story consistent or the information they are sharing seems too good to be true, you should trust your gut.&nbsp;<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"658\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/Signs-of-a-A-Catfish-Infographic-1024x658.png\" alt=\"Infographic titled &quot;8 Signs You\u2019re Messaging a Catfish&quot; with a yellow warning sign showing a fish and the text &quot;Catfish Sighted No Texting.&quot; \" class=\"wp-image-8621\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/Signs-of-a-A-Catfish-Infographic-1024x658.png 1024w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/Signs-of-a-A-Catfish-Infographic-300x193.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/Signs-of-a-A-Catfish-Infographic-768x494.png 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/Signs-of-a-A-Catfish-Infographic-512x329.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/Signs-of-a-A-Catfish-Infographic-920x591.png 920w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/Signs-of-a-A-Catfish-Infographic.png 1400w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Watch out for these 8 signs you might be messaging a catfish. Stay safe online by recognizing red flags like avoiding video calls, inconsistent stories, and sudden requests for money.<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-many-people-are-catfished-each-year\"><span class=\"ez-toc-section\" id=\"How_Many_People_Are_Catfished_Each_Year\"><\/span>How Many People Are Catfished Each Year?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Despite growing awareness around the topic, more people fall victim to catfishing scams than you\u2019d expect. The FTC reported that losses to romance scams eclipsed $1.14 billion in 2023, the highest of any imposter scam<sup>(<\/sup><sup>3)<\/sup>.&nbsp;&nbsp;<\/p>\n\n\n\n<p>When surveyed, 13% of US adults said they had definitely come in contact with a scammer and an additional 17% said it was a likely occurrence. Combine this with the 40% of adults who knew someone that <a href=\"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/ive-been-catfished-what-do-i-do\/\">was likely catfished<\/a>, and you realize just how prevalent the issue is<sup>(4)<\/sup>.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-most-popular-apps-used-for-catfishing-scams\"><span class=\"ez-toc-section\" id=\"Most_Popular_Apps_Used_for_Catfishing_Scams\"><\/span>Most Popular Apps Used for Catfishing Scams<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong><a href=\"https:\/\/www.digitalforensics.com\/blog\/extortion\/catfish-on-dating-apps-10-essential-red-flags\/\">Catfishing on Dating Apps<\/a> \u2013 <\/strong>The nature of these apps causes them to be a prime location for catfishing scammers. Over half of dating app users say they have crossed paths with someone trying to scam them<sup>(5)<\/sup>.&nbsp;<\/li>\n\n\n\n<li><strong><a href=\"https:\/\/www.digitalforensics.com\/blog\/online-blackmail\/social-media-blackmail-scams\/\">Social Media Scams<\/a> \u2013 <\/strong>As another advantageous avenue to scam somebody, roughly 23% of social media have fallen victim to these catfishing scams<sup>(6)<\/sup>.&nbsp;<\/li>\n\n\n\n<li><strong><a href=\"https:\/\/www.digitalforensics.com\/blog\/extortion\/onlyfans-scams-spot-report\/\">OnlyFans<\/a> <\/strong>\u2013 The content published on this site enables cybercriminals to steal and scam both content creators and sextortion victims.\u00a0<\/li>\n<\/ol>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"8 Ways to Spot a Catfish Scam | Part 2\" width=\"1200\" height=\"675\" src=\"https:\/\/www.youtube.com\/embed\/s_phhJXUfMw?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-to-tell-if-someone-is-catfishing-you-steps-to-avoid-scams\"><span class=\"ez-toc-section\" id=\"How_to_Tell_if_Someone_is_Catfishing_You_Steps_To_Avoid_Scams\"><\/span>How to Tell if Someone is Catfishing You: Steps To Avoid Scams<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>If you want to protect yourself from catfishing attempts, it\u2019s important to learn <a href=\"https:\/\/www.digitalforensics.com\/blog\/extortion\/spotting-a-fake-profile-pic\/\">how to spot a fake profile early<\/a>. If you feel like you have been targeted in a catfishing scam, act quickly.&nbsp;<\/p>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li>Use Google\u2019s <a href=\"https:\/\/www.digitalforensics.com\/blog\/extortion\/spotting-a-fake-profile-pic\/#Follow_these_steps_to_do_a_reverse_image_search_on_Google\">reverse image search<\/a> feature to see if the profile pictures are stolen. A reverse image search will let you know if the scammer has stolen photos or used stock imagery to craft their persona.&nbsp;<\/li>\n\n\n\n<li>Avoid sending money or personal information to someone you haven\u2019t met in person. Even if you are being extorted online, delaying payment can help you stall while you get help.&nbsp;<\/li>\n\n\n\n<li>Don\u2019t block them immediately. If you\u2019ve disclosed personal information or sent explicit content, there are benefits to keeping the connection with your scammer. Investigators can exploit this connection when using different techniques for geo-location.&nbsp;<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-resources-and-help-for-victims-of-catfishing-and-online-scams\"><span class=\"ez-toc-section\" id=\"Resources_and_Help_for_Victims_of_Catfishing_and_Online_Scams\"><\/span>Resources and Help for Victims of Catfishing and Online Scams<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Being the victim of a catfishing scam can be emotionally and financially devastating. However, there are resources available to help you.&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Report to Authorities <\/strong>\u2013 Whether you sent money to a catfishing scammer or are receiving threats of online extortion, seek the help of <a href=\"\/blog\/online-blackmail\/what-can-the-police-do-about-blackmail\/\">law enforcement<\/a>.&nbsp;<\/li>\n\n\n\n<li><strong>Report to System Administrators<\/strong> \u2013 Every social media and dating app has resources for users to report issues on the platform. This may not prevent a blackmailer from posting your content, but it can help have their account removed.&nbsp;<\/li>\n\n\n\n<li><strong><a href=\"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/report-sextortion-online\/\">Report Sextortion<\/a> to Digital Forensics Corp<\/strong> \u2013 At Digital Forensics Corp, we assist victims of these scams by identifying the location, identity, and technology used by the blackmailers. Using advanced technologies and digital forensics tools, such as IP tracking and device fingerprinting, we can help <a href=\"https:\/\/www.digitalforensics.com\/blog\/extortion\/catch-a-cybercriminal\/\">track down your perpetrator<\/a>. For more information or to speak with one of our engineers, contact our <a href=\"\/blog\/online-blackmail\/top-resources-for-victims-of-online-blackmail\/\">Blackmail Helpline<\/a>.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p><strong>SOURCES<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Catfish_(film)\" target=\"_blank\">Catfish (film) &#8211; Wikipedia<\/a>&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Catfish:_The_TV_Show\" target=\"_blank\">Catfish: The TV Show &#8211; Wikipedia<\/a>&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/www.ftc.gov\/business-guidance\/blog\/2024\/02\/love-stinks-when-scammer-involved\" target=\"_blank\" rel=\"noreferrer noopener\">\u201cLove Stinks\u201d \u2013 when a scammer is involved | Federal Trade Commission<\/a>&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/www.statista.com\/statistics\/1291656\/us-adults-catfishing-interaction\/\" target=\"_blank\" rel=\"noreferrer noopener\">U.S. adults catfishing interaction 2022 | Statista<\/a>&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/www.pewresearch.org\/short-reads\/2023\/02\/02\/key-findings-about-online-dating-in-the-u-s\/\" target=\"_blank\" rel=\"noreferrer noopener\">Key findings about online dating in the U.S. | Pew Research Center<\/a>&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/nikolaroza.com\/social-media-catfishing-statistics-facts-trends-guide\/\" target=\"_blank\" rel=\"noreferrer noopener\">Social Media Catfishing: Statistics, Facts and Trends Guide for 2025<\/a>&nbsp;<\/li>\n<\/ol>\n\n\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"Catfishing has become the go-to tactic for cybercriminals, luring victims into their web of deception with alarming effectiveness.&hellip;","protected":false},"author":131,"featured_media":10192,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"csco_display_header_overlay":false,"csco_singular_sidebar":"","csco_page_header_type":"","footnotes":""},"categories":[773],"tags":[],"class_list":{"0":"post-8271","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-extortion","8":"cs-entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Signs of Catfishing: How to Spot and Avoid Catfishing Scams<\/title>\n<meta name=\"description\" content=\"Learn the signs of catfishing online and how to tell if someone is catfishing you. Protect yourself from online catfishing scams.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.digitalforensics.com\/blog\/extortion\/catfish\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Signs of Catfishing Online: How to Tell and Avoid Catfish Scams\" \/>\n<meta property=\"og:description\" content=\"Learn the signs of catfishing online and how to tell if someone is catfishing you. Protect yourself from online catfishing scams.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.digitalforensics.com\/blog\/extortion\/catfish\/\" \/>\n<meta property=\"og:site_name\" content=\"Resources for Sextortion and Online Blackmail Victims\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DigitalForensicsCorp\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-18T19:42:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-23T19:09:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/20250227_-_1080x1080_-_Catfishing_Scam-v1.0.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jack Gillespie\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:site\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jack Gillespie\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/catfish\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/catfish\\\/\"},\"author\":{\"name\":\"Jack Gillespie\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/4eb49f01ff515fad38e835a9b9497fba\"},\"headline\":\"Signs of Catfishing Online: How to Tell and Avoid Catfish Scams\",\"datePublished\":\"2024-12-18T19:42:51+00:00\",\"dateModified\":\"2025-04-23T19:09:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/catfish\\\/\"},\"wordCount\":1311,\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/catfish\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/20250227_-_1080x1080_-_Catfishing_Scam-v1.0.png\",\"articleSection\":[\"Resources and Articles for Victims of Extortion Scams\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/catfish\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/catfish\\\/\",\"name\":\"Signs of Catfishing: How to Spot and Avoid Catfishing Scams\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/catfish\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/catfish\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/20250227_-_1080x1080_-_Catfishing_Scam-v1.0.png\",\"datePublished\":\"2024-12-18T19:42:51+00:00\",\"dateModified\":\"2025-04-23T19:09:49+00:00\",\"description\":\"Learn the signs of catfishing online and how to tell if someone is catfishing you. Protect yourself from online catfishing scams.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/catfish\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/catfish\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/catfish\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/20250227_-_1080x1080_-_Catfishing_Scam-v1.0.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/20250227_-_1080x1080_-_Catfishing_Scam-v1.0.png\",\"width\":1080,\"height\":1080,\"caption\":\"Learn all about catfishing and how these fake identities are used for internet scams\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/catfish\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Resources and Articles for Victims of Extortion Scams\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Signs of Catfishing Online: How to Tell and Avoid Catfish Scams\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"name\":\"Resources for Sextortion and Online Blackmail Victims\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\",\"name\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"width\":393,\"height\":343,\"caption\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DigitalForensicsCorp\\\/\",\"https:\\\/\\\/x.com\\\/ForensicsCorp\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/4eb49f01ff515fad38e835a9b9497fba\",\"name\":\"Jack Gillespie\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/jack-gillespie_avatar-96x96.png\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/jack-gillespie_avatar-96x96.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/jack-gillespie_avatar-96x96.png\",\"caption\":\"Jack Gillespie\"},\"description\":\"Cybercrime Writer & Awareness Advocate \\\"You don\u2019t need to be a tech expert to protect yourself online \u2014 but you do need the right information.\\\" \u2014 Jack Gillespie \u00a0 Jack Gillespie is a cybersecurity content writer who specializes in explaining the human, emotional, and technical elements behind modern online threats. With a background in journalism and a passion for digital safety, Jack creates high-impact, approachable content that helps readers of all experience levels understand, recognize, and respond to cybercrime. \u00a0 Areas of Expertise Jack\u2019s work aims for the sweet spot at the intersection of technology and psychology, helping readers stay informed and protected through education that\u2019s delivered in a digestible manner: \u2022 Social engineering scams \u2013 how manipulation tactics fuel phishing, sextortion, and online fraud. \u2022 Data breach scenarios \u2013 why they happen, how they spread, and how readers can proactively minimize exposure. \u2022 Malware and ransomware \u2013 plain-language breakdowns of how malicious software works and what to do if affected. \u00a0 Role at Digital Forensics Corp. At Digital Forensics Corp., Jack blends editorial clarity with technical accuracy to produce content that educates, supports, and engages. He contributes to both writing and editing efforts, working closely with cybersecurity experts and legal professionals to ensure each piece meets high standards of credibility and readability. His priority is helping people recognize threats before they arise \u2014 and empowering those already affected to take the next steps with confidence through expert advice. \u00a0 Key Publications & Projects \u2022 \\\"Sextortion Awareness for Children\\\" Booklet \u2013 A youth-focused educational guide distributed through local schools to help minors identify, avoid, and report this rapidly expanding cybercrime. \u2022 Sextortion Explained \u2013 A detailed resource for sextortion victims that explains common tactics, recovery strategies, legal protections, and examples of real-life cases. \u2022 \u201cOperation Artemis\u201d Coverage \u2013 \u201cFive Ws\u201d breaking news style coverage of a major FBI investigation that led to the extradition of 22 Nigerian nationals involved in an international sextortion ring. \u00a0 Professional Perspective Jack is committed to making cybersecurity education accessible to all, regardless of background or technical skill. Whether writing for victims, parents, small business owners, or curious readers, he combines journalistic integrity with a human-centered approach to ensure each message resonates with a broad audience. \u00a0 Education & Credentials \u2022 B.A. in Journalism and Promotional Communications Cleveland State University \u2022 SEO Principles Certification Semrush Academy \u00a0 Additional Background Jack began his career as a freelance sports journalist, where he sharpened his storytelling skills and editorial discipline: \u2022 Contributor at Ohio Varsity \u2022 Reporter for Geauga County Maple Leaf\u00a0 This experience has strengthened his ability to adapt his voice across formats and audiences \u2014 from breaking news to educational deep-dives.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/jack-gillespie-21aa85222\\\/\"],\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/author\\\/jack-gillespie\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Signs of Catfishing: How to Spot and Avoid Catfishing Scams","description":"Learn the signs of catfishing online and how to tell if someone is catfishing you. Protect yourself from online catfishing scams.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.digitalforensics.com\/blog\/extortion\/catfish\/","og_locale":"en_US","og_type":"article","og_title":"Signs of Catfishing Online: How to Tell and Avoid Catfish Scams","og_description":"Learn the signs of catfishing online and how to tell if someone is catfishing you. Protect yourself from online catfishing scams.","og_url":"https:\/\/www.digitalforensics.com\/blog\/extortion\/catfish\/","og_site_name":"Resources for Sextortion and Online Blackmail Victims","article_publisher":"https:\/\/www.facebook.com\/DigitalForensicsCorp\/","article_published_time":"2024-12-18T19:42:51+00:00","article_modified_time":"2025-04-23T19:09:49+00:00","og_image":[{"width":1080,"height":1080,"url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/20250227_-_1080x1080_-_Catfishing_Scam-v1.0.png","type":"image\/png"}],"author":"Jack Gillespie","twitter_card":"summary_large_image","twitter_creator":"@ForensicsCorp","twitter_site":"@ForensicsCorp","twitter_misc":{"Written by":"Jack Gillespie","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.digitalforensics.com\/blog\/extortion\/catfish\/#article","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/extortion\/catfish\/"},"author":{"name":"Jack Gillespie","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/4eb49f01ff515fad38e835a9b9497fba"},"headline":"Signs of Catfishing Online: How to Tell and Avoid Catfish Scams","datePublished":"2024-12-18T19:42:51+00:00","dateModified":"2025-04-23T19:09:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/extortion\/catfish\/"},"wordCount":1311,"publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/extortion\/catfish\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/20250227_-_1080x1080_-_Catfishing_Scam-v1.0.png","articleSection":["Resources and Articles for Victims of Extortion Scams"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.digitalforensics.com\/blog\/extortion\/catfish\/","url":"https:\/\/www.digitalforensics.com\/blog\/extortion\/catfish\/","name":"Signs of Catfishing: How to Spot and Avoid Catfishing Scams","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/extortion\/catfish\/#primaryimage"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/extortion\/catfish\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/20250227_-_1080x1080_-_Catfishing_Scam-v1.0.png","datePublished":"2024-12-18T19:42:51+00:00","dateModified":"2025-04-23T19:09:49+00:00","description":"Learn the signs of catfishing online and how to tell if someone is catfishing you. Protect yourself from online catfishing scams.","breadcrumb":{"@id":"https:\/\/www.digitalforensics.com\/blog\/extortion\/catfish\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.digitalforensics.com\/blog\/extortion\/catfish\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/extortion\/catfish\/#primaryimage","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/20250227_-_1080x1080_-_Catfishing_Scam-v1.0.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/20250227_-_1080x1080_-_Catfishing_Scam-v1.0.png","width":1080,"height":1080,"caption":"Learn all about catfishing and how these fake identities are used for internet scams"},{"@type":"BreadcrumbList","@id":"https:\/\/www.digitalforensics.com\/blog\/extortion\/catfish\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.digitalforensics.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Resources and Articles for Victims of Extortion Scams","item":"https:\/\/www.digitalforensics.com\/blog\/extortion\/"},{"@type":"ListItem","position":3,"name":"Signs of Catfishing Online: How to Tell and Avoid Catfish Scams"}]},{"@type":"WebSite","@id":"https:\/\/www.digitalforensics.com\/blog\/#website","url":"https:\/\/www.digitalforensics.com\/blog\/","name":"Resources for Sextortion and Online Blackmail Victims","description":"","publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.digitalforensics.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.digitalforensics.com\/blog\/#organization","name":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims","url":"https:\/\/www.digitalforensics.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","width":393,"height":343,"caption":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DigitalForensicsCorp\/","https:\/\/x.com\/ForensicsCorp"]},{"@type":"Person","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/4eb49f01ff515fad38e835a9b9497fba","name":"Jack Gillespie","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/jack-gillespie_avatar-96x96.png","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/jack-gillespie_avatar-96x96.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/jack-gillespie_avatar-96x96.png","caption":"Jack Gillespie"},"description":"Cybercrime Writer & Awareness Advocate \"You don\u2019t need to be a tech expert to protect yourself online \u2014 but you do need the right information.\" \u2014 Jack Gillespie \u00a0 Jack Gillespie is a cybersecurity content writer who specializes in explaining the human, emotional, and technical elements behind modern online threats. With a background in journalism and a passion for digital safety, Jack creates high-impact, approachable content that helps readers of all experience levels understand, recognize, and respond to cybercrime. \u00a0 Areas of Expertise Jack\u2019s work aims for the sweet spot at the intersection of technology and psychology, helping readers stay informed and protected through education that\u2019s delivered in a digestible manner: \u2022 Social engineering scams \u2013 how manipulation tactics fuel phishing, sextortion, and online fraud. \u2022 Data breach scenarios \u2013 why they happen, how they spread, and how readers can proactively minimize exposure. \u2022 Malware and ransomware \u2013 plain-language breakdowns of how malicious software works and what to do if affected. \u00a0 Role at Digital Forensics Corp. At Digital Forensics Corp., Jack blends editorial clarity with technical accuracy to produce content that educates, supports, and engages. He contributes to both writing and editing efforts, working closely with cybersecurity experts and legal professionals to ensure each piece meets high standards of credibility and readability. His priority is helping people recognize threats before they arise \u2014 and empowering those already affected to take the next steps with confidence through expert advice. \u00a0 Key Publications & Projects \u2022 \"Sextortion Awareness for Children\" Booklet \u2013 A youth-focused educational guide distributed through local schools to help minors identify, avoid, and report this rapidly expanding cybercrime. \u2022 Sextortion Explained \u2013 A detailed resource for sextortion victims that explains common tactics, recovery strategies, legal protections, and examples of real-life cases. \u2022 \u201cOperation Artemis\u201d Coverage \u2013 \u201cFive Ws\u201d breaking news style coverage of a major FBI investigation that led to the extradition of 22 Nigerian nationals involved in an international sextortion ring. \u00a0 Professional Perspective Jack is committed to making cybersecurity education accessible to all, regardless of background or technical skill. Whether writing for victims, parents, small business owners, or curious readers, he combines journalistic integrity with a human-centered approach to ensure each message resonates with a broad audience. \u00a0 Education & Credentials \u2022 B.A. in Journalism and Promotional Communications Cleveland State University \u2022 SEO Principles Certification Semrush Academy \u00a0 Additional Background Jack began his career as a freelance sports journalist, where he sharpened his storytelling skills and editorial discipline: \u2022 Contributor at Ohio Varsity \u2022 Reporter for Geauga County Maple Leaf\u00a0 This experience has strengthened his ability to adapt his voice across formats and audiences \u2014 from breaking news to educational deep-dives.","sameAs":["https:\/\/www.linkedin.com\/in\/jack-gillespie-21aa85222\/"],"url":"https:\/\/www.digitalforensics.com\/blog\/author\/jack-gillespie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/8271","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/users\/131"}],"replies":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/comments?post=8271"}],"version-history":[{"count":25,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/8271\/revisions"}],"predecessor-version":[{"id":13500,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/8271\/revisions\/13500"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media\/10192"}],"wp:attachment":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media?parent=8271"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/categories?post=8271"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/tags?post=8271"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}