Flirting with Fraud: Why Sextortion Is the Most Devastating Dating Scam
Sextortion has emerged as one of the most dangerous forms of romance scams, preying on online daters and, tragically, claiming the lives of teenagers. Fraudsters use fake profiles to lure victims into sharing intimate content, only to threaten exposure unless a ransom is paid. Regula, a global developer of identity verification (IDV) solutions, shares a vision of how social media and dating platforms can strengthen protections to safeguard users.
This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20250213790016/en/

Can you spot a romance scam? Scammers are getting smarter, using fake identities, AI, and emotional manipulation to exploit trust. See how these scams work and what can be done to stop them. (Graphic: Regula)
Romance scams come in many forms, exploiting trust and emotional vulnerability to defraud victims. Their common tactics include:
- Catfishing: Scammers create fake identities to build trust and manipulate victims.
- Military Scams: Fraudsters pose as deployed soldiers seeking financial assistance.
- Inheritance Scams: Victims are deceived with false claims of large inheritances requiring upfront fees.
- Pig-Butchering (Crypto Investment) Scams: Scammers feign romantic interest to lure victims into fraudulent investment schemes.
However, according to reports from leading child safety organizations, including the National Center for Missing and Exploited Children (NCMEC) and Thorn, sextortion is one of the most severe threats, with cases surging at an alarming rate. The FBI reported over 12,000 complaints in 2023 alone, resulting in millions in financial losses, severe psychological trauma, and, in some cases, even fatalities. Younger users and those new to online dating are particularly vulnerable.
Common sextortion tactics include:
- Fake Identities: Scammers pose as attractive singles, influencers, or even celebrities to build quick trust.
- Rapid Escalation: Conversations quickly shift from introductions to intimate exchanges.
- Blackmail Threats: Once explicit content is shared, scammers demand money, cryptocurrency, or further compromising images under the threat of exposure.
- AI-Driven Deception: Some scams leverage deepfake videos or AI-powered chatbots to manipulate victims.
The Role of Identity Verification in Preventing Sextortion
Sextortion thrives in environments where fake profiles and anonymity enable bad actors to operate freely. Social media and dating platforms play a critical role in combating this threat—through proactive moderation, AI-powered content monitoring, and user education. Stronger identity verification during registration is also a valuable tool in this arsenal, but it must be implemented thoughtfully, balancing fraud prevention with user privacy and accessibility.
Different online platforms use varying levels of verification, ranging from strongest to weakest:
- ID & Biometric Verification – Matching government-issued IDs with real-time selfies for authentication.
- Real-Time Selfies Without ID Validation – Confirming a live presence but without a verified identity document.
- Basic Checks – Verification through phone numbers, email, or linked social media accounts.
- Self-Reported Identity Without Validation – The least secure method, relying solely on user-provided information.
How Biometric and ID Verification Strengthens Security:
- Eliminating Fake Profiles: Biometric checks make it significantly harder for scammers to create fake accounts.
- Anti-Spoofing Technology: Prevents impersonation by detecting fraudulent attempts using photos or masks.
- Liveness Detection: Confirms a real person is present, preventing AI-generated deception.
“When faced with strong verification measures, scammers don’t simply disappear—they move to less secure platforms where they can continue their schemes unchecked. Standardizing biometric ID verification across multiple platforms would make it significantly harder for them to do so, creating a safer ecosystem across social media, dating apps, and other online services." – Jan Stepnov, Identity Verification Expert at Regula.
Empowering Users to Stay Safe
While platforms must take stronger security measures, users can also protect themselves by:
- Being Cautious of Fast-Moving Relationships: Avoid engaging in intimate exchanges early in conversations.
- Interacting with Verified Users: Prioritize connections with verified profiles.
- Reporting Suspicious Activity: Flagging blackmail attempts and scam behavior.
- Never Paying Ransoms: Complying with extortion often leads to further threats.
For more insights on how identity verification is transforming online dating security, visit Regula’s blog.
About Regula
Regula is a global developer of forensic devices and identity verification solutions. With our 30+ years of experience in forensic research and the most comprehensive library of document templates in the world, we create breakthrough technologies for document and biometric verification. Our hardware and software solutions allow over 1,000 organizations and 80 border control authorities globally to provide top-notch client service without compromising safety, security, or speed. Regula has been repeatedly named a Representative Vendor in the Gartner® Market Guide for Identity Verification.
Learn more at www.regulaforensics.com.
View source version on businesswire.com: https://www.businesswire.com/news/home/20250213790016/en/

Subscribe to releases from Business Wire
Subscribe to all the latest releases from Business Wire by registering your e-mail address below. You can unsubscribe at any time.
Latest releases from Business Wire
Binarly to Unveil “Broken Trust” Research: Firmware Bypass Chains, BMC Persistence, and EDR Evasion15.1.2026 23:04:00 CET | Press release
Binarly, the industry leader in software and firmware supply-chain security, today announced an upcoming DistrictCon presentation “Broken Trust: Firmware Bypass Chains, BMC Persistence, and EDR Evasion.” The session will detail how firmware-level attack chains observed in shipped enterprise devices can effectively undermine modern endpoint defenses, enabling stealthy compromise and long-lived persistence. This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20260115834965/en/ Binarly Unveils Broken Trust Research: Firmware Bypass, BMC Persistence In this presentation, the Binarly REsearch team will dismantle the assumption of hardware trust by presenting multiple real-world firmware bypass chains. Alex Matrosov and Fabio Pagani will provide a deep dive into the specific vulnerability classes and exploitation primitives that make these attacks reliable in practice. The team will also deliver a live demonstration compromising a fully
Coolbrook Named on the 2026 Global Cleantech 10015.1.2026 18:14:00 CET | Press release
Coolbrook, a transformational technology and engineering company on a mission to decarbonise major industrial sectors like petrochemicals and chemicals, iron and steel, aluminium, and cement, has been named on Cleantech Group’s 2026 Global Cleantech 100. This annual list recognizes companies poised to deliver market-ready solutions that advance a cleaner, more resilient global future. The report highlights innovators addressing some of the world’s most urgent environmental and infrastructure challenges. The complimentary report introduces you to innovators advancing groundbreaking technologies and business models to enable us to act on the ever-increasing climate and environmental crisis. Following a 2025 marked by geopolitical volatility and shifting economic signals, the global cleantech ecosystem enters 2026 with slightly greater certainty - yet heightened competitive pressure. Growth is concentrating around two dominant themes: AI infrastructure and critical minerals. “The 2026 Glo
World Economic Forum and Salesforce Empower Global Leaders With First-of-its-Kind Agentic Assistant for the 2026 Annual Meeting in Davos15.1.2026 18:01:00 CET | Press release
The Forum activates its vast data stores through Agentforce 360, enabling a level of preparation and decision-making for its over 3,000 attendees previously unachievable by human processing alone Salesforce (NYSE: CRM), the world’s #1 CRM, today announced the activation of the World Economic Forum’s institutional knowledge powered by Agentforce 360 to support over 3,000 of the world’s most influential leaders at the 2026 World Economic Forum Annual Meeting. The Forum has launched a new proactive, high-precision concierge app, “EVA,” built on the Agentforce 360 Platform, Salesforce’s agentic platform. EVA will empower attendees to move beyond traditional information access, with an AI agent that doesn’t just answer questions, but can reason, prioritize, and act on a leader’s behalf for the 2026 Annual Meeting. This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20260115571119/en/ Scheduled for January 19–23 in Davos, Switzerland, th
Frasca to Supply Four New Flight Training Devices to Global Medical Response15.1.2026 16:05:00 CET | Press release
New Level 7 FTDs will support pilot training for emergency medical operations Frasca International, Inc., a FlightSafety International company, today announced it has signed a contract with Global Medical Response (GMR) to supply four new Level 7 Flight Training Devices (FTDs). The new devices include an Airbus EC135, a Pilatus PC-12, a Beechcraft C90, and a Beechcraft B200. Each FTD will feature Frasca's unique motion system to provide enhanced realism in training. The devices will be installed at GMR’s new training facility currently under construction in Denton, Texas. Frasca has supported GMR’s pilot training efforts for nearly two decades, beginning with the delivery of their first device in 2005 for Air Evac Lifeteam, a GMR company. Since then, Frasca simulators have played a central role in preparing GMR’s flight crews for the complex and high-stakes environments they encounter in emergency medical operations. With the delivery of these new devices, GMR will operate a total of 1
illumynt Reports 60% Revenue Growth and Launches Global Innovation Center to Meet Rising Enterprise Security and Sustainability Demands15.1.2026 15:11:00 CET | Press release
illumynt an intelligent, security-first technology lifecycle partner, today announced significant growth and innovation milestones that position the company as a leader in the next evolution of the IT Asset Disposition (ITAD) industry—an industry increasingly shaped by artificial intelligence, accelerated hardware refresh cycles, and heightened regulatory scrutiny. Under the leadership of CEO Joerg Herbarth, illumynt continues to execute its mission to deliver intelligent, technology-driven lifecycle solutions that maximize sustainability, security, and recovery value for the world’s most compute-intensive organizations. In 2025, ITAD became a strategic imperative. AI-driven workloads have dramatically compressed infrastructure lifecycles, while updates to NIST SP 800-88 Rev. 2, adoption of R2v3, and the expansion of global privacy frameworks have raised expectations for auditability, transparency, and verified data security. As a result, ITAD has evolved from a back-end operational fu
In our pressroom you can read all our latest releases, find our press contacts, images, documents and other relevant information about us.
Visit our pressroom