Be careful: Fraudsters try to sell concert tickets via Facebook using stolen identities. The rip-off ends in further identity theft.

Scammers steal Facebook users' identities

The cyber criminals lure people with fake profiles and concert tickets.
The sale ends in rip-offs and identity theft.

We keep reporting on the nasty scam of identity theft . Fraudsters are extremely creative when it comes to obtaining their victims' personal data. The trick with the concert tickets, for example, is particularly current. Interested buyers actually only want to buy tickets via Facebook. A short time later they realize that they have fallen into the trap of online fraudsters. They not only lose their money, but also their identity, because the criminals demand a photo of the person including their ID card - supposedly as proof of identity so that the money arrives safely.

[mk_ad]

A short time later, several fake profiles with the victim's name appeared on Facebook, allegedly selling concert tickets. The social media platform apparently offers one of the best conditions for the scam, because here the criminals can quickly reach potential additional victims. But that's not all: the fraudsters even create an account at an online bank in the name of the victims and the real people responsible remain anonymous.

Y-Kollektiv journalist Tim Schrankel turned the tables and during his research contacted a number of fake profiles that were also created on Facebook with stolen identities and are supposedly selling concert tickets:

And now?

In the case of fraud that leads abroad, the police's hands are often tied, but it is still important that you file a report. Many departments already have their own departments that specialize in cyber crime.

[mk_ad]

Also inform your friends, acquaintances, colleagues and business partners about identity theft. New friend requests on your behalf should be ignored.

Prevent identity theft:

  • Don't make everything public on social networks and be careful with personal information! If possible, use a pseudonym. If you use your real name, do not publish your address or telephone number! For example, change the visibility of your friends' list on Facebook to private - a video guide from the North Rhine-Westphalia Consumer Center shows you how to do this.
  • If possible, use a separate email address for social media. also offers tips free email addresses
  • If offered, use “two-factor authentication.”
  • Don't fall for fraudulent emails (phishing)! You can find out how to recognize them in the phishing radar from the NRW consumer advice center .
  • Do not allow yourself to be entered in telephone books and public telephone directories with your full name and address!
  • Object to the registration authorities sharing your data.
Article image: Shutterstock / By Antonio Guillem


If you enjoyed this post and value the importance of well-founded information, become part of the exclusive Mimikama Club! Support our work and help us promote awareness and combat misinformation. As a club member you receive:

📬 Special Weekly Newsletter: Get exclusive content straight to your inbox.
🎥 Exclusive video* “Fact Checker Basic Course”: Learn from Andre Wolf how to recognize and combat misinformation.
📅 Early access to in-depth articles and fact checks: always be one step ahead.
📄 Bonus articles, just for you: Discover content you won't find anywhere else.
📝 Participation in webinars and workshops : Join us live or watch the recordings.
✔️ Quality exchange: Discuss safely in our comment function without trolls and bots.

Join us and become part of a community that stands for truth and clarity. Together we can make the world a little better!

* In this special course, Andre Wolf will teach you how to recognize and effectively combat misinformation. After completing the video, you have the opportunity to join our research team and actively participate in the education - an opportunity that is exclusively reserved for our club members!


Notes:
1) This content reflects the current state of affairs at the time of publication. The reproduction of individual images, screenshots, embeds or video sequences serves to discuss the topic. 2) Individual contributions were created through the use of machine assistance and were carefully checked by the Mimikama editorial team before publication. ( Reason )