{"id":27926,"date":"2019-08-12T07:51:00","date_gmt":"2019-08-12T11:51:00","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=27926"},"modified":"2019-11-15T06:23:46","modified_gmt":"2019-11-15T11:23:46","slug":"selfie-with-id-card-scam","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/selfie-with-id-card-scam\/27926\/","title":{"rendered":"Selfie hunting: Think twice before confirming your identity"},"content":{"rendered":"<p>During registration, some online services ask you to confirm your identity by uploading a selfie showing you and your ID. It\u2019s a convenient way to prove that you are you. You don\u2019t need to go to some distant office and stand in line. Just take a photo, upload it, and wait a short while for your account to be approved by an administrator.<\/p>\n<p>Unfortunately, it\u2019s not just legitimate websites with a good reputation interested in your selfies; they\u2019re also of interest to <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/phishing\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener noreferrer\">phishers<\/a>. Here\u2019s how the scam works, why criminals are after your photos with ID cards, and how not to swallow the bait.<\/p>\n<h2>Verifying your identity<\/h2>\n<p>A common business scenario these days begins with an e-mail from a bank, payment system, or social network saying that for \u201cextra security\u201d (or some other reason), you need to confirm your identity.<\/p>\n<p>The link leads to a <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/paypal-phishing-site-asks-victims-to-submit-a-selfie-holding-their-id-card\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">page with a form<\/a> prompting you to enter account credentials, payment card details, address, telephone number, or other information, and to upload a selfie with a clearly visible ID card or other document. At this point, you should stop and think \u2014 is it really a good idea to upload your selfie with ID? They may well be scammers.<\/p>\n<div id=\"attachment_27929\" style=\"width: 1470px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/08\/12074826\/selfie-with-id-card-scam-screen-1.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-27929\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/08\/12074826\/selfie-with-id-card-scam-screen-1.jpg\" alt=\"Scammers pretending to be payment system and bank, asking for a selfie upload with document\" width=\"1460\" height=\"870\" class=\"size-full wp-image-27929\"><\/a><p id=\"caption-attachment-27929\" class=\"wp-caption-text\">Scammers pretending to be payment system and bank, asking for a selfie upload with document<\/p><\/div>\n<h3>Why fraudsters want selfies with ID cards<\/h3>\n<p>As we already mentioned, some online services require a photo with ID for registration. If you send a selfie to scammers, they will be able to create accounts in your name \u2014 for example, on cryptocurrency exchanges \u2014 with a view to using them to launder money. As a result, you may run into problems with the law. Not great.<\/p>\n<p>On the black market your selfie with ID <a href=\"https:\/\/qz.com\/1422783\/the-passport-scan-scam-theres-a-thriving-black-market-for-selfies-with-pictures-of-passports\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">will fetch a far heftier sum<\/a> than just an ID scan. Having got hold of the coveted photo, the scammers can sell it profitably, and the buyers can use your name as they please.<\/p>\n<h3>Typical signs of online fraud<\/h3>\n<p>Fortunately for us all, online fraud is rarely the realm of meticulous types who perfect every tiny detail. A close inspection of the phishing e-mail and the website that the link leads to almost always reveals many suspicious elements.<\/p>\n<h4>1. Errors and typos<\/h4>\n<p>Most likely, the e-mail and data entry form will not be written in the finest prose. Do official websites and e-mails from large organizations often bristle with grammatical errors and typos?<\/p>\n<h4>2. Suspicious sender address<\/h4>\n<p>Such messages often come from addresses registered on free e-mail services, or belonging to companies with no affiliation whatsoever to the one named in the e-mail.<\/p>\n<h4>3. Domain name doesn\u2019t match<\/h4>\n<p>Even if the sender\u2019s address looks legit, the site hosting the phishing form is likely to be located on a rogue or unrelated domain. In some cases, the address can be very similar (but still different); in others the difference is striking. For example, a message supposedly from LinkedIn for some reason invites users to upload a photo to Dropbox.<\/p>\n<div id=\"attachment_27928\" style=\"width: 1039px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/08\/12074832\/selfie-with-id-card-scam-screen-2.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-27928\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/08\/12074832\/selfie-with-id-card-scam-screen-2.png\" alt=\"Why would LinkedIn ask for a photo upload to Dropbox? That's scammers\" width=\"1029\" height=\"623\" class=\"size-full wp-image-27928\"><\/a><p id=\"caption-attachment-27928\" class=\"wp-caption-text\">Why would LinkedIn ask for a photo upload to Dropbox? That\u2019s scammers<\/p><\/div>\n<h4>4. Excessively tight deadline<\/h4>\n<p>Often, the authors of such e-mails do their best to hurry the recipient, for example by claiming that the link will expire in 24 hours. Scammers frequently resort to this technique, since the false sense of urgency causes many to act without thinking. But reputable organizations are unlikely to rush you for no reason.<\/p>\n<h4>5. Request for information you already provided<\/h4>\n<p>Be triple cautious if at least part of the information requested (for example, email address or phone number) is something you already supplied during registration. And in the case of a bank, you and your identity were confirmed when opening the account. Why verify it again for the sake of some nebulous \u201cextra security\u201d?<\/p>\n<h4>6. Demands instead of offers<\/h4>\n<p>Many resources offer advanced features, including security-related ones, in exchange for information about you\u00a0\u2014 but in your personal account on the website, not by e-mail. And usually it is an offer you <em>can<\/em> refuse. But in the form that opens from the link in some scam e-mails, there is only one button, as if to suggest that there is no option but to upload a selfie.<\/p>\n<h4>7. No information about it on the official website<\/h4>\n<p>You may actually have had to confirm your identity on a resource that you had used for a long time. However it\u2019s the exception, not the rule, and details of what\u2019s going on should be available on the official website of the service and easy to google.<\/p>\n<h3>Don\u2019t hand out ID card selfies<\/h3>\n<p>To prevent fraudsters from stealing your identity, be wary of any requests for data, especially when documents are in play.<\/p>\n<ul>\n<li>Be suspicious of requests to verify your identity in services that you have been using for a while. If you\u2019re of two minds about whether to ignore a particular message, look for information on the company\u2019s official website.<\/li>\n<li>Pay attention to the quality of the text. Remember that grammatical errors, missing words, and typos in real corporate communications are extremely rare.<\/li>\n<li>Check where the message came from, and where the link points. Companies send mailings from official domains, and any exceptions would be explained on their websites. Surveys, login forms, and other official pages are also usually cited on official resources.<\/li>\n<li>Any restrictions, such as a pushy time frame for providing information, should ring an alarm bell. It is better to miss the deadline than send your data to cybercriminals.<\/li>\n<li>If in doubt, call customer service. But do not use the number provided in the message\u00a0\u2014 find it instead on the official website or in the registration confirmation e-mail.<\/li>\n<li>Use a <a href=\"https:\/\/www.kaspersky.com\/internet-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kismd___\" target=\"_blank\" rel=\"noopener nofollow\">reliable antivirus program<\/a> with protection against phishing and online fraud.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-trial-cyberattacks\">\n","protected":false},"excerpt":{"rendered":"<p>Scammers are interested in your photos with ID cards. We explain why and how to stay protected.<\/p>\n","protected":false},"author":2481,"featured_media":27927,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1788,9],"tags":[315,1065,363,76,43,131],"class_list":{"0":"post-27926","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-privacy","8":"category-tips","9":"tag-identity-theft","10":"tag-online-services","11":"tag-personal-data","12":"tag-phishing","13":"tag-privacy","14":"tag-tips"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/selfie-with-id-card-scam\/27926\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/selfie-with-id-card-scam\/16503\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/selfie-with-id-card-scam\/13903\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/selfie-with-id-card-scam\/18420\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/selfie-with-id-card-scam\/16551\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/selfie-with-id-card-scam\/15142\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/selfie-with-id-card-scam\/19071\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/selfie-with-id-card-scam\/17792\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/selfie-with-id-card-scam\/23365\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/selfie-with-id-card-scam\/6340\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/selfie-with-id-card-scam\/12118\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/selfie-with-id-card-scam\/12206\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/selfie-with-id-card-scam\/11068\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/selfie-with-id-card-scam\/19925\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/selfie-with-id-card-scam\/23905\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/selfie-with-id-card-scam\/18846\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/selfie-with-id-card-scam\/23215\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/selfie-with-id-card-scam\/23148\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/tips\/","name":"tips"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/27926","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2481"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=27926"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/27926\/revisions"}],"predecessor-version":[{"id":29385,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/27926\/revisions\/29385"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/27927"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=27926"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=27926"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=27926"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}