Detecting Romance Scams & Catfishes in 2025
The Evolution of the Scam
Romance scams (sometimes called 'Pig Butchering' when crossing over into crypto fraud) have evolved. In 2025, scammers no longer steal single images from Google; they use Generative AI (like Midjourney or Stable Diffusion) to create entirely synthesized human faces, coupled with LLMs to manage the dialogue.
Standard reverse image searches will fail against an AI-generated face because the image has never existed on the internet before.
1. Detecting AI Synthetics
OSINT analysts train to look for the artifacts that AI models still struggle with.
- Background Topology: Does the background melt together? Are the lines of a bookcase physically impossible?
- Lighting Inconsistencies: Pay close attention to the reflections in the subject's pupils.
- Voice Analysis: If a target uses voice notes, deploying deepfake detection models can quickly authenticate (or invalidate) the audio stream. (See our Video Deepfake Detector).
2. Infrastructure and Telecom OSINT
When visual analysis is inconclusive, pivot to the infrastructure.
- VOIP vs. Sim: Is the provided phone number a physical SIM registered to a major carrier, or is it an untraceable Voice-over-IP (VOIP) number like Google Voice or TextNow? Our Signal/WhatsApp Number Verifier handles this rapidly.
- IP Grabbing: While engaging with the subject, sending a benign, trackable link (a 'canary token') can reveal their true IP address. If the target claims to be a soldier in Ohio, but their IP pings a data center in Lagos, the investigation is essentially complete.
3. The Scripted Engagement
Scammers operate in coordinated networks using scripts. Taking a specific, idiosyncratic phrase the target uses and searching for it in quotes ("exact match") on Google can often lead to anti-scam forums where victims have posted the exact same script.
Protecting vulnerable individuals and high-net-worth targets requires systematic verification. Trust nothing without OSINT validation.
Relevant OSINT Capabilities
Specific TraxinteL toolpaths derived from this intelligence brief.
Track Scams & Financial Fraud via Instagram
Follow the money graph from an initial point of compromise to expose the syndicates operating on Instagram. Professional-grade OSINT methodology.
Track Scams & Financial Fraud via X/Twitter
Follow the money graph from an initial point of compromise to expose the syndicates operating on X/Twitter. Professional-grade OSINT methodology.
Track Scams & Financial Fraud via Snapchat
Follow the money graph from an initial point of compromise to expose the syndicates operating on Snapchat. Professional-grade OSINT methodology.
Track Scams & Financial Fraud via Facebook
Follow the money graph from an initial point of compromise to expose the syndicates operating on Facebook. Professional-grade OSINT methodology.
Track Scams & Financial Fraud via Telegram
Follow the money graph from an initial point of compromise to expose the syndicates operating on Telegram. Professional-grade OSINT methodology.
Track Scams & Financial Fraud via WhatsApp
Follow the money graph from an initial point of compromise to expose the syndicates operating on WhatsApp. Professional-grade OSINT methodology.
Relevant Field Investigations
A Military Romance Scam Network Operating Across 5 Dating Apps
TraxinteL uncovered a coordinated romance scam using stolen U.S. military photos and operating simultaneous profiles on Tinder, Bumble, Hinge, Zoosk, and Match.
Unmasking an AI-Generated Catfish on Tinder Using Facial Recognition
A user suspected their Tinder match was using AI-generated photos. TraxinteL confirmed the profile was entirely synthetic and linked to a known romance scam network.
$450K Bitcoin Romance Scam: Following the Blockchain to a Mixing Service
A victim lost $450,000 to a romance scam that used Bitcoin as the payment mechanism. TraxinteL traced the funds through multiple hops and a mixing service.