Executive Summary

In early 2024, security researchers investigated the initial phases of romance scams conducted over WhatsApp, where attackers use social engineering tactics to engage targets. Scammers made initial contact using 'wrong number' messages, then rapidly built rapport through flattering responses and fabricated personal stories. Over the span of several weeks, operators established credibility by sharing career details, transitioning conversations to new phone numbers, and sharing lifestyle photos to lay groundwork for future financial scams. The observed campaigns were early-stage but designed to emotionally manipulate victims for eventual financial exploitation.

This incident spotlights the refined playbooks, multi-operator approaches, and psychological grooming now typical in romance scams. With surges in digital-first communication and persistent threat actor innovation, such social engineering exploits pose a significant and evolving risk to individuals and businesses alike.

Why This Matters Now

Romance scams have escalated in sophistication, leveraging multi-step playbooks and persistent communication to evade suspicion and compliance controls. As social engineering-driven fraud increases globally, organizations and individuals must update awareness trainings and monitoring to detect behavioral red flags early, preventing financial loss and reputational damage.

Attack Path Analysis

MITRE ATT&CK® Techniques

Potential Compliance Exposure

Sector Implications

Sources

Frequently Asked Questions

Romance scams often start with an unsolicited message using a 'wrong number' pretext, followed by rapid rapport-building and requests to move conversations off-platform.

Cloud Native Security Fabric Mitigations and ControlsCNSF

Zero Trust segmentation, egress policy enforcement, and multicloud visibility would have constrained the attacker's ability to move laterally, persist communication, and exfiltrate data by limiting unauthorized outbound flows and ensuring stricter workload-to-workload trust boundaries. Although the attack was primarily social engineering, appropriate CNSF controls reduce the risk of subsequent technical exploitation or data loss.

Initial Compromise

Control: Cloud Native Security Fabric (CNSF)

Mitigation: Attempts to exploit shadow IT or leverage unauthorized shadow AI tools are detected.

Privilege Escalation

Control: Zero Trust Segmentation

Mitigation: Identity-based segmentation minimizes expanded access.

Lateral Movement

Control: East-West Traffic Security

Mitigation: Internal flow restrictions prevent lateral pivoting to additional resources or environments.

Command & Control

Control: Multicloud Visibility & Control

Mitigation: Anomalous external communications are detected and investigated.

Exfiltration

Control: Egress Security & Policy Enforcement

Mitigation: Unauthorized data exfiltration attempts are blocked or isolated.

Impact (Mitigations)

Exploit traffic or malicious payload delivery is detected and blocked if attempted.

Impact at a Glance

Affected Business Functions

  • n/a
Operational Disruption

Estimated downtime: n/a days

Financial Impact

Estimated loss: $547,000,000

Data Exposure

n/a

Recommended Actions

  • Enforce Zero Trust Segmentation to block unnecessary lateral movement across workloads and user environments.
  • Implement egress filtering and policy enforcement to restrict outbound communications to approved domains or services only.
  • Enhance multicloud visibility and anomaly detection to identify suspicious communication patterns characteristic of social engineering campaigns.
  • Regularly update and tune inline IPS signatures to catch known exploit and payload delivery attempts during all phases.
  • Educate users on advanced social engineering tactics and enforce default least privilege policies to minimize social-driven risk.

Secure the Paths Between Cloud Workloads

A cloud-native security fabric that enforces Zero Trust across workload communication—reducing attack paths, compliance risk, and operational complexity.

Cta pattren Image