Sunday, October 5, 2025
Cyber Safety Canada | Scam Shield Digest
  • Login
  • Register
  • Home
  • Latest Scam Alerts
  • Fraud Prevention News
    lock and key as symbol for Privacy and General Data Protection Regulation on a notebook computer

    Passkeys Are Phishing-Resistant—But Not Magic: Where They Break in the Real World

    Portrait of young bearded computer programmer looking at camera near the computer monitor with software in dark office

    How Attackers Use Code Signing and Social Proof to Trick You — Why a Certificate Isn’t Enough

    Six young adult friends using smartphones and digital tablets in park

    What to Do If Apple Says You’ve Been Targeted by Spyware

    Male web designer working late at night

    3 Things You’ll Need Most If a Cyberattack Hits You

    What to Do if a DDoS Attack Disrupts Your Online Service

    What to Do if a DDoS Attack Disrupts Your Online Service

    Above view of young social media marketers sitting on floor and using computers while analyzing marketing tools

    How to Review and Revoke Connected Apps in 2025: Complete Security Guide

    Trending Tags

    • romance investment fraud Canada
    • crypto romance scam
    • Chinese State-Sponsored Hacking
  • Cybersecurity Trends
    lock and key as symbol for Privacy and General Data Protection Regulation on a notebook computer

    Passkeys Are Phishing-Resistant—But Not Magic: Where They Break in the Real World

    Portrait of young bearded computer programmer looking at camera near the computer monitor with software in dark office

    How Attackers Use Code Signing and Social Proof to Trick You — Why a Certificate Isn’t Enough

    Six young adult friends using smartphones and digital tablets in park

    What to Do If Apple Says You’ve Been Targeted by Spyware

    Male web designer working late at night

    3 Things You’ll Need Most If a Cyberattack Hits You

    What to Do if a DDoS Attack Disrupts Your Online Service

    What to Do if a DDoS Attack Disrupts Your Online Service

    Above view of young social media marketers sitting on floor and using computers while analyzing marketing tools

    How to Review and Revoke Connected Apps in 2025: Complete Security Guide

    How the “Pig-Butchering” Crypto Romance Scam Works—And How to Protect Yourself

    senior women hand using smart phone close up

    Text Phishing Scam Costs Long Island Senior $15,000 — How Not to be a Victim

    grandmother on her computer at home

    The 2025 Cyber Safety Checklist for Seniors

    Trending Tags

    • Nation-State Cyber Threats
    • China Telecom Hack
    • Chinese State-Sponsored Hacking
    • Salt Typhoon China Hack
  • Investment & Retirement Scams
    senior women hand using smart phone close up

    Text Phishing Scam Costs Long Island Senior $15,000 — How Not to be a Victim

    hacker in the shadows on their laptop that has a figure of a closed lock glowing on it. The background is a dark city scape that is raining with orange digital letters and numbers

    🚨 Orange Belgium Hack 2025: 850,000 Customers Impacted in SIM Data Breach – Protect Yourself

    African american photo designer retouching images next to green screen on dual screens in a tech driven environment, representing modern digital media. Male graphic artist uses software tools.

    Beware the Deepfake Investment Scam Surge: What Kiwis Must Know

    Cheerful senior couple enjoying a Ferris wheel by the Santa Monica pier

    🛑 How Scammers Target Your Retirement: Inside Pre-Approved Scams & New Tactics

    Trending Tags

    • protect retirement savings online
    • investment scam prevention
    • Nation-State Cyber Threats
    • romance investment fraud Canada
  • Protection Guides
No Result
View All Result
  • Home
  • Latest Scam Alerts
  • Fraud Prevention News
    lock and key as symbol for Privacy and General Data Protection Regulation on a notebook computer

    Passkeys Are Phishing-Resistant—But Not Magic: Where They Break in the Real World

    Portrait of young bearded computer programmer looking at camera near the computer monitor with software in dark office

    How Attackers Use Code Signing and Social Proof to Trick You — Why a Certificate Isn’t Enough

    Six young adult friends using smartphones and digital tablets in park

    What to Do If Apple Says You’ve Been Targeted by Spyware

    Male web designer working late at night

    3 Things You’ll Need Most If a Cyberattack Hits You

    What to Do if a DDoS Attack Disrupts Your Online Service

    What to Do if a DDoS Attack Disrupts Your Online Service

    Above view of young social media marketers sitting on floor and using computers while analyzing marketing tools

    How to Review and Revoke Connected Apps in 2025: Complete Security Guide

    Trending Tags

    • romance investment fraud Canada
    • crypto romance scam
    • Chinese State-Sponsored Hacking
  • Cybersecurity Trends
    lock and key as symbol for Privacy and General Data Protection Regulation on a notebook computer

    Passkeys Are Phishing-Resistant—But Not Magic: Where They Break in the Real World

    Portrait of young bearded computer programmer looking at camera near the computer monitor with software in dark office

    How Attackers Use Code Signing and Social Proof to Trick You — Why a Certificate Isn’t Enough

    Six young adult friends using smartphones and digital tablets in park

    What to Do If Apple Says You’ve Been Targeted by Spyware

    Male web designer working late at night

    3 Things You’ll Need Most If a Cyberattack Hits You

    What to Do if a DDoS Attack Disrupts Your Online Service

    What to Do if a DDoS Attack Disrupts Your Online Service

    Above view of young social media marketers sitting on floor and using computers while analyzing marketing tools

    How to Review and Revoke Connected Apps in 2025: Complete Security Guide

    How the “Pig-Butchering” Crypto Romance Scam Works—And How to Protect Yourself

    senior women hand using smart phone close up

    Text Phishing Scam Costs Long Island Senior $15,000 — How Not to be a Victim

    grandmother on her computer at home

    The 2025 Cyber Safety Checklist for Seniors

    Trending Tags

    • Nation-State Cyber Threats
    • China Telecom Hack
    • Chinese State-Sponsored Hacking
    • Salt Typhoon China Hack
  • Investment & Retirement Scams
    senior women hand using smart phone close up

    Text Phishing Scam Costs Long Island Senior $15,000 — How Not to be a Victim

    hacker in the shadows on their laptop that has a figure of a closed lock glowing on it. The background is a dark city scape that is raining with orange digital letters and numbers

    🚨 Orange Belgium Hack 2025: 850,000 Customers Impacted in SIM Data Breach – Protect Yourself

    African american photo designer retouching images next to green screen on dual screens in a tech driven environment, representing modern digital media. Male graphic artist uses software tools.

    Beware the Deepfake Investment Scam Surge: What Kiwis Must Know

    Cheerful senior couple enjoying a Ferris wheel by the Santa Monica pier

    🛑 How Scammers Target Your Retirement: Inside Pre-Approved Scams & New Tactics

    Trending Tags

    • protect retirement savings online
    • investment scam prevention
    • Nation-State Cyber Threats
    • romance investment fraud Canada
  • Protection Guides
No Result
View All Result
Cyber Safety Canada | Scam Shield Digest
No Result
View All Result
Home Cybersecurity Trends

Beware the Deepfake Investment Scam Surge: What Kiwis Must Know

by Stacey
September 9, 2025
in Cybersecurity Trends, Fraud Prevention News, Investment & Retirement Scams, Latest Scam Alerts
Reading Time: 4 mins read
0 0
A A
0
African american photo designer retouching images next to green screen on dual screens in a tech driven environment, representing modern digital media. Male graphic artist uses software tools.
0
SHARES
10
VIEWS
Share on FacebookShare on LinkedInShare on XShare on PinterestShare Via Email

TL;DR

  • The Financial Markets Authority (FMA) has issued a fresh warning about deepfake scams on social media, where impersonated New Zealand business leaders and commentators promote fake investment schemes.

  • These scams use deepfake videos, WhatsApp groups, phishing websites, and remote-access malware to extract personal and financial data.

  • Red flags include unsolicited investment ads featuring familiar faces, links to “WhatsApp investment groups,” and requests for upfront fees.

  • Protect yourself: Never click, join, or pay. Report suspicious content to Meta, FMA, your bank, and Victim Support.

Table of Contents

What’s Going On?

Scammers are upping their game—using Meta platforms like Facebook and Instagram to spread deepfake videos featuring recognizable NZ journalists, politicians, businesspeople, and financial commentators. These spoofed profiles promote free investment advice via WhatsApp groups, leading victims into elaborate scams.

Once inside a WhatsApp “investment group,” victims are guided to install remote-access malware and directed toward bogus investment platforms—often involving cryptocurrency. When attempts are made to withdraw funds, victims are blocked behind fake fees. HCMagFisheries New Zealand

This new wave follows earlier FMA alerts about fake endorsements from politicians or fabricated news stories—now the fraudsters are impersonating business leaders to add credibility

Why This Scam Thrives in 2025

  • Deepfake realism makes it hard to discern fake from real.

  • Social media trust: Seeing a familiar face on your feed lowers skepticism.

  • WhatsApp-based deception: The closed nature of the platform fosters trust.

  • Malware via legitimate-sounding “apps”: Attackers remotely access devices.

FMA’s Advice at a Glance

  1. DON’T click on investment ads featuring celebrity or commentator impersonations.

  2. DON’T register, download apps, or hand over personal details.

  3. DON’T send money—if fees are demanded for investment access, it’s a scam.

  4. Report the ad to the social platform (e.g., Meta’s reporting tools).

  5. Check FMA’s website for updates and official warnings.

  6. Report to FMA directly at questions@fma.govt.nz or via their site

How the Scam Operates

  • Social media ads appear with trusted faces (often deepfaked).

  • Ads lead to WhatsApp groups, pitched as free investment mentorship.

  • Scammers push victims to download remote-access tools, give control of devices.

  • Victims are urged to invest in fraudulent platforms, often requesting crypto or bank transfers.

  • When withdrawals are attempted, “release fees” are demanded—payments are never returned.

FAQ — Deepfake Investment Scams in NZ

How do deepfake scams work? These scams use AI-manipulated videos or images showing real NZ personalities promoting a fake investment opportunity, often leading victims to malware or loss of funds.:contentReference[oaicite:34]{index=34}
Why does WhatsApp play a role in these scams? Scammers invite victims into WhatsApp groups—platforms seen as private and trustworthy—where they manipulate them into installing malware or fake investment software.:contentReference[oaicite:35]{index=35}
How can I verify if an ad is legitimate? Always use known, official sources: visit the FMA site, contact the institution listed on legitimate adverts, and avoid links in unsolicited messages.
What should I do if I’ve engaged with one of these scams? 1. Stop communication with the scammer.
2. Contact your bank or financial institution immediately.
3. Report the ad/profile to Meta.
4. Report to FMA.
5. Contact Victim Support: 0800 842 846.:contentReference[oaicite:36]{index=36}

Final Thoughts

This surge in deepfake and impersonator scams isn’t limited to New Zealand—it’s a global risk. Stay alert, verify everything, and report swiftly to protect yourself and others. If something feels off, trust your instincts—and double-check with reliable institutions before engaging.

Related Posts

  • grandmother on her computer at home
    The 2025 Cyber Safety Checklist for Seniors
  • hacker in the shadows on their laptop that has a figure of a closed lock glowing on it. The background is a dark city scape that is raining with orange digital letters and numbers
    Dynamic Capital Ltd IPO gets oversubscribed by over five times on Day 20

  • OnlineEasyPay arrives on the online shopping platform ShopOnline.com
  • Close up of African American woman entering pin while using ATM machine.
    ABC’s head of AI research outlined the 7 areas the bank is looking to apply the tech
  • Cheerful senior couple enjoying a Ferris wheel by the Santa Monica pier
    The biggest shifts and trends driving short- and long-term growth in the future
  • News aggregation app Initech raises $100 million from existing investors
Stacey

Stacey

Recommended

Portrait of young bearded computer programmer looking at camera near the computer monitor with software in dark office

How Attackers Use Code Signing and Social Proof to Trick You — Why a Certificate Isn’t Enough

6 days ago
Cheerful senior couple enjoying a Ferris wheel by the Santa Monica pier

🛑 How Scammers Target Your Retirement: Inside Pre-Approved Scams & New Tactics

6 months ago
The businesswoman standing near the blue monitor

Signs You Might Be a Hidden Victim of Brickstorm: Red Flags & What to Do If You Suspect It

6 days ago

🛑 How Scammers Trick You With Fake Links — and How to Stay Safe

2 months ago
A hooded person’s face, lit in red and blue, peers over a laptop showing dense green code. A status box reads “HACKING…99%.” A dark, semi‑transparent panel overlays the image with the headline “Salesforce Connected‑App Data Heist — What Happened & How to Protect Yourself” and “ScamShieldDigest.com · September 2025.”

The Salesforce Connected‑App Data Heist: What Happened and How to Protect Yourself

4 weeks ago
Close up of African American woman entering pin while using ATM machine.

🛡️ How Banks Are Battling AI-Powered Scams Targeting Seniors

2 months ago

Popular News

  • lock and key as symbol for Privacy and General Data Protection Regulation on a notebook computer

    Passkeys Are Phishing-Resistant—But Not Magic: Where They Break in the Real World

    0 shares
    Share 0 Tweet 0
  • Signs You Might Be a Hidden Victim of Brickstorm: Red Flags & What to Do If You Suspect It

    0 shares
    Share 0 Tweet 0
  • How Attackers Use Code Signing and Social Proof to Trick You — Why a Certificate Isn’t Enough

    0 shares
    Share 0 Tweet 0
  • What to Do if a DDoS Attack Disrupts Your Online Service

    0 shares
    Share 0 Tweet 0
  • What to Do If Apple Says You’ve Been Targeted by Spyware

    0 shares
    Share 0 Tweet 0

Connect with us

Newsletter

Stay one step ahead of scammers. Get our free weekly ScamShield Digest with the latest alerts and simple safety tips for seniors and families.

Category

  • Critical Infrastructure Security
  • Cybersecurity Trends
  • Fraud Prevention News
  • Investment & Retirement Scams
  • Latest Scam Alerts
  • Nation State Cyber Threats
  • Protection Guides
  • Ransomware & Extortion
  • Romance & Dating Scams
  • Tech Support Scams
  • Telecommunications Security

About Us

ScamShield Digest is part of the Shield IT Training Foundation. We believe online safety is for everyone — especially seniors and families. Our blog, guides, and newsletter are here to inform, protect, and empower.

  • About
  • Advertise
  • Careers
  • Contact

© 2025 ScamShield Digest

Welcome Back!

OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

OR

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Home
  • Cybersecurity Trends
  • Latest Scam Alerts
  • Tech Support Scams
  • Romance & Dating Scams
  • Investment & Retirement Scams

© 2025 ScamShield Digest