CASE STUDY

When Love Turns Into a Data Breach: How “Cheryl” Cost Carla $124,000

Updated August 26, 2025 •

TL;DR: A 69-year-old woman (“Carla”) lost $124,000 to a scammer posing as “Cheryl.” The scammer used stolen photos, polished social profiles, and escalating payment requests to win trust — then pivoted to identity exploitation. Modern romance scams are data-driven. Your online footprint can be weaponized unless you shrink it.

The Story (names changed; details adapted)

After retirement, Carla joined online groups for connection. That’s where “Cheryl” appeared: warm, attentive, always present. Trust grew quickly. Then came the requests—first small, then urgent, then constant.

By then, the money was gone — and Carla’s identity was compromised.

This wasn’t just a scam. It was a data breach.

Romance scams run on OSINT (open-source intelligence).

Red flags Carla missed

  1. Urgency + secrecy (“Don’t tell your bank”).
  2. Irreversible payments: gift cards, crypto, wires.
  3. Shifting stories about work, family, location.
  4. No real-time verification (avoids video).
  5. Platform hopping from comments → private DM → WhatsApp.
  6. Identity bleed: new accounts opened in her name.

The recovery protocol (what ClearTrace would do)

  1. Freeze what matters: banks, credit bureaus, retirement providers.
  2. Reset access: passwords, 2FA, recovery email/phone.
  3. Audit devices: remove unknown apps/extensions; malware scan.
  4. Kill impersonation: report fake profiles; preserve evidence.
  5. Document + report to cybercrime portals.
  6. Reduce future exposure: remove broker data, enable monitoring.

ClearTrace can help with steps 4–6: faster takedowns + monitoring.

Verification playbook (before you trust)

For creators & public figures

ClearTrace can help

Start a free exposure check or see plans & pricing.