if( $wpvs_add_head_tracking) { }
Finstream.TVFinstream.TV
  • Articles
  • AI Apps
    • AI Wealth Planner
    • Financial IQ Test
    • IRMAA Appeal Assistant
    • Medicare Annual Notice of Change Assistant
    • Retirement Reality Check
  • Videos
  • Contact Us
  • About
  • Articles
  • AI Apps
    • AI Wealth Planner
    • Financial IQ Test
    • IRMAA Appeal Assistant
    • Medicare Annual Notice of Change Assistant
    • Retirement Reality Check
  • Videos
  • Contact Us
  • About
Searching videos
work_together_stock

Digital Pump and Dump: How Scammers Target Retirees on Social Media

By John O’Connell

Investors and retirees face sophisticated threats that combine social engineering with technology on social media. One of the most persistent schemes targeting unsuspecting investors is the “pump and dump” scam, which has found new life on messaging platforms like WhatsApp. This article examines how these schemes work, and the techniques cybercriminals use to execute them.

Understanding Pump and Dump Schemes

A pump and dump scheme is a form of securities fraud where cybercriminals artificially inflate the price of an owned stock through false and misleading positive statements, then sell their shares at the inflated price before the inevitable market correction occurs. These schemes typically target microcap stocks, penny stocks and cryptocurrencies that have low liquidity and limited information available to investors.

The mechanics of a pump and dump operation follow a predictable pattern:

  1. Accumulation: Cybercriminals quietly acquire a substantial position in a low-priced, thinly-traded stock.
  2. Promotion: They create buzz around the stock using misleading claims about potential breakthroughs, contracts or acquisitions that don’t exist or are grossly exaggerated.
  3. Price inflation: As unsuspecting investors purchase shares based on false information, increased demand drives the price up artificially.
  4. Dumping: Once the price has risen sufficiently, the cybercriminals sell their shares at the inflated price.
  5. Collapse: Without the artificial support, the stock price plummets, leaving legitimate investors with significant losses.

The traditional pump and dump relied on cold calling or newsletter promotions. Today’s digital version uses social media platforms, messaging apps and impersonation tactics to reach potential victims while creating a false sense of legitimacy.

Digital Identity Theft: Harvesting Financial Advisers’ Information

Cybercriminals begin by identifying targets who possess credibility in the financial sector. Licensed financial advisers make ideal candidates because they have professional credentials and established trust with investors.

The information gathering process is surprisingly straightforward:

  1. Financial firm websites: Most financial advisory firms prominently display their advisers’ profiles, including professional headshots, biographical information and credentials. These pages are designed to build client trust but inadvertently provide cybercriminals with valuable source material.
  2. Regulatory databases: Financial advisers’ credentials can be verified through public databases like FINRA’s BrokerCheck or the SEC’s Investment Adviser Public Disclosure website, which contain detailed professional backgrounds.
  3. Social media research: Professional platforms like LinkedIn, provide additional details about an adviser’s career history, education and professional accomplishments.
  4. Data aggregation: Cybercriminals may cross-reference information from multiple sources to create comprehensive profiles.
  5. Reverse image search protection failure: Many adviser’s professional headshots lack digital watermarks or other protections that would prevent their unauthorized use.

Cybercriminals select advisers who have established reputations, especially those with substantial client bases or those who specialize in the types of investments the fraudsters plan to promote. By impersonating known, trusted professionals, scammers greatly increase their chance of success.

 

Creating Convincing WhatsApp Impersonations

With the target’s information secured, cybercriminals create convincing WhatsApp profiles that appear legitimate even to cautious observers:

  1. Profile creation: Setting up a WhatsApp account requires only a phone number, which cybercriminals obtain using prepaid phones or VoIP services that provide temporary numbers, making them difficult to trace.
  2. Profile picture: The stolen professional headshot is added as the WhatsApp profile picture, creating immediate visual legitimacy.
  3. Status and bio: Cybercriminals add professional descriptions matching the adviser’s actual credentials and specialties, often copied directly from firm websites or LinkedIn profiles.
  4. Building credibility: Before pitching investments, scammers establish rapport by sharing general market analysis or publicly available information about mainstream stocks, creating an impression of expertise.
  5. Contact lists: Victims may be identified through data breaches, public forums or social engineering, allowing cybercriminals to target people who might be interested in investment opportunities.
  6. Group dynamics: Creating investment discussion groups provides social proof, as potential victims see others (often fake accounts) appearing to engage with and trust the impersonated adviser.

Once the groundwork is laid, the cybercriminal sends messages about “exclusive opportunities” in penny stocks, often framing them as limited time offers to create urgency. They may claim to have insider information or special insight into upcoming developments that will cause the stock to skyrocket.

Protecting Yourself from Digital Pump and Dump Schemes

Investors and retirees can protect themselves by verifying advisers through official channels before engaging in investment discussions. Legitimate financial advisers typically communicate through regulated, official channels rather than WhatsApp or similar platforms.

Remember that genuinely lucrative investment opportunities rarely come through unsolicited messages, and claims of guaranteed returns or pressure to act quickly are classic red flags of fraud.

Financial advisers should monitor their online presence and consider using digital watermarks on professional photos. Firms should implement verification procedures that allow clients to confirm communications are authentic.

By understanding how these schemes operate in the digital realm, investors can better protect themselves from becoming victims of these increasingly sophisticated financial frauds.

About the author: John O’Connell

John O’Connell is founder and CEO of The Oasis Group, a leading consultancy for the wealth management industry that specializes in helping wealth management and technology firms solve their most complex challenges. The Oasis Group offers award-winning consulting services, industry-leading research, and compelling on-demand training for wealth management firms and the service providers who serve the wealth management industry. The firm’s newest online training courses serve as a leading source of education for financial professionals at all levels in their careers.

Tags: Financial Security For Retirees Retirement Retirement Planning Scam Scammers

Leave A Reply Cancel reply

Your email address will not be published. Required fields are marked *

Financial Expert Videos

  • Is a ChatGPT-written Will legal?

    Is a ChatGPT-written Will legal?

  • New Medicare Drug Data Reveals Costs & New Protections

    New Medicare Drug Data Reveals Costs & New Protections

  • Is North Carolina Tax-Friendly for Retirees?

    Is North Carolina Tax-Friendly for Retirees?

  • Financial Advisor Center
  • Benefits Of Working With A Financial Advisor
  • Advertise with FinStream

Video Categories

  • Popular on YouTube
  • Original Series
  • Life Events
  • Tax Planning Center
  • Financial Planning Center
  • Financial Advisor Center

Featured Financial Experts

  • Jacqueline Schadeck, CFP®, AWMA®
  • Professor Mike Milligan
  • Becca Craig, ABA®, CFP®
  • CJ Miller, CFP®, RMA®
  • Haley Ellis CFP® CPFA®
  • Jeffrey Levine, CPA/PFS, CFP®
  • Dana Anspach, CFP®, RMA®
  • Jae W. Oh, MBA, CFP®, CLU®, ChFC®
  • Tony Davidow
  • Massi De Santis
  • Doug Buchan, CFP®
  • Kurt Wunderlich, CFA, CFP®
  • Lee Baker, CFP®
  • Home
  • Videos
  • Podcast
  • Subscribe
  • News
  • Glossary
  • Privacy
  • Terms
  • Contact Us
  • About
Revoke consent

© finStream.tv 2025

NO INVESTMENT ADVICE OR OTHERWISE

THE CONTENT IS FOR ENTERTAINMENT AND INFORMATIONAL PURPOSES ONLY, YOU SHOULD NOT CONSTRUE ANY SUCH INFORMATION OR OTHER MATERIAL AS LEGAL, TAX, INVESTMENT, FINANCIAL, OR OTHER ADVICE. NOTHING CONTAINED ON OUR SITE OR OUR PRESENTATIONS CONSTITUTES A SOLICITATION, RECOMMENDATION, ENDORSEMENT, OR OFFER BY FINSTREAM INC (“FINSTREAM") OR ANY THIRD PARTY SERVICE PROVIDER TO BUY OR SELL ANY SECURITIES OR OTHER FINANCIAL INSTRUMENTS IN THIS OR IN ANY OTHER JURISDICTION IN WHICH SUCH SOLICITATION OR OFFER WOULD BE UNLAWFUL UNDER THE SECURITIES LAWS OF SUCH JURISDICTION.

ALL CONTENT ON THIS SITE IS INFORMATION OF A GENERAL NATURE AND DOES NOT ADDRESS THE CIRCUMSTANCES OF ANY PARTICULAR INDIVIDUAL OR ENTITY. NOTHING ON THE SITE CONSTITUTES PROFESSIONAL AND/OR FINANCIAL ADVICE, NOR DOES ANY INFORMATION ON THE SITE CONSTITUTE A COMPREHENSIVE OR COMPLETE STATEMENT OF THE MATTERS DISCUSSED OR THE LAW RELATING THERETO. FINSTREAM IS NOT A FIDUCIARY BY VIRTUE OF ANY PERSON'S USE OF OR ACCESS TO THE SITE OR CONTENT. YOU ALONE ASSUME THE SOLE RESPONSIBILITY OF EVALUATING THE MERITS AND RISKS ASSOCIATED WITH THE USE OF ANY INFORMATION OR OTHER CONTENT ON THE SITE BEFORE MAKING ANY DECISIONS BASED ON SUCH INFORMATION OR OTHER CONTENT. IN EXCHANGE FOR USING THE SITE, YOU AGREE NOT TO HOLD FINSTREAM, ITS AFFILIATES OR ANY THIRD PARTY SERVICE PROVIDER LIABLE FOR ANY POSSIBLE CLAIM FOR DAMAGES ARISING FROM ANY DECISION YOU MAKE BASED ON INFORMATION OR OTHER CONTENT MADE AVAILABLE TO YOU THROUGH THE SITE.

ALL OPINIONS EXPRESSED BY ANY INDIVIDUAL ON THIS SITE AND ON ANY SHOW OR VIDEO STREAM ARE SOLELY THE INDIVIDUAL PERSON’S OPINIONS AND DO NOT REFLECT THE OPINIONS OF FINSTREAM INC OR AFFILIATES AND MAY HAVE BEEN PREVIOUSLY DISSEMINATED BY FINSTREAM INC ON TELEVISION, RADIO OR THE INTERNET

INVESTMENT RISKS

THERE ARE RISKS ASSOCIATED WITH INVESTING IN SECURITIES. INVESTING IN STOCKS, BONDS, EXCHANGE TRADED FUNDS, MUTUAL FUNDS, AND MONEY MARKET FUNDS INVOLVE RISK OF LOSS. LOSS OF PRINCIPAL IS POSSIBLE. SOME HIGH RISK INVESTMENTS MAY USE LEVERAGE, WHICH WILL ACCENTUATE GAINS & LOSSES. FOREIGN INVESTING INVOLVES SPECIAL RISKS, INCLUDING A GREATER VOLATILITY AND POLITICAL, ECONOMIC AND CURRENCY RISKS AND DIFFERENCES IN ACCOUNTING METHODS. A SECURITY’S OR A FIRM’S PAST INVESTMENT PERFORMANCE IS NOT A GUARANTEE OR PREDICTOR OF FUTURE INVESTMENT PERFORMANCE.

Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}