Protecting Yourself from Deepfake Catfishing
By Rohan Kapoor
Cybersecurity Consultant · CISSP, CEH, M.Tech (IIT Delhi)
In December 2025, a 34-year-old engineer in Bengaluru transferred 18 lakh rupees to a woman he had been dating online for four months. He had video called her twice. He had spoken to her on the phone several times. He believed he was talking to a real person because he could see her face moving and hear her voice responding to his questions.
He was talking to a deepfake. The investigation later traced the operation to a syndicate running automated romance scams using real-time face-swap software and voice cloning. The "woman" did not exist. The voice was synthesized from a few seconds of stolen audio. The face was mapped onto a male operator's actual movements.
This is no longer an emerging threat. It is the threat. The romance scam playbook has fundamentally shifted in the last twelve months because the tools required to fake a convincing video call have collapsed in cost from professional film studios to consumer hardware. NCRB's most recent cybercrime report flagged a 280% increase in deepfake-related fraud cases between 2023 and 2025, with romance scams as the largest single category.
This guide is the briefing I have been giving every friend who asks about dating safety in 2026. The old advice ("just video call them") is no longer enough on its own. The new advice is more nuanced, but it still works.
What Deepfake Catfishing Actually Looks Like
A traditional catfish was someone who used stolen photos and refused video calls. They were defeated, most of the time, by the simple test of asking for live video. The deepfake catfish is the next generation. They will video call you. They will respond in real time. They will look human enough to fool a casual observer.
There are three layers of deepfake technology currently in active use:
Static AI-generated photos. Tools like StyleGAN and its successors can produce a photorealistic face that has never existed. These are now used as profile pictures in many scam operations. A reverse image search will return zero results because the photo is genuinely unique.
Pre-recorded deepfake video clips. The scammer takes a real video of someone (often a model or actor) and swaps the face. They send these as "voice notes" or "moments" to build trust before the live call. The clips look convincing because they were assembled offline with no time pressure.
Real-time face swap on video calls. This is the newest and most dangerous layer. Open-source software like DeepFaceLive, combined with consumer GPUs, lets a scammer map a fake face onto their own face in real time during a video call. The fake face responds to the scammer's actual expressions, eye movements, and head turns.
Three years ago, real-time deepfakes required a rendering farm and a researcher with a PhD. Today, a determined operator with a 1.5 lakh rupee gaming PC can run them. That cost will drop further in the next two years.
Why the Old "Just Video Call" Advice Is Not Enough
For about a decade, the gold standard of catfish defense was: ask for a video call, watch for excuses, walk away if they refuse. That advice still works most of the time because most romance scammers are still using stolen photos and dodging video. But it has a hole now. A scammer with deepfake tooling will agree to the video call. They will appear on screen. They will respond to your voice.
You need a layered approach. No single test is sufficient anymore. The good news is that the tests still work, you just need to apply more than one.
Test One: The Unexpected Movement
Real-time deepfake software has a specific weakness. It is trained on faces from the front. The moment a face turns sharply to the side, tilts back, or moves out of the camera's expected zone, the software glitches.
Ask the person on the video call to do something unscripted:
- "Can you turn your head all the way to the left and then all the way to the right?"
- "Can you tilt your head back and look at the ceiling?"
- "Can you put your hand in front of your face and then move it away?"
- "Can you stand up and step back from the camera?"
Watch carefully. A real person does these effortlessly. A deepfake will exhibit one or more telltale signs: a face that does not quite track the head movement, a hand that briefly merges with the face, a moment of pixelation around the jawline, an eye that lags behind the other.
Eva Galperin from the EFF has emphasized in recent talks that the most effective deepfake tests are the ones that the attacker did not plan for. Pre-rehearsed challenges (like asking the person to wave) are now defeated by some commercial deepfake tools. The unplanned challenges still work.
Test Two: The Object Test
Ask the person to pick up a specific object near them and hold it in front of their face for a few seconds.
"Can you grab a pen and hold it up next to your cheek?" "Do you have a mug nearby? Can you hold it up to the camera?" "Can you show me the back of your phone for a second?"
Real-time face swap struggles with objects intersecting the face. The software has to decide whether the object is part of the face or in front of it, and the answer it produces is often visibly wrong. You will see the object briefly clip through the face, or the face will warp around it.
This test has an additional benefit: it is hard for the scammer to refuse without sounding suspicious. The request is friendly and casual, not interrogative.
Test Three: The Voice Test
Voice cloning is now easier than face swapping. Tools can produce a convincing voice clone from as little as fifteen seconds of source audio. So testing the voice alone is unreliable.
But voice plus context is still useful. Ask the person something that requires a personalized, unscripted response:
- "What was the last meal you ate?"
- "What can you see out the window right now?"
- "What is the weather like there?"
A real person answers easily. A scammer running a voice clone often pauses unnaturally because the clone is being generated on the fly from typed input. You will hear a noticeable lag, sometimes two or three seconds, before each response. Real conversational latency is closer to half a second.
You can also ask them to read a specific sentence you make up on the spot. "Can you say 'the orange umbrella is on the rooftop' for me?" The unfamiliar sentence forces the voice clone to handle words it may not have been trained on, which often produces audible artifacts.
Deepfakes are terrifying when your face is already on a swipe feed — one user explains why she chose differently:
Test Four: The Reverse Image Search That Still Works
AI-generated faces defeat traditional reverse image search because they have no original to find. But there is a workaround. Tools like FotoForensics, AI Image Detector, and Hugging Face's deepfake detection models can analyze a static image and estimate whether it was generated by AI.
These tools are not perfect, especially against the latest models, but they catch a high percentage of what is currently in use. As of early 2026, AI Image Detector flags around 78% of StyleGAN-generated faces correctly. It flags around 65% of newer diffusion model faces. Both numbers are good enough to use as a screening filter.
The workflow:
- Save the profile photo
- Upload to one of the detection tools
- If it returns a high AI-likelihood score, treat the profile as suspicious
- If it returns a low score, the photo might still be stolen from a real person, so do a regular reverse image search on Yandex and Google
Combining both checks gives you decent coverage against both old-school catfishing and AI-generated catfishing.
Test Five: The Cross-Platform Reality Check
A deepfake catfish typically operates within a single channel. They created their fake identity for a dating app and they live there. They do not have a fully built-out social media presence going back years.
Ask for their Instagram or LinkedIn. Look for:
- Posts dating back more than a year
- Photos with other people who tag them by their real name
- Comments from real people that reference shared experiences
- Activity that is consistent over time, not bursts of new posts in the last few weeks
A real person has a messy, inconsistent, multi-year digital footprint with other real people in it. A deepfake catfish has either no social media or a clean, recently-created profile with no genuine interaction history.
You can also use Google Images to search for specific photos from the social media account. If they exist on multiple unrelated profiles, the photos are stolen.
What to Do If You Suspect a Deepfake
If your tests are turning up red flags, here is the protocol:
Step one: Stop sharing personal information immediately. No more details about your job, your location, your family, your finances. Treat the conversation as compromised.
Step two: Do not confront them. A scammer who realizes they have been caught will simply disappear and target someone else. Worse, they may use the personal information you have already shared as leverage. Just go quiet.
Step three: Gather evidence. Screenshot your conversations, save any photos or videos they sent, note the timestamps. You will need this if you report.
Step four: Report to the platform and to law enforcement. In India, file at cybercrime.gov.in and call 1930. Submit screenshots and any payment details if money was transferred. The Indian Cyber Crime Coordination Centre has a deepfake reporting workflow specifically for romance scams as of mid-2025.
Step five: Block and unmatch. Cut the contact entirely. Do not check back. Do not respond to messages from new accounts that might be the same scammer trying again.
Step six: If money was sent, contact your bank within 24 hours. Indian banks are required to flag and attempt reversal on cybercrime-linked transfers if reported within 24-72 hours. UPI fraud reversals through this window have improved significantly under the RBI's 2024 fraud framework.
How Privacy-First Apps Reduce This Risk
The deepfake catfish needs a target who is willing to invest emotional and financial trust in someone they have never met physically. Dating app design that delays photo sharing and emphasizes text-based connection makes this harder, because the scammer cannot use the photo as the initial hook.
Hidnn is one of the apps in this category. The reveal-when-ready model means you build initial connection through text and voice before any visual exchange. By the time photos and video enter the picture, you already have an impression of the person's communication patterns, vocabulary, humor, and consistency. A deepfake operator using a voice clone and a visual mask is harder to maintain over hours of organic text conversation than over a single video call. The longer the runway of text, the more cracks appear.
This is not a guarantee. A patient scammer can still operate in a text-first environment. But the structure raises the cost and time investment for the attacker, which reduces the volume of attempts.
FAQs
Q: How common are real-time deepfake romance scams in India right now? A: They are still a minority of romance scams (most are still text-based scams using stolen photos), but they are growing fast. NCRB data shows a 280% jump in deepfake-related fraud cases over the past two years. Treat them as a serious risk, not a hypothetical one.
Q: Can I tell a deepfake video by just looking carefully? A: Sometimes. Watch for unnatural blinking, mismatched lighting between the face and the room, edges of the face that warp during head turns, and teeth that look slightly wrong. But the best detection comes from making the person do unexpected things on camera, not from passive observation.
Q: Are there apps that detect deepfakes automatically? A: A few exist (Truepic, Reality Defender) but they are mostly aimed at media and journalism, not consumer dating. None of the major dating apps currently scan for deepfakes at scale, though this may change as regulatory pressure increases.
Q: What if I already trust someone and feel weird asking them to do these tests? A: Frame it as fun or curiosity, not interrogation. "I read this article about deepfakes and I want to try a thing, can you do this for me?" A real person will usually find it amusing and play along. A scammer will get defensive.
Q: Is it safe to do voice calls instead of video calls to avoid the deepfake issue? A: No. Voice cloning is easier to do than face swapping. A voice-only call gives you fewer signals to work with, not more. Insist on video, and apply the tests above.
The Hard Truth and the Practical Path Forward
Deepfake catfishing is real and getting more sophisticated. The technology will continue to improve. The cost will continue to drop. Within a few years, even the unexpected-movement tests may become defeatable by the most advanced tools.
But we are not there yet. As of 2026, the layered approach in this guide still works against the overwhelming majority of deepfake operations. The tools exist to defend yourself. The tests are not difficult or technical. They take a few minutes and they tell you what you need to know.
The other half of the answer is structural. Choose dating environments that do not require you to make trust decisions on photo or video alone. Build text-based relationships first. Move slowly enough that any deepfake operation has to either invest enormous time or give up. Most give up, because the economics of the scam depend on volume.
You are not powerless against this. You just need to know which tests to run, and to run them before the conversation moves anywhere expensive. Your identity, your verification, your rules.