Skip to main content

Scammer-Facing False Positives: When Hackers Mess Up

Scammer-Facing False Positives: When Hackers Mess Up

Beau Friedlander

September 17, 2025

Reading time: 5 minutes

Every click, every search, every post leaves a trace. Every week on “What the Hack” we explore what to do about that. 

This week’s episode features Academy Award-winning filmmaker Dan Sturman and an imperfect storm of mistaken identity, amateurish social engineering, and the real-world effects of your data being out there for anyone to grab.

This story begins with two people named Dan Sturman—one with enemies, one without–and it ends with the wrong Dan Sturman being targeted by hackers. It’s a classic false positive, where an online result seems to match a person but is actually a misidentification. In the world of personal data removal, we see it all the time.

What’s In an Email Address?

Dan Sturman’s story is a cautionary tale about digital visibility. He’s a guy who, thanks to a very sweet early-adopter friend, scored his own name as an gmail address back in the mid aughts when the email service was still in beta mode, no numbers, just his name. And there’s something to the “I got here first” vibes of a one or two name handle–otherwise hackers wouldn’t spend so much time trying to hijack them

Well, that beautiful OG handle is exactly what put Dan Sturman in a hacker’s sites.

When hackers decided to go after the other Dan Sturman—the one with the big title at a well known gaming company, they did what any hacker does: They Googled him. But the Dan Sturman who popped up, with his OG public-facing, early-adopter email–the kind of email address you’d expect from a tech-savvy dude was the filmmaker. 

And then these bad actors (emphasis on bad, read: inept) fell for what I’m going to call a scammer-facing false positive. Hackers and marketing people can have a similar feel, which was the case here. The first calls and emails were from real people doing real jobs making real offers—jet charters, investment opportunities. But the wrong Dan Sturman even got a call about a sapphire necklace that was ready for pickup at Tiffany’s. 

Then the messages took a turn for the darker. There were spoofed calls from his own sister’s number and texts threatening to go after his family. And just like that, Dan Sturman the filmmaker was the unwitting stand-in for someone else’s enemies.

The Power of Social Engineering and Digital Obscurity

As our resident security guru DeleteMe Reuben Moretz explained, this is a classic case of attackers who were not very good at their “job” using a form of mimicry to build trust so they could then effectively strike their victim, which brings us to the most important part of the story.

While Dan the filmmaker was out in the open, the other Dan Sturman was a digital cipher. It’s impossible to find his email, his phone number, or his address. My experience (and presumably that of his would-be attackers) began to make more sense when Dan Sturman the filmmaker reached out to Dan Sturman the tech guy’s company: Three of their executives had been swatted, but the other Dan wasn’t a target of the threats. 

The reason: His personal information wasn’t online and as I heard the other Dan Sturman tell his story I had a not-so-sneaking suspicion this was no accident. Dan Sturman the Ghost was hard to find in a way that doesn’t happen by chance. It’s the product of a ton of vigilant work, or a subscription to an effective service

So what’s the takeaway here? Visibility has its costs, but so does obscurity. If you disappear completely, you can’t control your own story. But if you’re too visible, you become a potential stand-in, a false positive for someone else’s problems. The only real defense is to be aware. To watch your alerts, to trust your gut when a call seems off, and to remember that the most powerful tool you have sometimes is just knowing when not to click or to hang up or not pick up at all.

Stay safe out there, and let’s keep fighting the good fight.

Take Control

While it’s impossible to completely disappear from the internet, you can take steps to manage your digital footprint:

  • Audit your online presence: Search for your name on Google and other search engines to see what’s publicly available.
  • Adjust privacy settings: On social media and other accounts, review and tighten your privacy settings to limit who can see your information.
  • Use strong, unique passwords: A password manager can help you create and store complex passwords for all your accounts.
  • Be mindful of what you share: Before posting, consider if the information could be used against you.
  • Remove unwanted data: Services like DeleteMe specialize in removing your personal information from data brokers, helping you regain some control over your digital identity.

By understanding how your data is collected and used, you can make more informed decisions and protect yourself in the digital world.

SHARE THIS ARTICLE
Hundreds of companies collect and sell your private data online. DeleteMe removes it for you.

Our privacy advisors: 

  • Continuously find and remove your sensitive data online
  • Stop companies from selling your data – all year long
  • Have removed 35M+ records
    of personal data from the web
Special Offer

Save 10% on any individual and
family privacy plan
with code: BLOG10

Want more privacy
news?
Join Incognito, our monthly newsletter from DeleteMe that keeps you posted on all things privacy and security.

Icon mail and document

Don’t have the time?

DeleteMe is our premium privacy service that removes you from more than 750 data brokers like Whitepages, Spokeo, BeenVerified, plus many more.

Save 10% on DeleteMe when you use the code BLOG10.

Related Posts

Unmasking the “Privacy Paradox” with Vermont Attorney General Charity Clark

Ever feel like your life is an open book that you didn’t write? In a digital marketplace where “post-privacy” is marketed as the ne…
Beau Friedlander
September 9, 2025

Ep 215: They Targeted His Mom, He Went Full CIA

This week’s episode of “What the Hack?” explores the global rise of scams targeting older adults. Guest Ken Westbrook, a 33-year veteran of the CIA a…
Beau Friedlander
September 3, 2025

DEF CON Redux with Rachel Tobac! 

This Week on “What the Hack?” If You Have to Ask What a Penetration Test Is, You’re Probably Not Ready for One.   The simplest trick in a h…
Beau Friedlander
August 26, 2025