Cybercriminals impersonating religious institutions and leaders for financial gains

an exploration of popular pentecostal ministries

Authors

DOI:

https://doi.org/10.36096/ijbes.v7i4.876

Keywords:

Cybercrime, Religious Institutions, Pentecostal Churches, Impersonation, Digital Security, Fraud Prevention, Identity Theft, Phishing, Online Scams, Religious Leadership

Abstract

The growing number of cybercriminals impersonating religious leaders and institutions for financial gain poses a serious threat to the integrity and economic security of religious groups, notably prominent Pentecostal ministries. This study thoroughly investigates and evaluates this phenomenon, focusing on cybercriminals' tactics, the scope of their actions, and the consequences for targeted religious communities and people. The study applies a complete desktop research technique to analyse hackers' use of religious leaders' identities for financial benefit, focusing on Pentecostal ministries. This strategy includes searching academic databases, reading cybersecurity and religious studies journals, and analysing documented cases. The findings show that cybercriminals are primarily driven by financial gain and use strategies including building phoney social media pages, phishing techniques, and compromising communication lines to impersonate religious groups and scam congregants. This study contributes to developing more effective defences against cyber fraud in religious contexts by evaluating religious institutions' responses and mitigation techniques, as well as law enforcement. This project intends to develop more effective techniques for preventing and combating cyber-fraud against religious bodies through an in-depth examination.

Downloads

Download data is not yet available.

References

AAG IT Support. (2025, June). The latest cybercrime statistics. https://aag-it.com/the-latest-cyber-crime-statistics

Adjin-Tettey, T. D., & Kwofie, J. (2024). Digital sanctuary: Exploring security and privacy concerns of congregants in the virtual church. Atlantic Journal of Communication, 1-16. https://doi.org/10.1080/15456870.2024.2308503 DOI: https://doi.org/10.1080/15456870.2024.2397965

Alkhouri, K. I. (2024). The role of artificial intelligence in the study of the psychology of religion. Religions, 15(3), 290. https://doi.org/10.3390/rel15030290 DOI: https://doi.org/10.3390/rel15030290

Allen, B. O. B. (2008, October 1). Counsellor: Digital age poses pastoral challenges to church. Baptist News Global. https://baptistnews.com/article/counsellor-digital-age-poses-pastoral-challenges-to-church/

Amankwah-Amoah, J., Khan, Z., Wood, G., & Knight, G. (2021). COVID-19 and digitalization: The great acceleration. Journal of Business Research, 136, 602-611. https://doi.org/10.1016/j.jbusres.2021.08.011 DOI: https://doi.org/10.1016/j.jbusres.2021.08.011

Amoabeng, S. (2022). An investigation of mobile money fraud in the Kasoa township [Unpublished doctoral dissertation]. University of Education, Winneba.

BDO. (2025, February 19). The crucial role of cybersecurity for nonprofit organizations in 2025. https://www.bdo.com/insights/industries/nonprofit-education/the-crucial-role-of-cybersecurity-for-nonprofit-organizations-in-2025

Borges, E. (2024). Cyber criminals: Tactics, impacts and defense strategies. Wiley.

Carr, R., Riggs, D., & Ingram, T. (2023). Cybercrime and religious institutions: A wake-up call for the faithful. CRI. https://www.criadv.com/insight/cybercrime-and-religious-institutions-a-wake-up-call-for-the-faithful

Charity First. (2024). Looking ahead: 3 cybersecurity risks that could impact your nonprofit clients in 2024. https://www.charityfirst.com/blog/looking-ahead-3-cybersecurity-risks-that-could-impact-your-nonprofit-clients-in-2024

Chatterjee, B. B. (2001). Last of the rainmacs? Thinking about pornography in cyberspace. In Crime and the Internet (pp. 74-99). Routledge. DOI: https://doi.org/10.4324/9780203164501_chapter_6

Chua, N. M. B., Jadji, S. A. J. S., Julhajiri, F. A. N. S., Majinji, D. J. S. A., Matuz, L. A. Q., Miro, A. N. T., ... & Tan, D. K. E. R. (2024, November). The impact of Zamboanga City’s poor road conditions on the academic performance of Level III nursing students of AdZU [Conference presentation]. Joint Conference and Symposium on Health, Zamboanga City, Philippines.

Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M., & Baskerville, R. (2013). Future directions for behavioral information security research. Computers & Security, 32, 90-101. https://doi.org/10.1016/j.cose.2012.09.010 DOI: https://doi.org/10.1016/j.cose.2012.09.010

CrowdStrike. (2024). 4 reasons why nonprofits are targets of cyberattacks. https://www.crowdstrike.com/en-us/blog/reasons-why-nonprofits-are-targets-of-cyberattacks/

CyberPeace Institute. (2024, March 26). Cyber-poor, target-rich: The crucial role of cybersecurity in nonprofit organizations. https://cyberpeaceinstitute.org/news/cyber-poor-target-rich-the-crucial-role-of-cybersecurity-in-nonprofit-organizations

El-Rewini, Z., Sadatsharan, K., Sugunaraj, N., Selvaraj, D. F., Plathottam, S. J., & Ranganathan, P. (2020). Cybersecurity attacks in vehicular sensors. IEEE Sensors Journal, 20(22), 13752-13767. https://doi.org/10.1109/JSEN.2020.3006272 DOI: https://doi.org/10.1109/JSEN.2020.3004275

Graham, A. (2023). Cybercrime: Traditional problems and modern solutions [Doctoral dissertation, Open Access Te Herenga Waka-Victoria University of Wellington]. https://openaccess.wgtn.ac.nz/articles/thesis/Cybercrime_Traditional_Problems_and_Modern_Solutions/24785895

Hobbs, J. (2020). What is modern AI and why it shouldn’t be called AI at all. Science Technology and Society a Student Led Exploration.

Jaishankar, K. (2008). Space transition theory of cyber crimes. In F. Schmalleger & M. Pittaro (Eds.), Crimes of the Internet (pp. 283-301). Prentice Hall.

Jaishankar, S. (2020). The India way: Strategies for an uncertain world. HarperCollins India.

Johnson, M. E., Goetz, E., & Pfleeger, S. L. (2009). Security through information risk management. IEEE Security & Privacy, 7(3), 45-52. https://doi.org/10.1109/MSP.2009.68 DOI: https://doi.org/10.1109/MSP.2009.77

Kim, K., Kim, J. S., Jeong, S., Park, J. H., & Kim, H. K. (2021). Cybersecurity for autonomous vehicles: Review of attacks and defense. Computers & Security, 103, 102150. https://doi.org/10.1016/j.cose.2021.102150 DOI: https://doi.org/10.1016/j.cose.2020.102150

Krombholz, K., Hobel, H., Huber, M., & Weippl, E. (2015). Advanced social engineering attacks. Journal of Information Security and Applications, 22, 113-122. https://doi.org/10.1016/j.jisa.2014.09.005 DOI: https://doi.org/10.1016/j.jisa.2014.09.005

Magezi, V. (2015). Technologically changing African context and usage of Information Communication and Technology in churches: Towards discerning emerging identities in church practice (a case study of two Zimbabwean cities). HTS Teologiese Studies / Theological Studies, 71(2), 1-8. https://doi.org/10.4102/hts.v71i2.2830 DOI: https://doi.org/10.4102/hts.v71i2.2625

Masmoudi, S. (2025). Unveiling the human factor in cybercrime and cybersecurity: Motivations, behaviors, vulnerabilities, mitigation strategies, and research methods. In Cybercrime Unveiled: Technologies for Analysing Legal Complexity (pp. 41-91). Springer Nature Switzerland. DOI: https://doi.org/10.1007/978-3-031-80557-8_3

Ochyra-?urawska, K., Klonowska, I., Wyr?bek, H., Br??kiewicz, D., & Christowa, C. (2024). Human resource management in non-governmental organizations and their security. European Research Studies Journal, 27(3), 1231-1241. https://doi.org/10.35808/ersj/3910 DOI: https://doi.org/10.35808/ersj/3832

OSIbeyond. (2024, August 12). Why non-profits and associations are targets for cyber attacks. https://www.osibeyond.com/blog/why-non-profits-and-associations-are-targets-for-cyber-attacks

Perera, V. (2025). The effectiveness of tech support fraud in damaging older individual’s financial security.

Saini, H., Rao, Y. S., & Panda, T. C. (2012). Cyber-crimes and their impacts: A review. International Journal of Engineering Research and Applications, 2(2), 202-209.

Singh, B., & Kaunert, C. (2025). Intelligent machine learning solutions for cybersecurity: Legal and ethical considerations in a global context. In Advancements in Intelligent Process Automation (pp. 359-386). IGI Global. DOI: https://doi.org/10.4018/979-8-3693-5380-6.ch014

Tade, O. (2013). A spiritual dimension to cybercrime in Nigeria: The ‘yahoo plus’ phenomenon. Human Affairs, 23(4), 689-705. https://doi.org/10.2478/s13374-013-0144-x DOI: https://doi.org/10.2478/s13374-013-0158-9

Tandana, E. A. (2022). Amid the threat of cybercrime. QUAERENS: Journal of Theology and Christianity Studies, 4(2), 129-147. https://doi.org/10.46362/quaerens.v4i2.61 DOI: https://doi.org/10.46362/quaerens.v4i2.214

Wang, J., Li, Y., & Rao, H. R. (2016). Overconfidence in phishing email detection. Journal of the Association for Information Systems, 17(11), 759-783. https://doi.org/10.17705/1jais.00441 DOI: https://doi.org/10.17705/1jais.00442

Webster, P. (2020). Virtual health care in the era of COVID-19. The Lancet, 395(10231), 1180-1181. https://doi.org/10.1016/S0140-6736(20)30863-7 DOI: https://doi.org/10.1016/S0140-6736(20)30818-7

Downloads

Published

2025-08-13

How to Cite

Tshifhumulo, R., & Mudau, N. (2025). Cybercriminals impersonating religious institutions and leaders for financial gains: an exploration of popular pentecostal ministries. International Journal of Business Ecosystem & Strategy (2687-2293), 7(4), 197–210. https://doi.org/10.36096/ijbes.v7i4.876

Issue

Section

Interdisciplinary Studies in Humanities and Social Sciences