Cybercriminals impersonating religious institutions and leaders for financial gains
an exploration of popular pentecostal ministries
DOI:
https://doi.org/10.36096/ijbes.v7i4.876Keywords:
Cybercrime, Religious Institutions, Pentecostal Churches, Impersonation, Digital Security, Fraud Prevention, Identity Theft, Phishing, Online Scams, Religious LeadershipAbstract
The growing number of cybercriminals impersonating religious leaders and institutions for financial gain poses a serious threat to the integrity and economic security of religious groups, notably prominent Pentecostal ministries. This study thoroughly investigates and evaluates this phenomenon, focusing on cybercriminals' tactics, the scope of their actions, and the consequences for targeted religious communities and people. The study applies a complete desktop research technique to analyse hackers' use of religious leaders' identities for financial benefit, focusing on Pentecostal ministries. This strategy includes searching academic databases, reading cybersecurity and religious studies journals, and analysing documented cases. The findings show that cybercriminals are primarily driven by financial gain and use strategies including building phoney social media pages, phishing techniques, and compromising communication lines to impersonate religious groups and scam congregants. This study contributes to developing more effective defences against cyber fraud in religious contexts by evaluating religious institutions' responses and mitigation techniques, as well as law enforcement. This project intends to develop more effective techniques for preventing and combating cyber-fraud against religious bodies through an in-depth examination.
Downloads
References
AAG IT Support. (2025, June). The latest cybercrime statistics. https://aag-it.com/the-latest-cyber-crime-statistics
Adjin-Tettey, T. D., & Kwofie, J. (2024). Digital sanctuary: Exploring security and privacy concerns of congregants in the virtual church. Atlantic Journal of Communication, 1-16. https://doi.org/10.1080/15456870.2024.2308503 DOI: https://doi.org/10.1080/15456870.2024.2397965
Alkhouri, K. I. (2024). The role of artificial intelligence in the study of the psychology of religion. Religions, 15(3), 290. https://doi.org/10.3390/rel15030290 DOI: https://doi.org/10.3390/rel15030290
Allen, B. O. B. (2008, October 1). Counsellor: Digital age poses pastoral challenges to church. Baptist News Global. https://baptistnews.com/article/counsellor-digital-age-poses-pastoral-challenges-to-church/
Amankwah-Amoah, J., Khan, Z., Wood, G., & Knight, G. (2021). COVID-19 and digitalization: The great acceleration. Journal of Business Research, 136, 602-611. https://doi.org/10.1016/j.jbusres.2021.08.011 DOI: https://doi.org/10.1016/j.jbusres.2021.08.011
Amoabeng, S. (2022). An investigation of mobile money fraud in the Kasoa township [Unpublished doctoral dissertation]. University of Education, Winneba.
BDO. (2025, February 19). The crucial role of cybersecurity for nonprofit organizations in 2025. https://www.bdo.com/insights/industries/nonprofit-education/the-crucial-role-of-cybersecurity-for-nonprofit-organizations-in-2025
Borges, E. (2024). Cyber criminals: Tactics, impacts and defense strategies. Wiley.
Carr, R., Riggs, D., & Ingram, T. (2023). Cybercrime and religious institutions: A wake-up call for the faithful. CRI. https://www.criadv.com/insight/cybercrime-and-religious-institutions-a-wake-up-call-for-the-faithful
Charity First. (2024). Looking ahead: 3 cybersecurity risks that could impact your nonprofit clients in 2024. https://www.charityfirst.com/blog/looking-ahead-3-cybersecurity-risks-that-could-impact-your-nonprofit-clients-in-2024
Chatterjee, B. B. (2001). Last of the rainmacs? Thinking about pornography in cyberspace. In Crime and the Internet (pp. 74-99). Routledge. DOI: https://doi.org/10.4324/9780203164501_chapter_6
Chua, N. M. B., Jadji, S. A. J. S., Julhajiri, F. A. N. S., Majinji, D. J. S. A., Matuz, L. A. Q., Miro, A. N. T., ... & Tan, D. K. E. R. (2024, November). The impact of Zamboanga City’s poor road conditions on the academic performance of Level III nursing students of AdZU [Conference presentation]. Joint Conference and Symposium on Health, Zamboanga City, Philippines.
Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M., & Baskerville, R. (2013). Future directions for behavioral information security research. Computers & Security, 32, 90-101. https://doi.org/10.1016/j.cose.2012.09.010 DOI: https://doi.org/10.1016/j.cose.2012.09.010
CrowdStrike. (2024). 4 reasons why nonprofits are targets of cyberattacks. https://www.crowdstrike.com/en-us/blog/reasons-why-nonprofits-are-targets-of-cyberattacks/
CyberPeace Institute. (2024, March 26). Cyber-poor, target-rich: The crucial role of cybersecurity in nonprofit organizations. https://cyberpeaceinstitute.org/news/cyber-poor-target-rich-the-crucial-role-of-cybersecurity-in-nonprofit-organizations
El-Rewini, Z., Sadatsharan, K., Sugunaraj, N., Selvaraj, D. F., Plathottam, S. J., & Ranganathan, P. (2020). Cybersecurity attacks in vehicular sensors. IEEE Sensors Journal, 20(22), 13752-13767. https://doi.org/10.1109/JSEN.2020.3006272 DOI: https://doi.org/10.1109/JSEN.2020.3004275
Graham, A. (2023). Cybercrime: Traditional problems and modern solutions [Doctoral dissertation, Open Access Te Herenga Waka-Victoria University of Wellington]. https://openaccess.wgtn.ac.nz/articles/thesis/Cybercrime_Traditional_Problems_and_Modern_Solutions/24785895
Hobbs, J. (2020). What is modern AI and why it shouldn’t be called AI at all. Science Technology and Society a Student Led Exploration.
Jaishankar, K. (2008). Space transition theory of cyber crimes. In F. Schmalleger & M. Pittaro (Eds.), Crimes of the Internet (pp. 283-301). Prentice Hall.
Jaishankar, S. (2020). The India way: Strategies for an uncertain world. HarperCollins India.
Johnson, M. E., Goetz, E., & Pfleeger, S. L. (2009). Security through information risk management. IEEE Security & Privacy, 7(3), 45-52. https://doi.org/10.1109/MSP.2009.68 DOI: https://doi.org/10.1109/MSP.2009.77
Kim, K., Kim, J. S., Jeong, S., Park, J. H., & Kim, H. K. (2021). Cybersecurity for autonomous vehicles: Review of attacks and defense. Computers & Security, 103, 102150. https://doi.org/10.1016/j.cose.2021.102150 DOI: https://doi.org/10.1016/j.cose.2020.102150
Krombholz, K., Hobel, H., Huber, M., & Weippl, E. (2015). Advanced social engineering attacks. Journal of Information Security and Applications, 22, 113-122. https://doi.org/10.1016/j.jisa.2014.09.005 DOI: https://doi.org/10.1016/j.jisa.2014.09.005
Magezi, V. (2015). Technologically changing African context and usage of Information Communication and Technology in churches: Towards discerning emerging identities in church practice (a case study of two Zimbabwean cities). HTS Teologiese Studies / Theological Studies, 71(2), 1-8. https://doi.org/10.4102/hts.v71i2.2830 DOI: https://doi.org/10.4102/hts.v71i2.2625
Masmoudi, S. (2025). Unveiling the human factor in cybercrime and cybersecurity: Motivations, behaviors, vulnerabilities, mitigation strategies, and research methods. In Cybercrime Unveiled: Technologies for Analysing Legal Complexity (pp. 41-91). Springer Nature Switzerland. DOI: https://doi.org/10.1007/978-3-031-80557-8_3
Ochyra-?urawska, K., Klonowska, I., Wyr?bek, H., Br??kiewicz, D., & Christowa, C. (2024). Human resource management in non-governmental organizations and their security. European Research Studies Journal, 27(3), 1231-1241. https://doi.org/10.35808/ersj/3910 DOI: https://doi.org/10.35808/ersj/3832
OSIbeyond. (2024, August 12). Why non-profits and associations are targets for cyber attacks. https://www.osibeyond.com/blog/why-non-profits-and-associations-are-targets-for-cyber-attacks
Perera, V. (2025). The effectiveness of tech support fraud in damaging older individual’s financial security.
Saini, H., Rao, Y. S., & Panda, T. C. (2012). Cyber-crimes and their impacts: A review. International Journal of Engineering Research and Applications, 2(2), 202-209.
Singh, B., & Kaunert, C. (2025). Intelligent machine learning solutions for cybersecurity: Legal and ethical considerations in a global context. In Advancements in Intelligent Process Automation (pp. 359-386). IGI Global. DOI: https://doi.org/10.4018/979-8-3693-5380-6.ch014
Tade, O. (2013). A spiritual dimension to cybercrime in Nigeria: The ‘yahoo plus’ phenomenon. Human Affairs, 23(4), 689-705. https://doi.org/10.2478/s13374-013-0144-x DOI: https://doi.org/10.2478/s13374-013-0158-9
Tandana, E. A. (2022). Amid the threat of cybercrime. QUAERENS: Journal of Theology and Christianity Studies, 4(2), 129-147. https://doi.org/10.46362/quaerens.v4i2.61 DOI: https://doi.org/10.46362/quaerens.v4i2.214
Wang, J., Li, Y., & Rao, H. R. (2016). Overconfidence in phishing email detection. Journal of the Association for Information Systems, 17(11), 759-783. https://doi.org/10.17705/1jais.00441 DOI: https://doi.org/10.17705/1jais.00442
Webster, P. (2020). Virtual health care in the era of COVID-19. The Lancet, 395(10231), 1180-1181. https://doi.org/10.1016/S0140-6736(20)30863-7 DOI: https://doi.org/10.1016/S0140-6736(20)30818-7
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Rendani Tshifhumulo, Ndidzulafhi Mudau

This work is licensed under a Creative Commons Attribution 4.0 International License.
© 2025 retained by the authors. Licensee BSC International Academy, Istanbul, Turkey. This article is an open-access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).