Different Types of Scams and How They Work

Different Types of Scams and How They Work

All scams are designed to get your personal and financial information and account credentials. Below is a list of scamming schemes used by scammers to trick their potentials into sending them money and personal information. The scammers also use fake emails with links to phishing or fake websites that steal account credentials.

Account Confirmation/Service Scams

Telephone call, email message, or text message from what seems to be a legitimate company asking for the recipient to provide their personal or account information to address an issue concerning their account (“we suspect an unauthorized transaction”, “your debit card has been deactivated, to reactivate…”, “we are conducting our regular account verification process”, etc.). The recipient is asked to provide the information directly over the phone, or in the case of email and text, directed to a fraudulent website or customer service number.

Check Cashing Scams

A request from a fraudster for the recipient to deposit a check for the sender and wire them the proceeds. In exchange for their effort, the recipient is told to keep a portion of the check. Inevitably, the check will be returned as counterfeit and the recipient will be liable for the full amount of the check.

Sweetheart Scams

Also known as a romance scam, this is a scam most notably used on online dating sites on which a fraudster develops a romantic relationship with their victim. Eventually, the fraudster requests money or personal information.

Work-at-Home Scams

In this scenario the victim will respond to a work-at-home employment offer. Most of the offers will take the form of an invoice or payroll processing position that only requires an active bank account. The fraudster will move funds into the victim’s account with instructions to wire portions of those funds to pay “vendors”. An alternate version has the fraudster requesting that the victim wire funds to cover onboarding and training costs for the new position.

Tech Support Scams

Someone will present themselves to the victim as technical support for a well-known software or hardware vendor and will convince the victim to provide access to their computer, to unknowingly install malicious software or to provide credit card information for payment. A variation of this scam involves the victim receiving a pop-up message alerting the victim to a virus and asking them to install free security scanning software to remove the virus, again resulting in the victim installing malicious software on their computer.

Check the comment section below for additional information, share what you know, or ask a question about this article by leaving a comment below. And, to quickly find answers to your questions, use our search Search engine.

Note: Some of the information in samples on this website may have been impersonated or spoofed.

Was this article helpful?  +
Share this with others:
Donate
Comments, Questions, Answers, or Reviews
There are no comments as yet, please leave one below or revisit.

To protect your privacy, please remove sensitive or identifiable information from your comments, questions, or reviews. We will use your IP address to display your approximate location to other users when you make a post. That location is not enough to find you.

Your post will be set as anonymous because you are not signed in. An anonymous post cannot be edited or deleted, therefore, review it carefully before posting. Sign-in.

Write Your Comment, Question, Answer, or Review

Different Types of Scams and How They Work