Scam

Financial

A fraudulent scheme designed to trick people into giving money, personal information, or access to their accounts. Scammers impersonate legitimate organizations or create false opportunities.

"An email claiming you've won a prize you never entered, asking you to click a li..."

Advance Fee Fraud

Financial

A scam where victims are promised money, a loan, or a prize in exchange for paying an upfront fee. The promised money never materializes.

"A message claiming you've inherited $5 million from a distant relative, but you ..."

Lottery Scam

Financial

Fraudsters claim you've won a lottery or sweepstakes you never entered, asking for personal information or payment to claim your 'prize'.

"A text message saying 'Congratulations! You've won $50,000 in the National Lotte..."

Investment Scam

Financial

Fraudsters promise unrealistic returns on investments (crypto, forex, stocks) to lure victims into sending money that is stolen.

"A social media ad promising '500% returns on Bitcoin investments with guaranteed..."

Phishing

Security

Fraudulent emails, texts, or websites designed to steal login credentials, financial information, or personal data by impersonating trusted organizations.

"An email appearing to be from your bank asking you to 'verify your account' by c..."

Spear Phishing

Security

Targeted phishing attacks personalized with victim's name, company, or other details to appear more legitimate and increase success rates.

"An email from 'your boss' asking you to urgently wire money to a client, using y..."

Whaling

Security

Spear phishing attacks specifically targeting high-level executives or business decision-makers to access sensitive company information or funds.

"A CEO receives an email from what appears to be the board chairman requesting im..."

Identity Theft

Identity

Stealing someone's personal information to impersonate them, usually for financial gain. This can include opening accounts, making purchases, or taking out loans in their name.

"A criminal using your Social Security Number and personal details to open credit..."

Credential Stuffing

Identity

Using leaked username and password combinations from one data breach to gain unauthorized access to other accounts. Attackers automate this process across many sites.

"Hackers using passwords stolen from a retail data breach to try logging into peo..."

SIM Swap Scam

Identity

Attackers convince mobile carriers to transfer a victim's phone number to a new SIM card, allowing them to intercept two-factor authentication codes and take over accounts.

"A scammer calls your phone provider pretending to be you, gets your number trans..."

Romance Scam

Social

Scammers build fake romantic relationships online to gain trust and eventually ask for money, gifts, or personal information.

"Someone you met online claims to be stranded abroad and asks you to wire money f..."

Catfishing

Social

Creating a fake online identity to deceive someone into a relationship or to gather personal information for malicious purposes.

"Someone uses fake photos and a fabricated life story to build a relationship wit..."

Pretexting

Social

Creating a fabricated scenario or false pretext to trick someone into revealing confidential information or performing actions they normally wouldn't.

"Someone calls claiming to be from IT support and asks for your password to 'fix ..."

Baiting

Social

Leaving physical items (USB drives, CDs) or digital content (free downloads) in public places that contain malware or tracking software.

"A USB drive labeled 'Salary Information 2026' left in a parking lot that install..."

Quid Pro Quo

Social

Offering a service or benefit in exchange for information or access. Scammers pose as IT support or other service providers.

"A caller claims to be from Microsoft and offers to fix your computer for free, t..."

Malware

Technical

Malicious software designed to damage, disable, or gain unauthorized access to a computer or network.

"A download that appears to be a legitimate software update but actually installs..."

Ransomware

Technical

Malware that encrypts a victim's files and demands payment for the decryption key. Attackers threaten to delete or publish data if payment isn't made.

"Your computer gets locked with a message demanding $500 in Bitcoin to unlock it...."

Trojan

Technical

Malware disguised as legitimate software that tricks users into installing it, then performs unauthorized actions on the system.

"A fake antivirus program that appears to scan your computer but actually steals ..."

Keylogger

Technical

Software or hardware that records keyboard inputs to capture passwords, credit card numbers, and other sensitive information.

"Malware installed on your computer that records every keystroke you make, includ..."

Man-in-the-Middle Attack

Technical

An attacker intercepts communication between two parties to eavesdrop or alter messages without either party knowing.

"A hacker on public WiFi intercepts your login credentials when you access your e..."

Job Scam

Employment

Fake job postings or employment offers designed to collect personal information, money, or to conduct identity theft.

"A job posting offering high pay for minimal work, asking you to wire money for '..."

Gig Economy Scam

Employment

Fraudulent gig work opportunities that require upfront payment or personal information before offering non-existent jobs.

"A fake Uber or DoorDash opportunity asking you to pay $100 for 'background check..."

Rental Scam

Property

Scammers pose as landlords or property managers, collecting deposits and rent from multiple tenants for properties they don't own.

"A rental listing with suspiciously low prices, asking for a deposit via wire tra..."

Puppy/Pet Scam

Property

Fraudsters post fake pet listings online and collect payments from buyers who never receive the animal.

"A cute puppy listing with a low price, asking for payment upfront but never deli..."

Ticket Scam

Entertainment

Selling fake or non-existent tickets to events, concerts, or shows at inflated prices.

"A reseller offering concert tickets at a great price, but the tickets are counte..."

Charity Scam

Donation

Fake charities or fraudulent fundraisers that collect donations for non-existent causes or personal gain.

"A text after a natural disaster asking for donations to a relief fund that doesn..."

Tech Support Scam

Technical

Scammers pose as tech support and convince users their computer has problems, then charge for fake repairs or install malware.

"A pop-up claiming your computer is infected and asking you to call a number for ..."

Refund Scam

Financial

Scammers pose as tax authorities or retailers offering refunds, then ask for personal information or payment to process the refund.

"An email claiming you're owed a tax refund and asking you to click a link to ver..."

Overpayment Scam

Financial

A buyer sends more money than required and asks the seller to wire back the difference, but the initial payment is fraudulent.

"Someone buying your used item sends a check for more than the asking price and a..."

Wire Fraud

Financial

Using electronic communication to fraudulently obtain money or property by deception.

"A fake invoice from a supplier asking to update payment information to a new acc..."

Check Fraud

Financial

Using fraudulent checks to steal money from bank accounts or to purchase goods without payment.

"Someone deposits a fake check into your account and asks you to wire them part o..."

Cryptocurrency Scam

Financial

Fraudulent schemes involving cryptocurrency, including fake exchanges, pump-and-dump schemes, and rug pulls.

"A social media post promoting a new cryptocurrency that promises huge returns, b..."

SMS Phishing (Smishing)

Security

Phishing attacks conducted via text messages, often with links to fake websites or requests for personal information.

"A text from your 'bank' saying your account is locked and asking you to click a ..."

Voice Phishing (Vishing)

Security

Phishing attacks conducted via phone calls, where scammers impersonate trusted organizations to extract sensitive information.

"A call claiming to be from the IRS threatening legal action unless you pay immed..."

Deepfake Scam

Technical

Using AI-generated audio or video to impersonate someone for fraud, blackmail, or misinformation.

"A video of a CEO appearing to authorize a wire transfer, but it's a deepfake cre..."

Typosquatting

Security

Registering domains that are slight misspellings of popular websites to trick users who mistype URLs or click deceptive links. Characters are swapped (0 for O, I for l) or letters are added/removed.

"A phishing email with a link to 'amaz0n.com' (zero instead of O) or 'paypaI.com'..."

Domain Spoofing

Security

Creating fake websites or email addresses that closely mimic legitimate domains to deceive victims. This includes using brand names in subdomains (e.g., apple.secure-login.xyz) or registering similar-looking domains.

"An email from '[email protected]' that looks official but is ..."

Lookalike Domain

Security

A domain registered to look nearly identical to a legitimate one, using character substitutions, extra characters, or different TLDs. ScamCheck detects these using Levenshtein distance analysis and character substitution patterns.

"'0ffice.com' (zero instead of O), 'g00gle.com' (zeros instead of O's), or 'dropb..."

Key Takeaways

Never click links or download files from unknown sources. Verify sender identity through official channels.

Legitimate companies never ask for passwords or sensitive info via email or text. If in doubt, contact them directly using a number from their official website.

Use strong, unique passwords and enable two-factor authentication to protect your accounts from credential-based attacks.

Keep your software and devices updated to patch security vulnerabilities that attackers exploit.

Need Help?

Report fraud and scams to your local authorities: