Financial
A fraudulent scheme designed to trick people into giving money, personal information, or access to their accounts. Scammers impersonate legitimate organizations or create false opportunities.
"An email claiming you've won a prize you never entered, asking you to click a li..."
Financial
A scam where victims are promised money, a loan, or a prize in exchange for paying an upfront fee. The promised money never materializes.
"A message claiming you've inherited $5 million from a distant relative, but you ..."
Financial
Fraudsters claim you've won a lottery or sweepstakes you never entered, asking for personal information or payment to claim your 'prize'.
"A text message saying 'Congratulations! You've won $50,000 in the National Lotte..."
Financial
Fraudsters promise unrealistic returns on investments (crypto, forex, stocks) to lure victims into sending money that is stolen.
"A social media ad promising '500% returns on Bitcoin investments with guaranteed..."
Security
Fraudulent emails, texts, or websites designed to steal login credentials, financial information, or personal data by impersonating trusted organizations.
"An email appearing to be from your bank asking you to 'verify your account' by c..."
Security
Targeted phishing attacks personalized with victim's name, company, or other details to appear more legitimate and increase success rates.
"An email from 'your boss' asking you to urgently wire money to a client, using y..."
Security
Spear phishing attacks specifically targeting high-level executives or business decision-makers to access sensitive company information or funds.
"A CEO receives an email from what appears to be the board chairman requesting im..."
Identity
Stealing someone's personal information to impersonate them, usually for financial gain. This can include opening accounts, making purchases, or taking out loans in their name.
"A criminal using your Social Security Number and personal details to open credit..."
Identity
Using leaked username and password combinations from one data breach to gain unauthorized access to other accounts. Attackers automate this process across many sites.
"Hackers using passwords stolen from a retail data breach to try logging into peo..."
Identity
Attackers convince mobile carriers to transfer a victim's phone number to a new SIM card, allowing them to intercept two-factor authentication codes and take over accounts.
"A scammer calls your phone provider pretending to be you, gets your number trans..."
Social
Scammers build fake romantic relationships online to gain trust and eventually ask for money, gifts, or personal information.
"Someone you met online claims to be stranded abroad and asks you to wire money f..."
Social
Creating a fake online identity to deceive someone into a relationship or to gather personal information for malicious purposes.
"Someone uses fake photos and a fabricated life story to build a relationship wit..."
Social
Creating a fabricated scenario or false pretext to trick someone into revealing confidential information or performing actions they normally wouldn't.
"Someone calls claiming to be from IT support and asks for your password to 'fix ..."
Social
Leaving physical items (USB drives, CDs) or digital content (free downloads) in public places that contain malware or tracking software.
"A USB drive labeled 'Salary Information 2026' left in a parking lot that install..."
Social
Offering a service or benefit in exchange for information or access. Scammers pose as IT support or other service providers.
"A caller claims to be from Microsoft and offers to fix your computer for free, t..."
Technical
Malicious software designed to damage, disable, or gain unauthorized access to a computer or network.
"A download that appears to be a legitimate software update but actually installs..."
Technical
Malware that encrypts a victim's files and demands payment for the decryption key. Attackers threaten to delete or publish data if payment isn't made.
"Your computer gets locked with a message demanding $500 in Bitcoin to unlock it...."
Technical
Malware disguised as legitimate software that tricks users into installing it, then performs unauthorized actions on the system.
"A fake antivirus program that appears to scan your computer but actually steals ..."
Technical
Software or hardware that records keyboard inputs to capture passwords, credit card numbers, and other sensitive information.
"Malware installed on your computer that records every keystroke you make, includ..."
Technical
An attacker intercepts communication between two parties to eavesdrop or alter messages without either party knowing.
"A hacker on public WiFi intercepts your login credentials when you access your e..."
Employment
Fake job postings or employment offers designed to collect personal information, money, or to conduct identity theft.
"A job posting offering high pay for minimal work, asking you to wire money for '..."
Employment
Fraudulent gig work opportunities that require upfront payment or personal information before offering non-existent jobs.
"A fake Uber or DoorDash opportunity asking you to pay $100 for 'background check..."
Property
Scammers pose as landlords or property managers, collecting deposits and rent from multiple tenants for properties they don't own.
"A rental listing with suspiciously low prices, asking for a deposit via wire tra..."
Property
Fraudsters post fake pet listings online and collect payments from buyers who never receive the animal.
"A cute puppy listing with a low price, asking for payment upfront but never deli..."
Entertainment
Selling fake or non-existent tickets to events, concerts, or shows at inflated prices.
"A reseller offering concert tickets at a great price, but the tickets are counte..."
Donation
Fake charities or fraudulent fundraisers that collect donations for non-existent causes or personal gain.
"A text after a natural disaster asking for donations to a relief fund that doesn..."
Technical
Scammers pose as tech support and convince users their computer has problems, then charge for fake repairs or install malware.
"A pop-up claiming your computer is infected and asking you to call a number for ..."
Financial
Scammers pose as tax authorities or retailers offering refunds, then ask for personal information or payment to process the refund.
"An email claiming you're owed a tax refund and asking you to click a link to ver..."
Financial
A buyer sends more money than required and asks the seller to wire back the difference, but the initial payment is fraudulent.
"Someone buying your used item sends a check for more than the asking price and a..."
Financial
Using electronic communication to fraudulently obtain money or property by deception.
"A fake invoice from a supplier asking to update payment information to a new acc..."
Financial
Using fraudulent checks to steal money from bank accounts or to purchase goods without payment.
"Someone deposits a fake check into your account and asks you to wire them part o..."
Financial
Fraudulent schemes involving cryptocurrency, including fake exchanges, pump-and-dump schemes, and rug pulls.
"A social media post promoting a new cryptocurrency that promises huge returns, b..."
Security
Phishing attacks conducted via text messages, often with links to fake websites or requests for personal information.
"A text from your 'bank' saying your account is locked and asking you to click a ..."
Security
Phishing attacks conducted via phone calls, where scammers impersonate trusted organizations to extract sensitive information.
"A call claiming to be from the IRS threatening legal action unless you pay immed..."
Technical
Using AI-generated audio or video to impersonate someone for fraud, blackmail, or misinformation.
"A video of a CEO appearing to authorize a wire transfer, but it's a deepfake cre..."
Security
Registering domains that are slight misspellings of popular websites to trick users who mistype URLs or click deceptive links. Characters are swapped (0 for O, I for l) or letters are added/removed.
"A phishing email with a link to 'amaz0n.com' (zero instead of O) or 'paypaI.com'..."
Security
Creating fake websites or email addresses that closely mimic legitimate domains to deceive victims. This includes using brand names in subdomains (e.g., apple.secure-login.xyz) or registering similar-looking domains.
"An email from '[email protected]' that looks official but is ..."
Security
A domain registered to look nearly identical to a legitimate one, using character substitutions, extra characters, or different TLDs. ScamCheck detects these using Levenshtein distance analysis and character substitution patterns.
"'0ffice.com' (zero instead of O), 'g00gle.com' (zeros instead of O's), or 'dropb..."
Never click links or download files from unknown sources. Verify sender identity through official channels.
Legitimate companies never ask for passwords or sensitive info via email or text. If in doubt, contact them directly using a number from their official website.
Use strong, unique passwords and enable two-factor authentication to protect your accounts from credential-based attacks.
Keep your software and devices updated to patch security vulnerabilities that attackers exploit.
Report fraud and scams to your local authorities: