Cyber Crimes
Scams
Prevention and Protection
Fraud Types
Other
100

In this type of scheme, the fraudster sends an email that appears to be from a legitimate source, such as a business or financial institution, asking the recipient to update or verify their personal information by replying to the email or visiting a fake website that the scammer has designed to look real.

Phishing

100

A type of fraud that is likely to occur after wildfires, tornados, hurricanes, and other emergencies.

Disaster

100

What you should do if you suspect an email is a phishing email.

Report it

100

A type of fraud in which the scammer sends fake letters asking for money now in exchange for something of value later. Some examples include notices of prizes, sweepstakes winnings, vacations, etc.

Mail Fraud

100

This type of fraud happens more frequently during the holiday season and after high-profile catastrophes. Scammers pretend to be legitimate organizations, or even create fake ones, to seek donations. They do little or no work and instead keep the money for themselves.

Charity

200

Software used to steal sensitive information.

Malware

200

A type of confidence scam where criminals pose as a relative – usually a child or grandchild – claiming to be in immediate financial need.

Grandparent

200

These scams work because fraudsters create convincing fake versions of these that can be difficult to distinguish from the real thing, even for financial institution employees. Fraudsters might also order real ones using information belonging to someone whose identity has been stolen.

Check Fraud

300

A form of digital payment that generally exists only
electronically and is increasingly favored by scammers and fraudsters.

CryptoCurrency

300

In this type of scam, the scammer creates a fake online identity to gain a victim's affection and trust. The scammer uses the illusion of a close relationship to manipulate and/or steal from the victim.

Romance

300

Fraudulent activity on a card issued by the bank. You are able to dispute these charges.

Debit and credit card fraud

400

Term used to describe the act of disguising an email address, sender name, phone number, or website URL to convince potential victims that they are interacting with a trusted source.

Spoofing

400

Term used to describe the act of capturing data and/or recording cardholders' PINs using a device illegally installed on ATMs, point-of-sale (POS) terminals, or fuel pumps.

Skimming

400

A fraudster electronically transfers money to themselves by masking their identity as the customer and receiving the funds without the bank knowing.

Wire Transfer Fraud

500

By encrypting these files and demanding a ransom payment for the decryption key, cyberattackers place organizations in a position where paying the ransom is the easiest and cheapest way to regain access to their files

Ransomware Attack

500

These types of scams promise a guaranteed return at low or no risk. The scammer may claim to have a "proven" system to ensure success. They may even provide testimonials from "real" people (paid actors) who have used the system and gotten rich.

Investment

500

Any kind of deceitful action designed to gain a financial advantage during the process of obtaining a sum of money to be paid back at another time.

Loan Fraud

M
e
n
u