Skip to main content

Common Scams and Terms

  • Business Opportunities

    People trying to build a business of their own will often be met with a list of requirements and paperwork. Scammers may operate online services that purport to offer business plans, grant applications and more for a low fee. The fee will not only give the scammer cash, but also your payment information. In turn, these services may never be completed or will be low quality.

  • Celebrity Messages

    Scammers can take advantage of making it look like celebrities or influencers use a "private" social media account for close friends. Fake accounts can be easily created, with the scammer reaching out to their "fans" to develop a friendship, romance, or provide unique access to their lives. This may seem appealing, but requests for money or information may be common in these cases.

  • Cheap Policies

    Targets for this scam will be invited to purchase extremely low-cost insurance policies or extended warranties on their vehicle. Urgency to decide and very few details should raise red flags with these policies. These offers may not always be valid and may not provide any actual protection when needed.

  • Cryptocurrency Fraud

    Cryptocurrency is a digital currency exchanged via networked computers. Cryptocurrency is not regulated or insured. Scammers may use deceitful tactics to convince targets to invest, promising easy money. They may develop fraudulent apps, manipulate existing apps, build fake websites, and manufacture data to make these currencies appear safe and profitable.

  • Debt Relief Scam

    Fraudulent companies may request an upfront fee in order to assist in debt relief. Fake legal documents could be created and provided to the target for use and to present to their lenders in order to resolve or reduce debts. These documents are not legal and will not remove or reduce the debt.

  • Delivery Preferences

    In this case, a text message is sent from an unknown number informing you of a package having delivery issues. This message would include a link to where the target can update delivery preferences, or pay a fee. Instead, these links lead to a fake website intended to take your information and/or money.

  • Distress Call

    Scammers may call someone in an attempt to convince the target they are a family member in distress and are in need of immediate money to solve a problem. The urgency of their emergency is intended to elicit quick reactions. You should hang up and contact the family member directly to determine if the call is real. 

  • Facebook Marketplace

    When selling items on Facebook, a buyer often asks to pay via common payment apps. If the buyer is a scammer, during the process they may claim to have an issue and will request a code sent to your device. Do not give this information, as this may give them access to your account. A good rule of thumb is to keep communication within Facebook, and not provide your cell phone number or codes.

  • Fake Charities

    Fake charities may become more prevalent during times of crisis in order to take advantage of the generosity of others. Scammers may email, text, or call to request the target donate to their fictional charity. By relying on their targets to donate during these times of need, the scammer gains payment details in addition to the donation. Research any charity before donating.

  • Financial Tip Scams

    Scammers may offer to help with managing finances or navigating financial investments through a subscription or with low-cost upfront fees. By using AI, fake websites, and get-rich-quick opportunities, these scams seem valid and place the choice to invest on the target. This type of scam is reported less, due to people blaming themselves for their loss instead of the scammer.

  • Gift Card Scams

    Consumers looking to purchase gift cards at a retail store may find the card they just purchased empty when going to use it. In this scam, scammers may take card numbers or tamper with the cards themselves and reseal the package. When funds are placed on the card at purchase, the scammer can retrieve the funds before the fraudulent card can be discovered.

  • Identity Theft

    Scammers may gain access to personal and financial information such as Social Security Number, Date of Birth, and/or banking details. This information may be used to access any existing accounts, open new accounts, claim tax refunds, initiate loans, and make large purchases under your name. This can impact your credit and your financial stability.

  • IRS Scams

    Targets may receive a message from someone claiming to be from the IRS, requesting payment for a debt or fine owed. The message may also be a notification that you qualify for a large rebate. All of these tactics will attempt to gain access to your banking details to process your fee/debt/refund. The IRS does not send unsolicited emails or text messages.

  • Mystery Shopper Scam

    Targets may be selected to be a mystery shopper and provided a check to do so, which is ultimately fraudulent. The check is asked to be used for mystery shopping and is their payment for the job. As part of the mystery shopping, the shopper may be asked to buy gift cards and provide the codes as proof the mystery shopping was done. The check eventually will bounce, leaving the target without the funds, without the gift cards, and on the hook for the cost of them. 

  • Online Contests

    Scammers may create fake profiles on social media to pose as well-known brands. These profiles may promote contests where you could win prizes, by providing  financial details or a registration fee. They may also falsely claim you have won a prize that is being offered by a legitimate page, by commenting that you should message them for details.

  • Payment App Scam

    Scammers may attempt to gain access to payment apps via a text message or email asking about a transaction or pending funds. By replying to them through their message instead of any official customer service options, the scammer may offer assistance in recovering funds or removing the "issue" (which is probably a scam). This may provide them access to your account or the ability to create an account.

  • Refund Scams

    During any scam that requires a refund or payment to be sent to the target electronically or via check, scammers may claim to have accidently refunded too much money, and unable to reverse the transaction. Instead they may ask for repayment in the form of gift cards that you purchase and provide them the details of the card.

  • Remote Work Scams

    Fake listings for remote work opportunities entice targets searching for real employment. These "jobs" allow scammers to access personal information and may eventually require payment for a "permit fee" or "payment access fee". Additional spending or bank account access may even be requested.

  • Romance Scams

    Intended targets may be approached by the scammer in a casual manner, usually via social media message or text message. These messages may be used to develop a relationship over a period of time. Requests for money, access to personal or financial information, or opportunities for investment may even be suggested.

  • Tech Support Scams

    In one of the more common scams, the target is contacted by a scammer claiming to be from a well-known technology company. They may explain that there is an issue with the target's computer and offer to assist — for a fee of course — by remotely connecting to their computer. This allows them access to accounts,  payment details, and more.

  • Verify Transactions

    Scammers may initiate contact via phone or text message, claiming to be the target's financial institution, and state that a large purchase has been made on their account. In reality, there is no purchase and the scammer is relying on the target's moment of panic to gather personal and account details for their own use.

Common Terms & Definitions

Often times when you are learning more about scams, terms will be used that might be unfamiliar to you. To reduce confusion when expanding your knowledge, First Northern Credit Union has compiled a list of commonly used terms used in educational articles. Understanding all of these terms is not required to detect or prevent fraud. These are simply being listed to provide additional context or details. 

These terms are listed in order of commonality. The more common the usage, the higher they are on the listing below.

  • Browser - The program utilized to visit the internet.
    • (Firefox, Chrome, Safari, Microsoft Edge, Opera)
  • URL - The website address that is used to visit a website
  • https:// - the beginning of a website address (URL) that identifies if the website is secure. the S at the end means SECURE
  • Phishing - scams distributed via Email
  • Smishing - scams distributed via SMS / Text Messages
  • Vishing - scams that are received via voice / Phone Call
  • Spam - unsolicited email - an email that you did not sign up to receive
  • Spoofing - using technology in order to present a fake phone number or email address when reaching out to consumers in an attempt to appear as a valid business or government agency
  • Malware - fraudulent software that is installed onto a computer and intended to disrupt, damage, or gain access to data
  • Spyware - fraudulent software that are installed and run in the background gaining information about use and/or passwords
  • Ransomware - fraudulent software that is installed onto your device/computer under false pretenses. this program will lock-up files or an entire system and request a payment in order to unlock the files or device. threats may mention file deletion if unpaid.
  • Virus - coding that attacks vital systems on your device/computer that will prevent normal use of your computer, often hidden within fraudulent websites or software
  • Robocall - a software program dials numbers in a list automatically, without prior permission from the recipient of the call
    • It is illegal for telemarketers to use this technology for sales purposes
  • Wire-transfer - a method of payment that is exchanged via two different money transfer organizations (Western Union). Money is accepted from one location and the second location confirms the receipt of funds and distributes the same amount at that second location.
  • Social Engineering - using social media to collect personal details in order to create more believable scams
  • Command Prompt - the default command-line interpreter. This piece of software can easily be misused by scammers to fake running code to find viruses.
  • Notepad - a default program that allows typing without any formatting. This is also often used by scammers to fake transactions or system commands on your computer.
  • AI - Artificial Intelligence - An advanced technology that can be used to enhance scam development and execution in order to be more believable/effectie
  • Voice AI - Use of Artificial Intelligence where technology uses samples of a voice in order to build a "print" of a voice which can be used to say anything
  • BBB - Better Business Bureau - A private organization that provides the public with information on businesses and charities. It can also handle consumer complaints, but resolutions are not always to the benefit of the consumer. 
  • FCC - Federal Communications Commission - A government organization that regulates interstate and international communications through cable, radio, television, satellite, and wire
  • FTC - Federal Trade Commission - A government organization that enforces anti-trust and consumer protection laws
  • Finsta - "Fake Instagram" - Scammers may pose as celebrities on social media accounts in order to contact potential fans to request money, sell access, or gain information. Scammers will claim this is the celebrities 'private account' or their 'finsta' to reduce suspicion.
  • Remote Work - working from a different location than where the company originates.
  • Cryptocurrency - a digital currency that is exchanged via computer networks. it is not regulated or protected.
  • Photoshop - advanced graphic and design software that can be used to alter images digitally
  • Scam Baiting - recognizing a scammer and keeping them on the phone for as long as possible, in order to reduce the chance of that scammer calling someone else during that time
  • File Extension - the 3 letter abbreviation found at the end of a file name. this identifies the type of file and how it can be used
    • .zip - a file extension that is often used to store multiple files into one file that is easy to download. viruses and malicous software can be hidden within these files
    • .exe - a file extension that is used with executable files. these can install software or run a program. some computer settings will require permission to install this type of file
  • Coding - the language that a program is written in and that a device/computer will understand in order to run the program
  • HTML - the coding that is used to build a website. it contributes to the colors, layout, and all details of how the site appears
  • Inspect Element - a tool within a browser that shows the html and coding of a website. this can be used to alter the appearance of a website, without needing administrative access to that site.