Toolkit Module 2: Scam Tactics and Impacts

Stay Vigilant to Avoid Scams

Paying attention to tactics used by criminals to commit fraud can be challenging, especially when one is under emotional pressure to make a quick decision. However, advance awareness of scam tactics can help individuals and businesses avoid the detrimental consequences of scams, such as financial losses and the associated emotional toll.

A common tactic for criminals is to use scams as an entry point to commit other types of payments fraud, such as check fraud and account takeovers. To improve the success of their tactics, criminals use technology to make their communications appear to be more credible and increase the scale of their scam activities. Understanding the technology and various tactics being used to propagate scams may help people pause to question unsolicited messages and offers.

Technology to Perpetrate Scams

Criminals exploit technology to improve the credibility, scope and automation of scams. For example, digital communications enhance phishing (fraudulent emails) and “social engineering” techniques commonly used to deceive, manipulate or influence the victim to provide sensitive information, send money or change device security settings. Malware (malicious software) provides access to accounts, devices and sensitive data, while generative artificial intelligence (AI) is used to create look-alike websites, online platforms and apps to engage victims, and to impersonate voices and videos. In addition, virtual private networks (VPNs) and botnets (networks of hijacked computer devices) provide anonymity and scale to criminals.

Know Criminals’ Scam Tactics:

  • Use urgency and pressure to force action
  • Impersonate legitimate people, businesses or government agencies for credibility
  • Use “too good to be true” offers to entice victims
  • Employ fear and threats to manipulate victims
  • Request money or sensitive information
  • Build trust and relationships to gain personal information
  • Copy legitimate websites and links to deceive victims
  • Request confidentiality to avoid exposing the scams
Different fraud types and how they are used.

Scams are Used to Commit Other Fraud Types

  • Account takeover
  • Identity fraud, including synthetic identity fraud (use of a combination of personally identifiable information to fabricate a person or entity in order to commit a dishonest act for personal or financial gain)
  • Check fraud
  • Money mules and money laundering

Increased knowledge of scams — how they work and the potential impacts — can help individuals and businesses identify scams and take steps to avoid them.

Test Your Knowledge: Can You Spot the Scam?

Individuals and businesses can prevent falling victim to scams if they look for various red flags — but some warning signs are more obvious than others. Test your ability to detect scams by reviewing three scenarios.

The scams mitigation toolkit was developed by the Federal Reserve to help educate the industry about scams and outline potential ways to help detect and mitigate this fraud type. Insights for this toolkit were provided through interviews with industry experts, publicly available research, and team member expertise. This toolkit is not intended to result in any regulatory or reporting requirements, imply any liabilities for fraud loss, or confer any legal status, legal definitions, or legal rights or responsibilities. While use of this toolkit throughout the industry is encouraged, utilization of the toolkit is voluntary at the discretion of each individual entity. Absent written consent, this toolkit may not be used in a manner that suggests the Federal Reserve endorses a third-party product or service.