🛡️Loan Insurance Mailer Scam
If you receive this loan insurance scam in the mail, throw it away. Do not call the number. Farm Credit Illinois does not send notifications like this and we will NEVER ask for your social security number, passwords, or other sensitive information via postcard, email or over the phone.
🛡️Phishing is a cybercrime in which attackers deceive individuals into revealing sensitive information, such as passwords, credit card numbers, or other personal data. This is typically done by sending fraudulent emails or messages that appear to be from reputable companies or institutions. The goal is to trick the recipient into clicking on malicious links, downloading harmful attachments, or providing confidential information.
🛡️Smishing is a type of cybercrime that uses deceptive text messages to manipulate victims into divulging sensitive personal information. The term is a blend of "SMS" (Short Message Service) and "phishing." Just like phishing emails, smishing messages appear to come from reputable sources, such as banks, government agencies, or well-known companies, to trick individuals into revealing confidential information like passwords, credit card numbers, or other personal data.
🛡️Business Email Compromise (BEC) is a type of cybercrime where attackers gain unauthorized access to an employee's email account and use it to deceive others within the organization or external partners. This can involve sending fraudulent emails that appear to come from a trusted source, such as a company executive or a known vendor, to trick recipients into transferring money, revealing sensitive information, or performing other risky actions.
🛡️Adware: Adware is software that automatically displays or downloads advertising material (often unwanted) when a user is online. While some adware is harmless, it can also pose a real danger by including malware or redirecting user searches to malicious websites that collect personal data.
🛡️Malware stands for malicious software, which is an umbrella term covering any form of malicious code that alters the functionality of computers and smart devices. Attackers use many different types of malware for various purposes. Generally, malware can be used to spy on people, steal confidential information, encrypt data or lock systems, and corrupt computers and mobile devices.
🛡️Check Washing Criminals steal checks from mailboxes and use chemicals (like bleach or acetone) to erase ink, allowing them to rewrite the payee and amount. These altered checks are then fraudulently cashed or deposited.
🔗 U.S. Postal Inspection Service – Check Washing
🛡️Mobile Remote Deposit Capture (RDC) Fraud Fraudsters exploit mobile banking apps that allow users to deposit checks by taking photos. Scams include depositing fake or altered checks, or depositing the same check multiple times across different accounts.
🔗 FDIC – Risk Management of Remote Deposit Capture
🛡️Elder Fraud Scammers target older adults with schemes like romance scams, fake tech support, lottery fraud, and impersonation. Seniors are often chosen due to their financial stability and trusting nature.
🔗 FBI – Elder Fraud Overview
🔗 National Elder Fraud Hotline – DOJ
🛡️Account Takeover Cybercriminals gain unauthorized access to online accounts (banking, payroll, social media) using phishing, malware, or stolen credentials. Once inside, they can steal funds or personal data.
🔗 IC3 – Account Takeover Fraud
🛡️Tech Support Impersonation Scams Scammers pose as tech support agents from legitimate companies. They claim your device has issues and trick you into granting remote access or paying for fake services—often stealing sensitive data or money.
🔗 FBI – Tech Support Scams
🔗 FTC – How to Spot and Report Tech Support Scams
🛡️“You’ve Won” Prize Scams Victims receive messages claiming they’ve won a prize, but must pay fees or taxes upfront to claim it. These scams often ask for payment via gift cards, wire transfers, or cryptocurrency.
🛡️Grandkid / Family Scams A scammer pretends to be a grandchild in distress—needing bail money, medical help, or emergency funds. They often urge secrecy and request immediate payment, exploiting emotional vulnerability.
🔗 FTC – Grandkid and Family Scams
🔗 FCC – Grandparent Scams