Common scams are becoming increasingly sophisticated, and anyone can fall victim. Awareness is key to avoiding financial loss and protecting your personal information. In this comprehensive overview, we cover 100 scams to watch out for, how they work, and how they can impact you financially.
If you are interested in getting access to the latest scams and expert protection, please consider enrolling with ScamSave.
Table of Contents
List of 100 Common Scams
1. Phishing
Description: Phishing scams use deceptive emails, text messages, or fake websites that appear to come from banks, government agencies, or trusted companies to trick you into entering your login credentials, account numbers, or Social Security number. The messages often create a sense of urgency — warning you that your account has been compromised or that immediate action is required. Once you enter your information on a fake site, scammers capture it instantly and use it to access your real accounts. Phishing is the most common entry point for identity theft and financial fraud worldwide.
Financial Impact: Unauthorized access to your bank, email, or investment accounts can result in drained accounts, fraudulent loans opened in your name, and long-term credit damage that takes years to repair.
2. Spoofing
Description: Spoofing is the practice of disguising a communication — a phone call, email, or website — to make it appear as though it’s coming from a trusted source. Caller ID spoofing, for example, can make a scammer’s call look like it’s coming from your bank, the IRS, or even a family member’s phone number. Email spoofing makes fraudulent messages appear to come from legitimate domains. Because the source appears trustworthy, victims are far more likely to comply with requests before questioning them. Spoofing is almost always used in combination with other scams to increase their believability.
Financial Impact: Victims who act on spoofed communications can lose money through unauthorized transfers, fraudulent purchases, or by handing over credentials that give scammers direct account access.
3. Investment Scams
Description: Investment scams promise extraordinary returns — often guaranteed — with little or no risk. They take many forms: fake stock tips, fraudulent cryptocurrency platforms, Ponzi schemes, and unregistered securities offerings. Scammers often pose as licensed financial advisors or use professional-looking websites and fabricated track records to establish credibility. Victims are frequently shown fake account dashboards with growing balances to encourage continued investment, but the money is gone from the moment it’s transferred. These scams often target retirees and people with significant savings who are looking to grow their nest egg.
Financial Impact: Victims commonly lose their entire investment, which can range from thousands to hundreds of thousands of dollars. In some cases, scammers continue extracting money by charging “fees” to release supposedly locked funds.
4. Advance Fee Fraud
Description: Advance fee fraud — also called the “Nigerian Prince” scam or 419 fraud — involves convincing a victim that they are entitled to a large sum of money, but that a series of fees must be paid first to release it. The fees escalate over time, with each payment justified by a new complication or requirement. The promised windfall never arrives. These scams now appear in many forms: lottery winnings, inheritance claims, business deals, and even romantic relationships that eventually pivot to financial requests. The longer a victim engages, the more money they lose as they convince themselves each new fee will be the last.
Financial Impact: Victims lose all money paid in fees, which can accumulate to thousands or tens of thousands of dollars before the scam is recognized.
5. Lottery and Prize Scams
Description: You receive a message — by phone, email, mail, or text — congratulating you on winning a lottery, sweepstakes, or prize drawing you have no memory of entering. To claim your winnings, you’re asked to pay taxes, processing fees, or insurance costs upfront. Each payment is followed by a new requirement until the victim runs out of money or realizes the truth. Legitimate lotteries and sweepstakes never require winners to pay fees to receive their prize. These scams are particularly common targeting seniors, who may receive official-looking letters with realistic check imagery.
Financial Impact: All fees paid are lost immediately, with no prize ever delivered. Victims who share banking information to receive the “prize” may also face unauthorized withdrawals.
6. Tech Support Scams
Description: Tech support scams typically begin with an alarming pop-up on your computer warning that your device has been infected with a virus or has been locked. A phone number is displayed — often impersonating Microsoft, Apple, or a well-known antivirus company — and the caller claims to be a technician who can fix the problem remotely. Once you grant them remote access to your device, they may install actual malware, steal your files and credentials, and charge significant fees for fake repairs. Some victims are told their computer has been used for illegal activity and that a payment is required to avoid arrest. These calls and pop-ups are entirely fraudulent — real tech companies do not proactively contact customers about device issues.
Financial Impact: Victims pay for unnecessary services, have banking credentials and personal files stolen, and may face ongoing fraud from malware left on the device after the “repair.”
7. Online Dating Scams
Description: Online dating scams involve fraudsters creating convincing fake profiles on dating apps or social media to build romantic relationships with victims over days, weeks, or months. Once emotional attachment forms, the scammer introduces a crisis — a medical emergency, a business opportunity, a travel emergency — and asks for financial help. Each request is followed by another, and the relationship is maintained as long as the victim keeps sending money. With AI tools, scammers can now generate realistic profile photos, maintain consistent personas, and even conduct video calls using deepfake technology. These scams cause profound emotional harm in addition to financial loss.
Financial Impact: Individual losses frequently reach tens of thousands of dollars, with some victims losing their entire savings, retirement accounts, or home equity to someone they never met in person.
8. Rental Scams
Description: Scammers post fake rental listings on Craigslist, Facebook Marketplace, Zillow, or Airbnb — often copied from legitimate listings at below-market prices to attract attention quickly. When interested renters contact them, they request a security deposit or first month’s rent before the property can be viewed, claiming they’re out of town or that demand is high. The property either doesn’t exist, belongs to someone else entirely, or is legitimately listed elsewhere at a higher price. Victims who pay the deposit find the listing vanished and the scammer unreachable. These scams surge in competitive housing markets where desperate renters are more likely to move quickly without verifying.
Financial Impact: Victims lose their deposit — often one to two months’ rent — with no recourse and no place to live, sometimes having already given notice at their current home.
9. Charity Scams
Description: Fake charity scams surge in the wake of natural disasters, humanitarian crises, and high-profile tragedies. Scammers register names that closely mimic legitimate organizations, build convincing websites with stock imagery, and solicit donations through social media, email, and phone calls. The money collected goes directly to the scammer with nothing reaching the cause. They often pressure donors to give immediately — before there’s time to verify the organization. Even outside of disasters, fake charity scams operate year-round, particularly around holiday giving seasons.
Financial Impact: Donated funds are lost entirely, and if financial information was shared, donors may also face unauthorized future charges.
10. Credit Card Fraud
Description: Credit card fraud occurs when someone uses your card information — the number, expiration date, and CVV — to make unauthorized purchases or withdrawals. This information is stolen through phishing attacks, data breaches, card skimmers on ATMs or gas pumps, or by physical theft. Once stolen, card details are sold on dark web marketplaces and used quickly before the cardholder notices. Fraudulent charges can appear within hours of a data breach. Modern card skimmers are increasingly sophisticated and can be nearly invisible on physical terminals.
Financial Impact: Fraudulent transactions result in immediate financial loss, though credit card users have stronger legal protections than debit card users. Resolving disputes takes time and effort, and some victims experience credit score damage from associated identity theft activity.
11. Pyramid Schemes
Description: Pyramid schemes are fraudulent business models where participants earn money primarily by recruiting new participants rather than through any legitimate sale of products or services. Early participants may see returns funded by later recruits, which creates the illusion of a working investment. But because the model requires exponential growth to sustain payouts, it inevitably collapses — leaving the vast majority of participants with significant losses. They are often disguised as multi-level marketing businesses or investment cooperatives. Pyramid schemes are illegal in the United States and most countries.
Financial Impact: Most participants lose their initial investment entirely. Those who join late in the scheme — the majority — have virtually no chance of recovering their money.
12. Online Shopping Scams
Description: Scammers create convincing fake e-commerce websites or post fraudulent listings on legitimate marketplaces offering popular products at steep discounts. After payment is made, the item either never arrives, arrives as a cheap counterfeit, or the seller disappears entirely. These sites often mimic well-known retailers with near-identical branding and domain names. Some use social media ads to drive traffic to their sites, and reviews are fabricated to appear trustworthy. Scam shopping sites are particularly common around major sale events like Black Friday and the holiday season.
Financial Impact: Victims lose their purchase price and potentially their payment information if the site captures card details for future fraudulent use.
13. Business Email Compromise (BEC)
Description: Business Email Compromise is one of the most financially devastating fraud types targeting organizations. Scammers infiltrate or spoof a company’s email system and impersonate executives or vendors to request fraudulent wire transfers, changes to payment account information, or sensitive employee data like W-2 forms. The emails are convincing, often mimicking real communication styles and referencing actual business relationships. BEC attacks frequently target accounting departments, HR teams, and anyone with authority over financial transactions. These attacks cost U.S. businesses billions of dollars annually according to FBI data.
Financial Impact: Individual BEC incidents commonly result in losses of hundreds of thousands to millions of dollars, with wire transfers being nearly impossible to recover once executed.
14. Social Engineering
Description: Social engineering is the practice of manipulating people psychologically to divulge confidential information or take actions they otherwise wouldn’t. Rather than exploiting technical vulnerabilities, scammers exploit human trust, fear, urgency, and authority. A social engineer might impersonate an IT support technician asking for your login credentials to fix a problem, or a bank fraud specialist warning that your account is under threat. These attacks are carefully crafted after researching the target — gathering details from social media, company websites, and public records to make the interaction feel genuine. Social engineering is the foundation of most modern fraud schemes.
Financial Impact: Successful social engineering attacks can result in account takeovers, unauthorized fund transfers, theft of trade secrets, and identity fraud with wide-ranging financial consequences.
15. Fake Check Scams
Description: Fake check scams involve sending a victim a counterfeit check — often for more than the agreed amount — and asking them to deposit it and wire back the difference or send a portion as payment for something. Banks are required to make funds available within one to two days, so the check appears to clear initially. But checks can take weeks to be identified as fraudulent, and when they bounce, the victim is responsible for the full amount. These scams appear in many contexts: mystery shopping jobs, private vehicle sales, online marketplace transactions, and prize winnings. The counterfeit checks are often so realistic that bank tellers themselves don’t catch them immediately.
Financial Impact: Victims lose the amount they wired or sent before the check bounced, plus any bank fees. Because they deposited and spent funds from a fraudulent check, the bank holds them liable for the full amount.
16. Debt Collection Scams
Description: Fake debt collectors call victims claiming they owe money on a loan, credit card, or utility account — and threaten legal action, wage garnishment, or arrest if payment isn’t made immediately. They often have partial personal information gathered from data breaches, which makes their claims seem credible. Real debt collection is governed by strict rules under the Fair Debt Collection Practices Act — legitimate collectors cannot threaten criminal arrest or demand payment by gift card, wire transfer, or cryptocurrency. These scams disproportionately target people who do have existing debt and may be conditioned to comply quickly out of fear.
Financial Impact: Victims pay money toward debts that either don’t exist or are already satisfied. Those who share banking information may also face subsequent unauthorized withdrawals.
17. Fake Job Offers
Description: Fake job offer scams post enticing positions on legitimate job boards like Indeed, LinkedIn, and ZipRecruiter — or contact candidates directly by email or text — and proceed to conduct seemingly real interviews. Once “hired,” victims are asked to pay for background checks, training materials, equipment, or certifications before they can start. Some fake employers send fraudulent payroll checks and ask employees to purchase gift cards or wire transfer equipment costs, using the check-cashing fraud model. Others use the hiring process as a vehicle to collect Social Security numbers, bank account details for “direct deposit,” and copies of identity documents.
Financial Impact: Victims lose money paid for fake job-related expenses and may also have their identity stolen through the information collected during the fake hiring process.
18. Mystery Shopper Scams
Description: Mystery shopper scams advertise lucrative opportunities to get paid for evaluating businesses and services. After applying, the “employer” sends a check, instructs the victim to deposit it, and then directs them to use part of the funds to purchase gift cards or wire money to evaluate a money transfer service — sending the purchase details back as part of the evaluation. The check later bounces, and the victim is responsible for all funds spent. Legitimate mystery shopping jobs do exist, but they never send checks in advance or ask workers to wire money. Real programs pay after the assignment is completed.
Financial Impact: Victims lose whatever they spent on gift cards or wire transfers — often $500 to $2,000 — when the initial check is returned as fraudulent.
19. Romance Scams
Description: Romance scams are among the most psychologically devastating fraud types. A scammer creates a detailed fake identity — often posing as a military officer, doctor working abroad, or successful entrepreneur — and builds a genuine-feeling relationship with a victim over weeks or months through consistent communication. Once deep emotional attachment has formed, the scammer introduces a financial crisis and asks for help. Requests escalate in frequency and amount, with each story reinforcing the urgency. AI voice and video technology is now making these interactions far more convincing. Victims often continue sending money long after friends and family raise concerns.
Financial Impact: The FTC consistently reports romance scams as one of the highest-loss fraud categories, with individual victims losing anywhere from thousands to hundreds of thousands of dollars — sometimes their entire life savings.
20. Impersonation Scams
Description: Impersonation scams involve fraudsters posing as officials from the IRS, Social Security Administration, Medicare, U.S. Customs, law enforcement, or well-known companies like Amazon or Apple. They claim there’s an urgent problem — an outstanding warrant, a suspended account, suspicious activity, or an overdue tax bill — and demand immediate action to resolve it. The caller often instructs the victim to keep the call confidential and to pay via gift card, wire transfer, or cryptocurrency to avoid “arrest” or account closure. These scams succeed by creating fear and urgency before the victim can think critically or consult someone else.
Financial Impact: Victims lose whatever amount they’re pressured into paying — often ranging from hundreds to thousands of dollars in a single call, and sometimes across multiple calls as the scammer returns for more.
21. Gift Card Scams
Description: Gift card payment demands are one of the clearest signals of a scam — yet they remain extraordinarily effective because scammers pair the request with a highly stressful scenario. A caller posing as the IRS, a grandchild in jail, or a utility company threatening shutoff instructs the victim to purchase gift cards from a specific retailer and read the card numbers over the phone. The cards are drained within seconds of the numbers being shared, and the money is completely unrecoverable. No legitimate government agency, business, or legal authority ever requests payment via gift card.
Financial Impact: Gift card fraud results in immediate and almost always permanent loss. The FTC receives tens of thousands of gift card fraud reports annually, with individual losses ranging from hundreds to tens of thousands of dollars.
22. Government Grant Scams
Description: Government grant scams involve callers or mailers claiming that you’ve been selected to receive a free government grant — for education, home improvement, or general financial assistance — based on your tax history or citizenship. To receive the funds, you’re asked to pay a processing fee or provide bank account information for the deposit. No such grant exists. The U.S. government does offer legitimate grants, but they are applied for through official channels and never come as unsolicited phone calls. The names of real government programs are used to make the scam seem credible.
Financial Impact: Victims lose their processing fee payment and potentially additional funds if banking details were provided for subsequent unauthorized withdrawals.
23. Medical Scams
Description: Medical scams offer miracle cures, unapproved treatments, or heavily discounted prescription drugs that either don’t work, are outright dangerous, or are never delivered. They target people dealing with chronic conditions, weight loss goals, cognitive decline, or serious diagnoses who are desperate for relief. Online pharmacy scams sell counterfeit or unregulated medications. Some scams pose as clinical trial recruiters, collecting personal and financial information under the guise of research participation. The emotional vulnerability of people dealing with health challenges makes them particularly susceptible to promises of easy solutions.
Financial Impact: Victims lose money on ineffective products and potentially face serious health consequences from fake or contaminated medications. Costs can accumulate significantly with subscription-based products that are difficult to cancel.
24. Phony Inheritance Scams
Description: Phony inheritance scams inform victims — typically by email or letter — that a distant relative, foreign dignitary, or unknown wealthy person has died and left them a significant inheritance. An attorney, banker, or government official impersonating someone who needs help transferring the funds requires fees to complete the legal process. The fees escalate with each new “complication,” and the inheritance never arrives. This is essentially an advance fee fraud variant using the emotional hook of unexpected wealth. These scams occasionally use real names from public obituaries to add false authenticity.
Financial Impact: All fees paid are lost, and the inheritance is entirely fictional. Victims who provide banking details may face additional unauthorized withdrawals beyond what they willingly paid.
25. Tax Scams
Description: Tax scams surge annually around filing season but operate year-round in various forms. The most common is the IRS impersonation call — a caller claiming to be an IRS agent who threatens arrest, license suspension, or deportation if an outstanding tax debt isn’t resolved immediately by gift card or wire transfer. Others involve fraudulent tax preparers who steal refunds or file false returns to collect them. Still others offer fake tax relief services, promising to settle tax debts for “pennies on the dollar” while collecting fees and doing nothing. The IRS contacts taxpayers by mail — never by phone demanding immediate payment.
Financial Impact: Victims lose money paid to fake agents or fraudulent services. Stolen tax refunds can take months to resolve with the IRS, and the process is stressful and time-consuming.
26. Subscription Traps
Description: Subscription traps typically begin with a “free trial” offer for a product or service — with a credit card number required to cover shipping or a small initial fee. Deep in the terms and conditions, the offer auto-enrolls you in a monthly subscription at a much higher price once the trial ends. The charges are designed to be small enough to avoid immediate notice but accumulate significantly over time. Cancellation is deliberately made difficult — requiring calls during limited hours, navigating confusing menus, or threatening contract penalties. These traps are common in health supplements, streaming services, and software tools.
Financial Impact: Victims pay recurring monthly charges, sometimes for months or years before noticing. Total losses from a single subscription trap can reach hundreds of dollars before the charges are stopped.
27. Travel Scams
Description: Travel scams offer deeply discounted vacation packages, resort stays, or cruise deals that require payment upfront. After paying, victims find the accommodations don’t exist, have hidden surcharges that eliminate the savings, or represent time-share pitches that are impossible to exit. Fake travel websites clone the look of legitimate booking platforms to collect payment information. Others come via social media ads offering prize trips that require processing fees and personal information. Travel scams intensify during peak booking seasons and following major travel events.
Financial Impact: Victims lose their prepayments with no recourse and potentially miss actual travel plans they counted on. Hidden charges on legitimate-seeming scams can significantly inflate costs beyond what was advertised.
28. Crowdfunding Scams
Description: Not every GoFundMe, Kickstarter, or social media fundraiser represents a legitimate need. Scammers create emotionally compelling campaigns for sick children, disaster victims, veterans, or community causes — complete with fabricated photos and stories — and collect donations with no intention of using the funds as described. Even on legitimate crowdfunding platforms, verification of individual campaigns is limited. In some cases, the organizer of a real campaign diverts funds for personal use rather than the stated cause. Always research the person or organization running a crowdfunding campaign before donating.
Financial Impact: Donated funds are lost and rarely recoverable, as most crowdfunding platforms have limited fraud protections for individual campaigns.
29. Wi-Fi Hotspot Scams
Description: In public places like airports, coffee shops, and hotels, scammers set up rogue Wi-Fi hotspots with names that closely resemble legitimate networks. When you connect to the fake hotspot, all your internet traffic passes through the scammer’s device, allowing them to intercept login credentials, financial information, and personal communications. This is called a “man-in-the-middle” attack. Victims may have no idea their data was captured until fraudulent activity appears on their accounts days or weeks later. Always verify the correct network name with staff before connecting in public places.
Financial Impact: Stolen credentials give scammers access to email, banking, and social media accounts, potentially resulting in unauthorized transactions, account takeovers, and identity theft.
30. Fake Data Breach Notifications
Description: Scammers send emails or text messages claiming that your personal information was exposed in a recent data breach — often referencing a real breach that was in the news. They offer to help you “protect your identity” or claim your account needs to be reverified to restore security. The link in the message leads to a fake website that captures any credentials or personal information you enter. Real breach notifications come from the companies directly affected and never ask for your password or financial information in the notification itself.
Financial Impact: Victims who enter information on fake notification pages have their credentials stolen and may face account takeovers, unauthorized transactions, and identity theft.
31. Fraudulent Scholarships
Description: Scholarship scams target students and families by offering financial aid that requires an application fee or personal information to process. Others claim the student has already been awarded a scholarship and simply needs to provide banking information to receive the funds. Legitimate scholarships never require payment to apply or to claim winnings. Some fraudulent programs sell lists of “exclusive” scholarships that are publicly available for free, or fabricate scholarships entirely to collect contact and personal data. These scams often appear credible because they use official-sounding names and formats.
Financial Impact: Victims lose application fees and potentially expose sensitive personal and financial information used for identity theft.
32. Online Auction Scams
Description: Online auction scams involve sellers listing high-value items — electronics, vehicles, collectibles — at attractive prices but with no intention of fulfilling the transaction. After winning the auction, the buyer is directed to pay outside the platform through a method that offers no buyer protection — wire transfer, cryptocurrency, or gift cards. The item is never shipped, and the seller disappears. In some variations, a fraudulent buyer sends an overpayment check and asks the seller to refund the difference, which bounces later. Always pay through the auction platform’s protected payment system.
Financial Impact: Victims lose their entire payment with little chance of recovery due to unprotected payment methods.
33. Childcare Scams
Description: Childcare scams appear on parenting forums and job listing sites as offers for nannies, babysitters, or au pairs — or as fake daycare services accepting registrations. In the job version, a “family” hires a caregiver, sends a check for advance supplies or travel expenses, and asks the caregiver to send back the excess. In the service version, parents pay registration fees or deposits for childcare slots that don’t exist. These scams exploit the urgency parents feel around securing reliable childcare, particularly for newborns or families returning to work.
Financial Impact: Caregivers lose funds from bounced check schemes; parents lose deposits or registration fees with no childcare secured.
34. Home Repair Scams
Description: Home repair scams typically involve contractors who show up unsolicited — often after a storm or natural disaster — offering to fix damage at a discounted price if you pay upfront in cash. After collecting payment, they do minimal or no work and disappear. Others use high-pressure tactics to convince homeowners of urgent repairs that don’t actually exist — roof damage, foundation issues, or chimney problems fabricated during a “free inspection.” Always get multiple written estimates, verify contractor licenses, and never pay the full amount before work is completed. These scams surge significantly following hurricanes, floods, and hailstorms.
Financial Impact: Victims lose their upfront payment — which is often substantial for repairs — with no work performed and no contractor to pursue.
35. Employment Scams
Description: Employment scams mimic legitimate job postings and hiring processes to collect money, personal information, or banking credentials from job seekers. Scammers post attractive positions on major job boards and conduct fake interviews via chat or video call. Once “hired,” victims are told to pay for background checks, certification courses, equipment, or uniforms before they can start. Some employment scams recruit victims to become unwitting money mules — directing deposits into their accounts and forwarding funds to the scammer under the guise of a legitimate job duty. Job seekers actively looking for work are particularly vulnerable because they’re motivated to act quickly.
Financial Impact: Victims lose fees paid for fake pre-employment requirements and may face legal exposure if unknowingly used as a money mule in financial fraud.
36. Celebrity Endorsement Scams
Description: Celebrity endorsement scams use fabricated quotes, fake news articles, and manipulated images or videos to falsely claim that a celebrity is promoting a product or investment. These ads appear primarily on social media platforms and lead to fraudulent websites selling fake health supplements, investment platforms, or cryptocurrency schemes. The endorsements are entirely invented, and the celebrity has no knowledge of or association with the product. AI-generated deepfake videos are making these scams increasingly realistic, with some featuring seemingly real video of well-known public figures speaking directly to the camera.
Financial Impact: Victims lose money on ineffective or non-existent products, or invest in fraudulent schemes based on the false credibility of the celebrity association.
37. Fake Charity Events
Description: Some charity fraud takes the form of fake events — walks, runs, galas, or fundraising dinners supposedly supporting a cause. Organizers collect entry fees, table purchases, or donations with no intention of directing the funds to any charitable purpose. These events may be promoted heavily on social media with professional graphics and compelling cause messaging. In some cases, a real event name is hijacked with a similarly named organization collecting parallel donations. Always verify that an event is organized by the official nonprofit before registering or donating.
Financial Impact: Entry fees, donations, and sponsorship money are lost entirely with no charitable benefit delivered.
38. Phone Bill Scams (Cramming)
Description: Cramming refers to the practice of adding unauthorized charges to a victim’s phone bill for services they never requested or agreed to — ringtones, horoscope subscriptions, text alert services, or premium content. These charges are often small — $2 to $15 per month — specifically designed to go unnoticed among a complex bill. The charges may be added by third-party companies with billing agreements with carriers, or by scammers who have acquired partial billing access. Carefully reviewing your phone bill each month and questioning any unfamiliar charges is the best defense.
Financial Impact: Cramming charges accumulate steadily over time. Victims who don’t catch them quickly may lose hundreds of dollars before the charges are identified and disputed.
39. Business Opportunity Scams
Description: Business opportunity scams promise financial independence through vending machines, e-commerce stores, ATM placements, or other “turnkey” business models. Victims pay significant upfront fees for starter kits, inventory, training, or territory rights. The promised revenue never materializes, and support from the company disappears once the sale is made. Some of these scams masquerade as franchise opportunities, using professional marketing materials and testimonials to establish credibility. The FTC requires disclosures from legitimate business opportunity sellers — always verify compliance before investing.
Financial Impact: Startup costs ranging from hundreds to tens of thousands of dollars are lost, with no viable business created and little legal recourse.
40. Fake Delivery Notification Scams
Description: Fake delivery notification scams send texts or emails claiming to be from USPS, FedEx, UPS, or DHL, stating that a package couldn’t be delivered and requires action — clicking a link to reschedule delivery, pay a small fee, or verify your address. The link leads to a convincing fake website that captures your payment card information or installs malware on your device. These scams are particularly effective because most people have packages in transit at any given time, making the message contextually plausible. These are among the most widely distributed smishing campaigns currently active.
Financial Impact: Payment information entered on fake delivery sites is stolen for fraudulent purchases or sold on dark web markets. Device malware can lead to far-reaching financial and identity theft.
41. Fake Pet Adoption Scams
Description: Scammers post adorable photos of puppies, kittens, or exotic animals online — often at unusually low prices or offered for free — requiring only a shipping or transport fee to deliver the animal. Once payment is made, additional fees appear for crates, insurance, vaccinations, or customs clearance. The pet never arrives, and the scammer disappears once the victim stops paying. Photos are typically stolen from legitimate breeders or rescue organizations. These scams exploit the emotional excitement of welcoming a new pet and are especially harmful when children are involved in the decision.
Financial Impact: Victims lose all fees paid — often accumulating to several hundred dollars — with no pet delivered and no recourse.
42. Fake Tech Products
Description: Scam websites and social media ads sell counterfeit or nonexistent technology products — headphones, chargers, smart devices, cables — at prices just low enough to be tempting but high enough to be profitable. Products either never arrive, arrive as obvious counterfeits, or look legitimate but fail quickly. Some counterfeit tech products pose genuine safety risks — fake chargers have caused fires and electrical damage. These listings often appear during holiday shopping seasons and use stolen photos from legitimate product listings to appear authentic.
Financial Impact: Victims lose their purchase price and must replace the product at full cost, and in some cases face safety damage from counterfeit electrical components.
43. Fake Customer Service Calls
Description: Scammers impersonate customer service departments from well-known companies — Amazon, PayPal, your bank, Netflix — and call to alert you about a suspicious charge, a billing issue, or a problem with your account. To “resolve” the issue, they ask for your account login, payment card details, or remote access to your device. These calls are often preceded by a spoofed callback number that matches the real company, adding significant credibility. The real company is not calling — their customer service number was simply duplicated by the scammer.
Financial Impact: Victims hand over account credentials or payment information that is immediately used for unauthorized transactions, account takeovers, and identity theft.
44. Online Lottery Scams
Description: Online lottery scams inform victims by email, text, or social media message that they’ve won a substantial cash prize in an online lottery or sweepstakes. A link leads to a convincing fake site where victims are asked to pay taxes or processing fees before the winnings can be released. Some scams use names of real lotteries — Mega Millions, Powerball, international lotteries — to establish credibility. You cannot win a lottery you didn’t enter, and legitimate lotteries never require winners to pay fees upfront to receive their prize.
Financial Impact: All fees paid are lost. If bank account information was provided to “receive” the winnings, victims also face unauthorized withdrawals.
45. False Prize Drawings
Description: False prize drawings use mail, phone calls, or digital messages to tell recipients they’ve been selected as a finalist in a drawing for a car, vacation, cash, or electronics. To claim the prize, a processing fee or tax payment must be made — and the prize is never real. Some of these scams invite victims to attend a presentation where the “prize” is awarded after sitting through a high-pressure sales pitch, usually for a time-share or dubious investment. The prizes offered in presentations are often legitimate but deeply unfavorable — a discounted resort stay with extensive restrictions, for example.
Financial Impact: Victims lose fees paid to claim prizes that don’t exist, and those who attend presentations may be pressured into signing costly contracts.
46. Medical Insurance Scams
Description: Medical insurance scams target people who are uninsured or underinsured by offering plans at prices that seem too good to be true — because they are. These fake or inadequate plans collect premiums faithfully but provide no real coverage when needed. Some are outright fraudulent policies that don’t exist; others are “health sharing ministries” or discount cards marketed with misleading language suggesting they function like insurance. Victims often discover the fraud only when they submit a claim after a medical event and find themselves with a mountain of bills and no coverage.
Financial Impact: Beyond lost premiums, victims may face enormous medical debt from procedures they believed were covered. The financial damage is often compounded by the health crisis that exposed the fraud.
47. Impersonation of Legal Authorities
Description: These scams involve callers posing as law enforcement, court officials, U.S. Marshals, or attorneys claiming that the victim has an outstanding warrant, missed jury duty, or owes court fees. To avoid immediate arrest or legal consequences, payment is demanded right now — typically via gift card, wire transfer, or cryptocurrency. Real law enforcement never calls to demand payment over the phone. Warrants are served in person and court fees are handled through official legal channels. These calls are designed to generate maximum fear and panic before the victim can think clearly.
Financial Impact: Victims pay hundreds to thousands of dollars to avoid a fictitious legal threat, with no legal issue ever existing.
48. Fake Investment Seminars
Description: Fake investment seminars are often advertised as free educational events hosted at hotels, community centers, or online — offering to teach you strategies for trading, real estate investing, or building passive income. At the event, high-pressure sales tactics push attendees to purchase expensive courses, mentorship programs, or trading software. The promised educational value rarely materializes, and the investment strategies taught are often recycled, basic, or outright fraudulent. These events frequently exploit high-profile names or claim endorsement from wealthy investors without verification.
Financial Impact: Victims spend hundreds to thousands of dollars on courses and programs that deliver no meaningful financial benefit or return.
49. Rental Car Scams
Description: Fake rental car deals appear on booking websites or search ads offering dramatically discounted rates. After payment, the confirmation code is invalid, the rental location doesn’t exist, or the company turns out to have no actual vehicles. In another variation, legitimate-seeming rental companies add hidden fees and charges at pickup that were never disclosed, effectively inflating the cost far beyond the original quote. Some scammers set up booths near airports or tourist areas impersonating well-known brands to collect payment for nonexistent rentals.
Financial Impact: Victims lose their prepayment and arrive at their destination without transportation, often forced to rent at full price under time pressure.
50. Phony Tax Refund Services
Description: Phony tax refund services advertise online or through flyers claiming they can help you recover unclaimed tax refunds you’re owed — for a fee. They charge upfront for their “service” and submit fraudulent or unnecessary IRS forms that accomplish nothing. Some collect detailed personal and financial information under the guise of tax preparation and use it for identity theft or to file fraudulent returns in the victim’s name. Legitimate tax professionals charge for tax preparation services, not for accessing refunds you’re already owed.
Financial Impact: Victims lose service fees and may have fraudulent returns filed in their name, resulting in IRS complications that take months to resolve.
51. Debt Relief Scams
Description: Debt relief scams target people struggling with credit card debt, medical bills, or student loans by promising to negotiate settlements, eliminate balances, or reduce monthly payments — for upfront fees. Once collected, the promised services are never delivered, and the scammer either disappears or provides minimal, ineffective communication with creditors. Some debt relief scammers instruct victims to stop paying creditors directly — which damages credit scores and leads to collections — while promising the scammer is “negotiating” on their behalf. Legitimate credit counseling services are available for free or at low cost through nonprofit organizations.
Financial Impact: Victims lose service fees, damage their credit scores by following bad advice, and end up in a worse financial position than when they started.
52. Fake Coupons and Vouchers
Description: Fake coupon scams circulate on social media and messaging apps promising massive discounts or free products from well-known retailers. The link leads to a phishing site that collects personal information or installs malware. Others sell booklets of discount vouchers that are either counterfeit, expired, or come with terms that make them essentially useless. Scammers use the appeal of savings to lower your guard, knowing that people are more likely to click without scrutiny when a deal seems genuinely useful.
Financial Impact: Victims lose money paid for fraudulent discount booklets and face credential theft or malware exposure from phishing links.
53. Fake Real Estate Agents
Description: Fake real estate agent scams involve fraudsters posing as licensed agents or property owners to collect deposits on properties they don’t own or have no authority to rent or sell. They show properties to establish credibility before requesting a deposit to hold the property. Once the deposit is paid, the “agent” is unreachable. In some variations, scammers create entirely fake listings and collect application fees and security deposits without ever meeting the victim in person. Always verify an agent’s license through your state real estate commission.
Financial Impact: Victims lose their deposit — often thousands of dollars — with no property and no legal recourse against a scammer who provided false credentials.
54. Social Media Scams
Description: Social media platforms are fertile ground for fraud. Scammers create fake profiles impersonating friends, celebrities, or brands; run fraudulent ads for products that don’t exist; and operate giveaway scams that require personal information to enter. Direct message scams ask for money on behalf of a “friend” who claims to be in trouble. Fake investment groups promise stock tips or crypto profits in private communities. Some accounts impersonate customer service to intercept complaints and collect account credentials. The trusted, social nature of these platforms causes people to lower their guard.
Financial Impact: Losses vary widely — from small purchases from fake product ads to substantial sums sent to fake friends in fabricated emergencies.
55. Fake Wedding Scams
Description: Wedding scams target engaged couples during one of the most financially significant events of their lives. Fake photographers, caterers, florists, venues, and planners collect deposits and fail to appear on the wedding day or disappear before the event entirely. Some scammers operate ghost businesses with realistic websites and fabricated reviews. Others are real businesses that overbook deliberately. Always verify vendor reviews through multiple independent sources, request a detailed signed contract, and never pay more than a standard deposit upfront.
Financial Impact: Victims lose deposits for vendors who never perform, and the last-minute scramble for replacements often results in paying a premium, compounding the total loss.
56. Phony Health Products
Description: Phony health product scams sell supplements, devices, or treatments making unsubstantiated claims about curing diseases, promoting dramatic weight loss, reversing aging, or improving cognitive function. These products are often sold via social media ads, infomercials, or email campaigns that use fabricated testimonials and fake scientific studies. Some are harmless but useless; others contain unlisted ingredients that pose real health risks. The FDA regularly issues warnings about fraudulent health products, particularly those targeting cancer patients, diabetics, and people seeking alternatives to prescription medications.
Financial Impact: Victims spend money on ineffective products and potentially delay legitimate medical treatment. Subscription-based products make cancellation difficult, compounding the financial loss.
57. Fake Emergency Scams (Grandparent Scam)
Description: Fake emergency scams — most commonly known as grandparent scams — involve a caller posing as a grandchild (or a lawyer, police officer, or doctor speaking on their behalf) claiming they’re in an urgent situation: arrested, in a hospital abroad, or in a car accident. They beg for immediate cash and plead not to tell anyone else in the family. The urgency and secrecy are intentional — both prevent the victim from having time to verify the story. AI voice cloning technology is now making these calls terrifyingly convincing, with voices synthesized from public video or audio of the real grandchild.
Financial Impact: Victims send cash, wire transfers, or gift cards — often multiple times across a single call — with individual losses commonly reaching $5,000 to $50,000.
58. Personal Injury Scams
Description: Personal injury scams operate in two directions. In one form, scammers offer to help accident victims file injury claims and collect upfront legal fees with no real legal services delivered. In another form, individuals fake injuries in staged accidents, slip-and-fall incidents, or vehicle collisions to file fraudulent insurance claims. Both forms exploit the legal and insurance systems. In the consumer targeting version, victims desperate for compensation after a real injury are particularly susceptible to promises of quick, easy settlements.
Financial Impact: Victims of fraudulent legal services lose fees paid and receive no compensation. Insurance fraud ultimately raises premiums for all policyholders.
59. Fake Job Recruitment Agencies
Description: Fake recruitment agencies pose as legitimate staffing firms, charging job seekers fees for resume writing, job placement, background screenings, or access to “exclusive” job listings. Once fees are collected, the promised job placements don’t materialize. Some agencies claim to have exclusive relationships with major employers and conduct multiple rounds of fake interviews to create a convincing process before the final ask for payment. In the U.S., legitimate staffing agencies are paid by employers — not job seekers. Any recruiter charging you to find you a job should be treated with extreme caution.
Financial Impact: Job seekers lose placement fees and remain unemployed, having invested both money and significant time in a fraudulent process.
60. False Debt Collection
Description: False debt collection scams involve callers claiming to represent a collection agency pursuing a debt that either doesn’t exist, has already been paid, or is past the statute of limitations for legal collection. They use threatening, aggressive language — referencing lawsuits, wage garnishment, or criminal charges — to pressure immediate payment before the victim can verify the claim. Under the Fair Debt Collection Practices Act, you have the right to request written verification of any debt before paying. Legitimate collectors will provide this; scammers will not.
Financial Impact: Victims pay money toward completely fictional debts and may provide banking information that enables further unauthorized withdrawals.
61. Fake Online Reviews
Description: Fake review ecosystems exist on both sides of fraud. Unscrupulous businesses pay for fabricated five-star reviews to artificially inflate their reputation, driving consumers toward products and services that don’t deliver on their promises. Conversely, scammers post fake negative reviews targeting legitimate businesses to extort payments for “review management.” For consumers, over-reliance on reviews without cross-referencing multiple sources leads to purchases from fraudulent or low-quality vendors. Always look for verified purchase badges, review diversity, and consistent language patterns that suggest artificial generation.
Financial Impact: Consumers make purchasing decisions based on false social proof and lose money on products or services that don’t match their fraudulent reputation.
62. Fake Home Security Scams
Description: Door-to-door security scammers pose as representatives of legitimate alarm companies — sometimes using uniforms and branded vehicles — and offer free or deeply discounted security system installations. The real cost comes in the form of multi-year monitoring contracts with high monthly fees buried in the paperwork, or in substandard equipment that provides no meaningful security. Some scammers conduct these visits primarily to case the property and identify valuables or vulnerabilities for a future burglary. Always verify the identity and licensing of any home security representative before signing anything.
Financial Impact: Victims are locked into expensive long-term contracts for ineffective equipment, with early termination fees that make exit financially painful.
63. Online Loan Scams
Description: Fake loan scams target people with poor credit or urgent financial needs by advertising guaranteed approvals with no credit check. The catch: an upfront fee must be paid for insurance, processing, or collateral before the funds can be released. After paying, the loan is delayed by additional requirements — then the company disappears. Legitimate lenders never require upfront fees before disbursing a loan. Upfront fee requirements are the defining characteristic of loan fraud and should be treated as an immediate disqualifying red flag regardless of how professional the lender appears.
Financial Impact: Victims lose their processing fee and receive no loan, often leaving them in worse financial shape than before they applied.
64. Fake Networking Opportunities
Description: Scammers advertise exclusive professional networking events, mastermind groups, or business development workshops that require significant registration fees. Attendees find that the promised speakers don’t appear, the event provides no meaningful business value, or the networking is simply a vehicle for selling additional high-priced programs. Some fake networking scams are thinly veiled pyramid recruitment drives, where participants are encouraged to bring others in exchange for commissions. Always research event organizers, speakers, and past attendees independently before paying to attend any professional event.
Financial Impact: Registration fees are lost and no meaningful professional or business benefit is realized.
65. Fraudulent Telemarketing
Description: Fraudulent telemarketing calls use high-pressure tactics to sell nonexistent products, fake services, or overpriced items that don’t match their description. Common fraudulent telemarketing scripts include offers for discounted medical alert devices, travel club memberships, credit card interest reduction services, and home security systems. Callers are trained to overcome objections and create urgency, often using misleading claims about limited availability or expiring offers. The Do Not Call Registry reduces some telemarketing volume but does not stop fraudulent callers, who operate in violation of FTC regulations.
Financial Impact: Victims pay for products or services that either don’t exist, are grossly misrepresented, or are available for far less through legitimate channels.
66. Family Impersonation Scams
Description: Similar to the grandparent scam, family impersonation scams involve fraudsters contacting victims by phone, text, or social media claiming to be a family member in urgent need — stranded at an airport, arrested abroad, involved in an accident, or in a medical emergency. The message often includes a plea for immediate secrecy. AI voice cloning means these calls can now use voices that sound like actual relatives, harvested from social media videos. Always verify by calling the family member directly on their known number before sending any money.
Financial Impact: Victims send money — often by wire transfer or gift card — under extreme emotional distress, with losses commonly ranging from hundreds to tens of thousands of dollars.
67. Fake Credit Repair Services
Description: Credit repair scams promise to erase negative information, boost credit scores dramatically, or create a “new credit identity” — all in exchange for upfront fees. None of these promises are achievable as advertised. Negative but accurate information cannot be legally removed from a credit report before its natural expiration. The only legitimate form of credit repair is disputing genuinely inaccurate information, which you can do yourself for free through the credit bureaus. Some credit repair scammers advise clients to create synthetic identities using Employee Identification Numbers, which constitutes federal fraud.
Financial Impact: Victims lose upfront fees and see no meaningful improvement in their credit. Those who follow illegal advice about synthetic identities may face criminal charges.
68. Phony Travel Deals
Description: Phony travel deal scams specifically target people searching for vacation bargains through social media ads, unsolicited emails, or robocall offers. The deals offer luxury accommodations, all-inclusive resorts, or cruises at dramatically reduced prices — requiring immediate commitment because “only a few spots remain.” Hidden costs revealed after booking often negate the original savings. Some deals require attending a high-pressure time-share presentation as a condition of the promotional rate. Others are entirely fabricated, collecting payment for bookings that were never made with any real hotel or airline.
Financial Impact: Victims lose prepayments for travel that doesn’t materialize or discover that the advertised cost was a fraction of the real total after fees and requirements are revealed.
69. Fake Software Licenses
Description: Fake software license scams sell counterfeit activation keys for popular software — Microsoft Office, Adobe products, antivirus programs, and others — at prices substantially below retail. The keys either don’t work at all, have already been used on the maximum allowed devices, get revoked by the software company when the fraud is detected, or activate modified versions that contain malware. These listings appear on third-party marketplaces, classified ad sites, and social media. Purchasing software through unofficial channels poses both financial and security risks.
Financial Impact: Victims lose the purchase price of counterfeit software and face security risks from potentially malware-laden installations.
70. Fake Vehicle Sales
Description: Fake vehicle sale scams post attractive listings for cars, trucks, motorcycles, or boats at below-market prices on Craigslist, Facebook Marketplace, or other classified platforms. The seller claims to be out of town or in the military and proposes shipping the vehicle after payment — using a fictitious escrow service to create a false sense of protection. Once payment is made, the vehicle is never shipped and the seller disappears. In another variation, the vehicle exists but the title is fraudulent, and the buyer discovers the vehicle is stolen or encumbered by a lien after the purchase is complete.
Financial Impact: Victims lose their full purchase price — often thousands of dollars — with no vehicle received and limited legal recourse against anonymous scammers.
71. Fake Health Insurance Plans
Description: Fake health insurance scams sell plans that appear comprehensive but provide virtually no actual coverage — or none at all. These are often marketed as “association health plans,” “health sharing ministries,” or “limited benefit plans” using language designed to obscure their limitations. Agents collecting premiums may be licensed but selling products that will never pay claims. Victims typically discover the fraud only when they incur significant medical expenses and submit claims that are denied entirely or paid at pennies on the dollar.
Financial Impact: Victims lose all premiums paid and face full exposure to medical costs they believed were covered, resulting in potential medical debt of thousands to hundreds of thousands of dollars.
72. False Surveys and Market Research
Description: Fake survey scams offer payment or prizes for completing online surveys or participating in market research, but require a credit card number to “verify your identity” or cover a nominal shipping fee for a promised gift. Once card information is provided, the victim is enrolled in recurring subscription charges. Others use surveys to harvest personal information for identity theft rather than any genuine research purpose. Legitimate paid survey platforms do exist, but they never require credit card information to participate.
Financial Impact: Victims face unauthorized recurring subscription charges and potentially have sensitive personal information harvested for fraud.
73. Scam Auctions
Description: Scam auction sites — distinct from legitimate platforms like eBay — operate fake bidding systems where every bid costs money regardless of whether the item is won. Items are presented as available at impossibly low ending prices, which encourages continued bidding. The mechanics are deliberately confusing, and participants often spend far more in bidding fees than the item is worth at retail. These “penny auction” sites often make it difficult to verify whether other bidders are real or automated. Always research auction site mechanics and reviews extensively before purchasing any bid packages.
Financial Impact: Victims spend money on bid packages and win nothing, or win an item for a price that, including all bidding fees, significantly exceeds its retail value.
74. Fraudulent Subscription Services
Description: Beyond the subscription trap model, some fraudulent subscription services collect payment for ongoing access to content, software, or services that either don’t exist or are available for free elsewhere. These include fake VPN services, fake cloud storage, fake antivirus software, and fake streaming libraries. When victims attempt to use the service, access is either denied or the product is a barely functional placeholder. Cancellation policies are often deliberately complicated or impossible to execute — requiring contact with customer service numbers that don’t respond.
Financial Impact: Victims pay recurring fees for services with no real value, with difficulty getting refunds or stopping future charges.
75. Fake Ticket Sales
Description: Fake ticket scams sell nonexistent or duplicate tickets to concerts, sporting events, theater performances, and festivals — typically when events are sold out and high demand makes buyers less cautious. Listings appear on Craigslist, Facebook Marketplace, and unofficial ticket resale sites. The tickets are either entirely fabricated, already scanned and invalid, or never delivered after payment. Some scammers use sophisticated forgeries that pass visual inspection but fail at the venue scanner. Always buy tickets from the official venue box office or verified resellers with buyer protections.
Financial Impact: Victims lose the ticket purchase price — which can be substantial for premium events — and arrive at the venue with no entry.
76. Phony Money-Making Schemes
Description: Phony money-making schemes promise passive income through dropshipping courses, affiliate marketing programs, Amazon FBA blueprints, print-on-demand systems, or other “proven” business models. Expensive courses, coaching programs, and software subscriptions are sold with claims of life-changing income achievable by anyone following the system. The reality is that the primary income for most scheme operators comes from selling the course — not from the business model itself. Success stories are cherry-picked, and the market is typically far more competitive and complex than advertised.
Financial Impact: Victims spend significant sums on courses, tools, and memberships that generate minimal or no income, with the operators’ earnings dependent on continued recruitment of new buyers.
77. Fake Online Contests
Description: Fake online contests use social media to drive engagement — “Like, share, and tag a friend to win a $500 gift card” — while collecting personal contact information and building follower counts that are then monetized or sold. In more aggressive versions, entrants are directed to a landing page where they provide detailed personal information and credit card details to “claim their prize.” The contest is never real. Some fake contests harvest enough personal data for targeted phishing campaigns against every entrant.
Financial Impact: Victims lose time, have personal contact information harvested for future scams, and may face credit card fraud if payment information was entered.
78. Fake Invoice Scams
Description: Fake invoice scams target businesses by sending official-looking invoices for services that were never ordered or delivered — domain renewals, office supplies, advertising placements, or directory listings. The invoices are designed to resemble regular business expenses and hope to slip through accounts payable processes without being challenged. In more targeted attacks, scammers research a company’s vendors and replicate legitimate invoices with altered payment details, directing funds to a fraudulent account. These attacks are particularly effective in larger organizations where invoice processing may be somewhat automated.
Financial Impact: Businesses lose money paid for nonexistent services, with larger targeted attacks redirecting significant vendor payments to fraudulent accounts.
79. Scams Targeting Seniors
Description: While scammers target people of all ages, seniors face elevated risk from multiple overlapping factors: higher average accumulated wealth, greater trust in authority figures, higher rates of social isolation, and greater likelihood of cognitive changes that affect judgment under pressure. Senior-targeted scams include Medicare fraud, Social Security impersonation, grandparent scams, lottery scams, and romance scams. These schemes are often run by organized criminal networks that deliberately focus on this demographic and share victim lists. Education, family communication, and ongoing awareness are the most effective defenses.
Financial Impact: Seniors are disproportionately represented among high-loss fraud victims. Individual losses can be catastrophic — representing retirement savings, home equity, or fixed-income funds with no realistic opportunity for recovery.
80. Fake Cryptocurrency Investments
Description: Fake cryptocurrency investment scams have exploded in recent years, with “pig butchering” schemes — where scammers cultivate a relationship over weeks or months before introducing a lucrative crypto investment opportunity — generating billions in annual fraud losses globally. Victims are shown realistic-looking trading dashboards with dramatic gains to encourage further deposits. When they attempt to withdraw, they’re told fees or taxes must be paid first — none of which release the funds. The entire platform and all displayed balances are fabricated. These scams begin as unsolicited texts, social media connections, or dating app matches.
Financial Impact: Individual pig butchering scam losses commonly reach six figures, and the FBI has reported victims losing their entire retirement savings, investment portfolios, and home equity to these schemes.
81. False Claims of Virus Infections
Description: Fake virus alerts appear as pop-ups on computers or mobile devices warning that the device has been severely infected and must be cleaned immediately by calling a displayed phone number. The pop-up may be accompanied by loud audio alerts and may freeze the screen to prevent closing it. The “technician” who answers requests remote access and then either installs actual malware, steals stored credentials, or charges significant fees for a problem that never existed. Closing the pop-up (force-quitting the browser if necessary) is always the correct response — there is no legitimate equivalent to these alerts.
Financial Impact: Victims pay for fake virus removal services and face ongoing credential theft and device compromise from malware installed during the fake “repair.”
82. Fake Rental Property Listings
Description: Rental listing scams copy legitimate property photos and descriptions from real listings and repost them at a lower price. When interested renters contact the fake landlord, they’re told a deposit is required to hold the property before viewing — usually because the landlord is traveling or overseas. Some scammers provide a fake lease and keys that don’t work. The property belongs to someone else entirely, and the victim discovers this only after arriving at the address. These scams intensify in competitive rental markets where desperate renters feel pressure to act immediately.
Financial Impact: Victims lose deposits — often equivalent to one to two months’ rent — and are left without housing, sometimes having already given notice at their previous residence.
83. Phony Charity Walks and Runs
Description: Phony charity event scams set up fundraising walks, runs, or sporting events in support of well-known causes — cancer research, veterans’ support, children’s charities — collecting registration fees, pledges, and sponsorships. Little to none of the collected money reaches the stated charitable cause, with the organizer pocketing the funds. These events may be promoted heavily on social media with compelling imagery and may even take place as advertised, giving participants the impression the charity is legitimate. Always verify the receiving charity directly before participating.
Financial Impact: Registration fees and pledged donations are diverted to the scammer with no benefit to the stated cause.
84. Fake Dating Apps
Description: Fake dating apps are either completely fraudulent applications designed to harvest personal information and payment details, or legitimate-seeming apps that use bots to simulate matches and charge for “premium” features to interact with profiles that aren’t real. In some cases, the app functions as an entry point for romance scam operations, connecting users with human scammers trained to build relationships and eventually request money. Always research a dating app’s reviews, company background, and data privacy practices before creating an account or sharing personal information.
Financial Impact: Victims lose subscription and premium feature fees and may be drawn into romance scam relationships resulting in far larger financial losses.
85. Fake Tax Preparation Services
Description: Fraudulent tax preparers advertise large refunds, often targeting people in lower income brackets who qualify for refundable tax credits. They charge significant fees upfront and may file returns with inflated deductions or fabricated credits without the client’s knowledge. When the IRS audits or rejects the return, the client is held responsible — not the preparer. Others simply collect personal and financial information during the tax prep process and use it for identity theft without filing anything at all. Always verify a tax preparer’s credentials and avoid anyone promising a specific refund amount before reviewing your actual documents.
Financial Impact: Victims pay preparation fees and may face IRS penalties, interest, and the cost of correcting fraudulent returns filed in their name.
86. Phony Business Services
Description: Phony business service scams target small business owners and entrepreneurs with offers for website development, SEO services, business listing management, or marketing campaigns — charging upfront fees and delivering nothing of value. Others send invoices for services the business never agreed to, counting on busy owners to pay without scrutinizing every line item. Some scammers register business names that sound like government agencies — “Business Compliance Division” — and send official-looking notices demanding payment for required filings that don’t actually exist.
Financial Impact: Businesses lose money paid for services not rendered and time dealing with fraudulent invoices and fake compliance notices.
87. Fake Medical Research Studies
Description: Fake clinical trial and medical research study scams advertise on social media and job boards seeking participants for studies — sometimes offering substantial compensation. They collect detailed medical history, Social Security numbers, and banking information for “payment processing” before the study begins. No study exists. In some variations, scammers charge participants a fee for “enrollment processing” or “health screening” before the compensation can be disbursed. Legitimate clinical trials are registered in government databases, never charge participants, and follow strict ethical review processes.
Financial Impact: Victims lose personal health and identity information used for fraud and may pay enrollment fees that are never refunded.
88. Fraudulent Mortgage Offers
Description: Mortgage scams target homeowners and buyers with offers of unusually low interest rates, guaranteed approval regardless of credit, or loan modification services that promise to prevent foreclosure. Upfront fees are collected for appraisals, processing, or legal services, with no loan or modification ever delivered. Some mortgage relief scammers instruct struggling homeowners to stop making mortgage payments and redirect them to the scammer instead — accelerating foreclosure while the scammer profits. Always verify mortgage offers through your state’s financial regulatory authority and be extremely cautious of any lender requiring upfront fees before loan approval.
Financial Impact: Victims lose upfront fees and may face foreclosure they were trying to prevent, compounding their financial crisis significantly.
89. Fake Security Update Scams
Description: Fake security update scams deliver malware disguised as legitimate software updates — for operating systems, browsers, antivirus programs, or popular apps. These appear as pop-ups on websites, as email links, or even through search ads. Once installed, the fake update may install ransomware (locking your files until a payment is made), keyloggers (recording every keystroke including passwords), or remote access trojans. Legitimate software updates are delivered through the software itself or through official download pages — never through pop-ups on unrelated websites.
Financial Impact: Malware installed through fake updates can result in ransomware demands, stolen banking credentials, and wholesale identity theft affecting every account on the device.
90. Fake Personal Loan Scams
Description: Fake personal loan scams guarantee fast approval for applicants regardless of credit history — a promise no legitimate lender makes. After applying, the scammer requests an upfront fee for insurance, collateral, or loan processing, with the promise that funds will be released once the fee is paid. The fee is paid, a new reason for another fee appears, and eventually the scammer disappears with all fees collected. People in genuine financial distress who need quick access to funds are particularly vulnerable, as their desperation reduces their critical skepticism.
Financial Impact: Victims lose all fees paid and receive no loan, leaving them in a worse financial position than before they applied.
91. Fake Debt Consolidation Scams
Description: Debt consolidation scams promise to roll multiple debts into a single lower payment, negotiate reduced balances with creditors, or eliminate debts entirely — in exchange for upfront fees or monthly service charges. Once fees begin flowing, services rarely materialize. Some scammers instruct clients to stop paying creditors directly and redirect payments to the scammer instead, claiming they’ll distribute it — which they don’t. This accelerates collections activity and credit damage. Free and legitimate debt counseling is available through the National Foundation for Credit Counseling (NFCC).
Financial Impact: Victims lose service fees, worsen their credit standing, and face accelerated collections and potential lawsuits from creditors who weren’t being paid.
92. Phony E-Commerce Listings
Description: Phony e-commerce scams operate fake online stores selling everything from clothing and electronics to beauty products and outdoor gear at attractive prices. The stores may be entirely independent websites or fraudulent seller accounts on major marketplaces like Amazon or eBay. Items either never arrive, arrive as obvious counterfeits, or are so different from their description that they’re unusable. Some of these stores are designed to collect payment information for fraud rather than to fulfill any orders at all. Always research a seller or store before purchasing, particularly for first-time visits.
Financial Impact: Victims lose their purchase price and may have payment credentials stolen for subsequent fraudulent use.
93. Fake Social Media Contests
Description: Fake social media contests run on Facebook, Instagram, TikTok, and other platforms mimic legitimate brand promotions by using similar imagery and branding to real companies. They collect likes, shares, follows, and personal contact information from thousands of participants, none of whom ever win. In more aggressive versions, “winners” are directed to a landing page to claim their prize and are asked to pay a small shipping fee or provide credit card details for “verification.” The personal data collected is used for targeted advertising, sold to third parties, or used for future phishing campaigns.
Financial Impact: Victims experience unauthorized credit card charges if payment information was provided, and face ongoing targeted fraud from their harvested contact information.
94. Credit Card Skimming Scams
Description: Credit card skimming involves the placement of a small, concealed device on ATMs, gas pump card readers, restaurant payment terminals, or retail card readers that captures your card’s magnetic stripe data when you swipe or insert it. Some skimmers include tiny cameras to capture PIN entries. The stolen data is used to create cloned cards or to make unauthorized online purchases. Modern skimmers are increasingly difficult to detect visually. Paying with a chip (EMV) or tap-to-pay method provides significantly more protection than magnetic stripe swipes.
Financial Impact: Stolen card data enables fraudulent purchases that can drain accounts or max out credit lines before victims notice, requiring time-consuming disputes and replacement processes.
95. Fake Business Grant Scams
Description: Fake business grant scams contact small business owners and entrepreneurs by phone, email, or social media claiming they’ve been selected to receive a government or corporate grant. To claim it, they must pay a processing fee, provide banking information for the deposit, or attend a presentation where they’ll receive instructions. No grant exists. These scams frequently impersonate the SBA, USDA, or major corporations like Amazon and Google that operate legitimate small business grant programs. Legitimate grants require a formal application process and never require upfront fees.
Financial Impact: Victims lose processing fees and potentially expose banking details used for unauthorized withdrawals.
96. Phony App Downloads
Description: Malicious apps disguised as games, utilities, fitness trackers, or financial tools make it onto app stores through intentional circumvention of review processes or cloning of legitimate app names and icons. Once installed, these apps may collect sensitive personal data, request unnecessary permissions, display aggressive advertising, subscribe users to premium services, or install additional malware. Some fake apps specifically target banking apps — mimicking real bank interfaces to capture credentials. Always verify an app’s developer, review count, rating authenticity, and permission requests before installing.
Financial Impact: Data harvested from malicious apps enables identity theft and account takeovers. Unauthorized premium subscriptions may go unnoticed for months.
97. Fake Home Improvement Offers
Description: Fake home improvement scams involve contractors — sometimes operating door-to-door — who offer to perform work at dramatically reduced prices because they have “leftover materials from a nearby job.” They collect payment upfront, perform minimal or no work, and move on. Others complete a partial job, then demand significantly more than the original quote to finish. Storm chasers — contractors who follow natural disasters specifically to exploit desperate homeowners — represent an extreme version of this scam. Always get multiple written estimates, check license and insurance status with your state contractor board, and never pay more than a standard deposit before work begins.
Financial Impact: Victims lose upfront payments for work never completed and face the cost of hiring a legitimate contractor to actually perform or correct the job.
98. Fraudulent Investment Schemes (Ponzi and Pyramid)
Description: At their core, Ponzi schemes pay returns to earlier investors using capital from newer investors rather than from actual business profits or investment returns. They require constant growth to sustain payouts and inevitably collapse when new investment slows. Promoters go to great lengths to maintain the illusion of legitimacy — generating fake statements, fabricating audit reports, and carefully controlling withdrawal requests. Bernie Madoff’s $64 billion fraud is the most famous example, but smaller Ponzi schemes operate constantly across the country, often targeting tight-knit communities where trust reduces scrutiny.
Financial Impact: When a Ponzi scheme collapses, the vast majority of investors lose most or all of their principal, with total losses sometimes spanning decades of accumulated savings.
99. Fake Educational Programs and Certifications
Description: Fake educational program scams sell certifications, degrees, or professional credentials from diploma mills — institutions that award qualifications with minimal or no actual coursework. Some charge thousands of dollars for “accredited” degrees that are worthless for employment because they’re not recognized by legitimate accreditation bodies. Others sell fake certificates for professional designations in high-demand fields like cybersecurity, project management, or healthcare. In addition to financial loss, using fraudulent credentials professionally can result in termination, licensing loss, and legal liability.
Financial Impact: Victims lose tuition or certification fees and risk professional consequences from attempting to use fraudulent credentials with employers or licensing boards.
100. Scams Targeting Small Businesses
Description: Small businesses face a unique and broad array of targeted scams. These include fraudulent directory listings that auto-renew at high rates, fake business registration renewal notices from companies impersonating government agencies, phony advertising opportunities, fraudulent vendor invoices, and BEC wire transfer schemes. Small businesses are particularly attractive targets because they often lack the dedicated fraud detection infrastructure of larger corporations, decisions are made by one or two people with less institutional oversight, and the financial impact per-incident is often high relative to the business’s size.
Financial Impact: Small business fraud losses vary enormously — from hundreds of dollars on fake invoices to hundreds of thousands on targeted wire transfer fraud — and can be existential for businesses operating on thin margins.
How to Protect Yourself Against Scammers
Knowledge is your first line of defense. But awareness alone isn’t enough in an environment where scammers are using AI, deepfakes, and sophisticated social engineering to target millions of people every day.
When you sign up for ScamSave, you get immediate access to the latest active scam intelligence, expert-guided protection strategies, and tools designed to keep you one step ahead. Our program is built by a CISSP-certified cybersecurity professional and covers everything from recognizing common tactics to protecting your identity, monitoring your exposure, and knowing exactly what to do if you’re targeted.
Monthly Plan — $6.99
Annual Plan — $49.99
Written by a CISSP-Certified cybersecurity professional. ScamSave is dedicated to helping everyday people protect themselves from fraud, scams, and financial crime.

