How it often plays out
Maria gets an email that looks like it’s from her bank: “Your account will be locked in 24 hours. Click here to verify.” She clicks, enters her password on a site that looks real, and within hours her account is drained. The link didn’t go to her bank—it went to a copycat site run by scammers. She had entered her password and the code from her phone on a page that looked exactly like her bank; within hours her checking account was emptied and her card was used in another state. By the time she reached her real bank, the money was already gone.
Who: The FTC collects scam reports and shares with law enforcement.
When to use: Use for phishing attempts, fake login pages, or requests for money or personal info.
What to prepare:
- The email or message
- Sender address or phone
- Dates
Go to FTC ReportFraud~5 min
Who: The FBI's IC3 handles internet crime including phishing.
When to use: Use when the scam was online (email, website, or app).
What to prepare:
- URLs
- Screenshots
- What was lost or exposed
Go to IC3~10 min