The Scam Archive

Real examples, plainly explained. Search by scam, sender, domain, or phone number and learn the red flags before you click.

Plain language
No jargon
Real screenshots
Not mockups
Shareable tips
Family-friendly

Search the Archive

AI search powered by Algolia

Recent Scams

Fresh sightings with quick takeaways you can share.

Scam example
Delivery Survey

Delivery Reward Scam

Scammers pretend to be a delivery company (for example UPS, USPS, FedEx, DHL, Amazon, Royal Mail, Canada Post) and say your package is “out for delivery” or “waiting for delivery.” The link takes you to a look‑alike page that offers a cash or gift “survey reward” and shows a countdown timer to rush you. After a few easy questions, the site asks for personal details and a small payment “to claim the reward” or “cover shipping.” Victims can be charged repeatedly, signed up for unwanted subscriptions, or have their information misused.

Read more
Scam example
Interpol Law Enforcement Impersonation

Fake Interpol Email Extortion

Scammers send emails pretending to be from Interpol or another police unit, claiming you committed an “administrative offense.” They attach a fake letter with logos and official language, threaten arrest within 48 hours, and tell you to reply to a specific email address to “justify” yourself. Once you engage, they pressure you to pay a “fine” or hand over personal details. This is meant to scare you into acting quickly.

Read more
Scam example
Investment Crypto

Group Text Investment Pitch Scam

Scammers send a flashy investment pitch to a big iMessage or SMS group with people you don’t know. The message promises fast “retirement” gains, includes a short web link, and sometimes says to reply “YES” so they can “reopen” the link. The goal is to get you to click, talk to them privately, and eventually send money to a fake “investment” or trading account (often tied to crypto or forex). Once you deposit, your money becomes very hard to get back.

Read more

Browse by category

Start with the most common patterns and their warning signs.

P

Phishing

Attempts to trick victims into revealing credentials or sensitive info by impersonating trusted services.

R

Refund / Invoice Bait

Fake invoices or 'refund' notices that trick victims into calling scammers or installing remote-access tools.

T

Tech Support / Remote Access

Scammers claim there is a virus or issue and request remote access or payment for fake fixes.

I

Investment / Crypto

Fraudulent investments or crypto scams promising guaranteed returns or exclusive offers.

R

Romance / Dating

Emotional manipulation via dating platforms leading to requests for money or gifts.

B

Business Email Compromise (BEC)

Targeted fraud against companies by spoofing executives, vendors, or partners.

M

Marketplace / Classifieds

Fake listings, rental scams, or overpayment schemes on marketplaces and classifieds.

J

Job / Work-From-Home

Fake job offers requiring upfront fees, equipment purchases, or acting as a money mule.

L

Lottery / Prize

Fraudulent prize claims requiring fees or sensitive info to claim winnings.

C

Charity / Disaster Relief

Fake charities exploiting disasters or tragedies to solicit fraudulent donations.

S

Shipping / Delivery

Fake delivery notifications tricking victims into clicking malicious links or paying fees.

I

Impersonation / Social Media

Accounts or pages impersonating individuals or brands to defraud followers.

S

Smishing (SMS Phishing)

Phishing attempts delivered by text message linking to fake sites or requesting responses.

V

Vishing (Voice Phishing)

Phone-based scams impersonating banks, government, or companies.

E

Extortion / Sextortion

Threats to expose sensitive or fake compromising information unless paid.

M

Malware / Attachment

Emails or downloads containing malicious attachments or links to malware.

C

Credential Harvesting

Fake websites or forms designed to steal login details, MFA codes, or personal data.

M

Money Mule / Asset Transfer

Victims recruited to move money or goods, often unknowingly laundering funds.

C

Crypto Wallet / Exchange Impersonation

Fake crypto wallets, exchanges, or airdrops designed to steal private keys or funds.

I

Image-Based Fraud

Scams using doctored screenshots, payment proofs, or manipulated images.

Quick tip: Pause before you pay

Unexpected refunds, gift-card demands, and urgent invoices are classic pressure tactics. Verify using a trusted phone number or website—not the link you were sent.