How to Detect Scammer Numbers and Report Phone Scams

  • By David Lukic
  • Published: Dec 28, 2020
  • Last Updated: Mar 18, 2022

Phone scams are nothing new, but the perpetrators have become wilier and more sophisticated, using a variety of techniques to separate hard-working individuals and their money. Unfortunately, often, these types of scams target the elderly and people who cannot afford to lose their life savings. The statistics are astounding. About one in six Americans have lost money to a phone scam. These criminals use spoofed phone numbers so that it looks like the call is coming from a real source, when in fact it is scammer numbers.

Some of the Most Common Scams

Just about everyone has received the prank call that is a recorded voice saying it’s calling from the IRS, and you are in big trouble and about to be arrested if you don’t hurry up and call the number provided. Of course, it’s all a scam to get you to pay some fictitious taxes, penalties, and fees that scammers will abscond with. Some of the other top phone scams going around now are:

  • Technical support calls (from Microsoft or Apple).
  • Fake charity and donations calls (natural disaster recovery).
  • Lottery scams.
  • Family members in peril (grandson calling grandma).
  • Bank fraud calls.
  • Insurance, health care, and debt scams.
  • Website password requests.
  • Fake customer requests.

The FTC has received thousands of reports of U.S. citizens who have lost money to scammer numbers of the types listed above. Regardless of whether or not they try to threaten you or appear kind and helpful, hang up the phone. You do not need to engage with these criminals. The longer you stay on the phone, the more leverage they may have in getting you to act.

The criminals either want to steal your identity or your money. When their goal is the former, they will request verification of details like your social security number, birth date, mother’s maiden name, and other information. If all they want is your money, they will ask for credit card payment or ask you to wire funds or purchase prepaid gift cards to acquire some goods or services.

Some Signs of a Phone Call Scam

Phone scammers either use sweetness or threats to get you to comply. However, right off you can tell if it is a scam by perusing this list:

  • There is an urgency to whatever the person wants from you. Nothing is that important that it needs to be done or purchased immediately. This urgency is a tip-off that it is a scam.
  • If they threaten that you will be arrested, rest assured, the IRS never calls and never sends the police right over. It takes months of paperwork and late notices before anything happens with the IRS.
  • If they request you send money urgently with a prepaid card or wire transfer, it is a scam.
  • Most companies will never call you to have you verify your identity or provide sensitive personal information over the phone. Do not engage with these scammers.

how to report a scammer

How to Protect Yourself and Report Phone Scams

If you get a call like this, simply hang up the phone. You can also add your phone number to the National Do Not Call Registry. However, scammers probably won’t heed that warning. If your phone service offers call blocking, use that to stop them from calling you. Some other tips are:

  • Don’t trust your caller ID, phone numbers can be spoofed (made to look legitimate).
  • If you paid a scammer with a credit or debit card, contact your bank and stop payment. Also, have them cancel the card and re-issue a new one.
  • If you paid with a prepaid gift card, contact the issuing company and let them know as well.
  • If you paid via wire transfer, contact the service immediately
In some cases, like the tech support scam, the perpetrator will ask for permission to access your computer. Once they have it, they will install malicious viruses or malware to take control. If you allowed them control, run a deep virus scan using your antivirus software. You may also need to contact a computer specialist to be sure it is clean. Additionally, take the steps below:
  • Change all your passwords on any login accounts and your computer. Make them very strong passwords using a complex combination of letters, numbers, and symbols.
  • Put a freeze on your credit and sign up for credit monitoring with a reputable company like IDStrong.com.
  • Report the scam to the FTC at ftc.gov/complaint.
When someone calls you out of the blue asking for information, donations or starts threatening you, let that be a red flag, it is probably a scam and you need to take action quickly to end the call before it’s too late.
About the Author
IDStrong Logo

Related Articles

4 Most Common Bitcoin Scams

Scams are creeping into all areas of life these days. Any new type of technology is at risk. Bitco ... Read More

Romance Scams, The Love to Escape from

Scams have been around a long time, that’s nothing new. One of the most disturbing and heartbrea ... Read More

Top 6 Craigslist Scams and How To Avoid It

Craigslist is a website used for localized classified ads. It was founded in 1995 by Craig Newmark ... Read More

Common PayPal Scams & How to Prevent Them

PayPal is one of the top digital currency exchanges in the world. Nearly everyone has heard of Pay ... Read More

Cash App Scams: What to do if You've Got Scammed Through Cash App

Peer-to-peer payment apps are all the rage these days. People use them for swapping money back and ... Read More

Latest Articles

What is Single Sign-On: The Benefits and Importance of Implementing SSO

What is Single Sign-On: The Benefits and Importance of Implementing SSO

Every day, more people get online - most do it for leisure, but organizations are increasingly moving into the digital environment.

Personal vs Sensitive Personal Information (SPI): What’s the Difference

Personal vs Sensitive Personal Information (SPI): What’s the Difference

What is there to know about a person? Certainly, their name, but how about their affiliations, philosophical beliefs, or sexual orientation?

What Is An On-Path Attack and How Does It Work? 

What Is An On-Path Attack and How Does It Work? 

Suppose someone left their home, got in their car, and drove to the grocery store. Much like data packets that travel over Internet highways, the car will use various pathways to reach its destination; however, once the car gets to the store, a question remains: what happened between the generating point and the destination?

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Free Identity Exposure Scan
Instantly and Securely Check if Your Personal Information is Exposed on the Dark Web or Sold by Data Brokers
Please enter first name
Please enter last name
Please select a state
Close
Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close