How to Spot a Fake Check

  • By David Lukic
  • Published: Oct 23, 2020
  • Last Updated: Mar 18, 2022

Fake check scams are nothing new, but according to the FTC, this practice is on the rise. FTC claims that they receive hundreds of thousands of complaints per year from U.S. citizens who have been robbed of hundreds and even thousands of dollars through fake check scams. 

Criminals are always looking for an angle to trick you into parting with your hard-earned money. Cashier’s checks and checks, in general, are thought by many people to be more secure, more dependable, and that is what the thieves are counting on when they engage you with this scam. 

Common Ways You Might Encounter Fake Check Fraud

fake check fraud

The Lottery Version of Fraudulent Check

You receive a check in the mail claiming you won the International Lottery or some other important sounding prize. The check you won is in your hands, but there is a catch. You have to pay taxes and fees. So, the paperwork instructs you to deposit your winnings and then send a small fee to cover these expenses. After you comply and a few days pass, you receive word from your bank that the fraudulent check bounced and was counterfeit. Now you are out the money you sent the scammers, you owe fees on the bounced check and have to cover the amount the bank lost. There are a few variations on this theme, but the basics persist. 

Overpayment Check Fraud

How it works is the scammer offers a check for something the victim is selling or renting online. They write the check for more than the asking price and provide some excuse for doing so. They then ask the seller to refund the overpayment, but in the end, their original fake check bounces, and the seller is out the refund, which was really just scam money. 

The Secret Shopper Check Fraud

The secret shoppers’ scam is when the victim is offered a job as a secret shopper. They are instructed to either buy goods and send them somewhere, or they are sent a check to test a money transfer service. They cash the check, take the money to a wire transfer service and send it along to the scammers. They are then supposed to write a review, but by the time they figure it out, the check they were sent has been identified as bogus, and they are out the cash they mailed off. 

How to Tell if a Check is Fake & How to Protect Yourself Against it

Although criminals are getting very sophisticated and using high-tech printing methods, to make a check look convincing, there are ways to spot a fake check.

  • Examine the check and look at the bank name. Use this resource to verify that it is a legitimate bank.

  • Contact the bank directly and ask if the check is real and that the funds are available to cover it.

  • If you received the check without entering any contest, or applying for a job, it’s probably a fake. Use common sense and not emotion when determining if the check is fake or not.

  • Also check the postmark on the envelope to see where it came from.

  • If the check is above the amount it should be (for the overpayment scam), do not deposit or cash it. Instead, contact the buyer and have them issue another one for the exact amount. If you never hear from them again, it was a scam.

  • The FDIC warns to look for watermarks, security threads, color-changing ink, and other security features on the check. 

  • Throw out any prize winnings or foreign lottery notifications.

  • You will never be asked to pay for anything upon winning a prize; it’s a financial scam.

  • Never send money to strangers. 

  • Take the check to your local bank and have them examine it.

  • If you are selling something, use an escrow service of your choice to protect your identity.

What to Do if You Are a Victim of a Fake Check Fraud

It’s easy to get excited when you receive money in the mail that you were not expecting. Thousands of Americans are taken in each year by these types of scams. If you are a victim of a fake check scam, here is what to do:

  • Contact your bank and explain the situation. You may be responsible for fees and paying back the funds.

  • Report it to the Federal Trade Commission.

  • Also report the incident to the U.S. Postal Inspection Service.

  • Visit this link to find the appropriate local Attorney General’s office where you can also report your victimization.

You cannot be too careful these days. Remember, nothing is for free, and companies don’t just give out prizes to strangers for no reason. Always be on the lookout for scams.

About the Author
IDStrong Logo

Related Articles

Secure Wi-Fi and Wireless Technology Security Tips

Your Wi-Fi network is another handy access point that hackers use to infiltrate your computers, st ... Read More

How Does a VPN Work and How to Choose one

VPN stands for virtual private network. It allows you to hide your public IP address and browse pr ... Read More

Complete Guide to Android Security

The Android platform offers a ton of flexibility and customization for users. However, all that fr ... Read More

Increase Your Google Privacy Settings in 4 Easy Steps

In this time of digital transparency and data breaches, it’s more important than ever to fee ... Read More

Instagram Privacy Policy: What You Should Know?

Instagram is a great place to share your best photos and messages with your followers, but have yo ... Read More

Latest Articles

What is Single Sign-On: The Benefits and Importance of Implementing SSO

What is Single Sign-On: The Benefits and Importance of Implementing SSO

Every day, more people get online - most do it for leisure, but organizations are increasingly moving into the digital environment.

Personal vs Sensitive Personal Information (SPI): What’s the Difference

Personal vs Sensitive Personal Information (SPI): What’s the Difference

What is there to know about a person? Certainly, their name, but how about their affiliations, philosophical beliefs, or sexual orientation?

What Is An On-Path Attack and How Does It Work? 

What Is An On-Path Attack and How Does It Work? 

Suppose someone left their home, got in their car, and drove to the grocery store. Much like data packets that travel over Internet highways, the car will use various pathways to reach its destination; however, once the car gets to the store, a question remains: what happened between the generating point and the destination?

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Free Identity Exposure Scan
Instantly and Securely Check if Your Personal Information is Exposed on the Dark Web or Sold by Data Brokers
Please enter first name
Please enter last name
Please select a state
Close
Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close