How to Detect Scammer Numbers and Report Phone Scams

  • By David Lukic
  • Published: Dec 28, 2020
  • Last Updated: Mar 18, 2022

Phone scams are nothing new, but the perpetrators have become wilier and more sophisticated, using a variety of techniques to separate hard-working individuals and their money. Unfortunately, often, these types of scams target the elderly and people who cannot afford to lose their life savings. The statistics are astounding. About one in six Americans have lost money to a phone scam. These criminals use spoofed phone numbers so that it looks like the call is coming from a real source, when in fact it is scammer numbers.

Some of the Most Common Scams

Just about everyone has received the prank call that is a recorded voice saying it’s calling from the IRS, and you are in big trouble and about to be arrested if you don’t hurry up and call the number provided. Of course, it’s all a scam to get you to pay some fictitious taxes, penalties, and fees that scammers will abscond with. Some of the other top phone scams going around now are:

  • Technical support calls (from Microsoft or Apple).
  • Fake charity and donations calls (natural disaster recovery).
  • Lottery scams.
  • Family members in peril (grandson calling grandma).
  • Bank fraud calls.
  • Insurance, health care, and debt scams.
  • Website password requests.
  • Fake customer requests.

The FTC has received thousands of reports of U.S. citizens who have lost money to scammer numbers of the types listed above. Regardless of whether or not they try to threaten you or appear kind and helpful, hang up the phone. You do not need to engage with these criminals. The longer you stay on the phone, the more leverage they may have in getting you to act.

The criminals either want to steal your identity or your money. When their goal is the former, they will request verification of details like your social security number, birth date, mother’s maiden name, and other information. If all they want is your money, they will ask for credit card payment or ask you to wire funds or purchase prepaid gift cards to acquire some goods or services.

Some Signs of a Phone Call Scam

Phone scammers either use sweetness or threats to get you to comply. However, right off you can tell if it is a scam by perusing this list:

  • There is an urgency to whatever the person wants from you. Nothing is that important that it needs to be done or purchased immediately. This urgency is a tip-off that it is a scam.
  • If they threaten that you will be arrested, rest assured, the IRS never calls and never sends the police right over. It takes months of paperwork and late notices before anything happens with the IRS.
  • If they request you send money urgently with a prepaid card or wire transfer, it is a scam.
  • Most companies will never call you to have you verify your identity or provide sensitive personal information over the phone. Do not engage with these scammers.

how to report a scammer

How to Protect Yourself and Report Phone Scams

If you get a call like this, simply hang up the phone. You can also add your phone number to the National Do Not Call Registry. However, scammers probably won’t heed that warning. If your phone service offers call blocking, use that to stop them from calling you. Some other tips are:

  • Don’t trust your caller ID, phone numbers can be spoofed (made to look legitimate).
  • If you paid a scammer with a credit or debit card, contact your bank and stop payment. Also, have them cancel the card and re-issue a new one.
  • If you paid with a prepaid gift card, contact the issuing company and let them know as well.
  • If you paid via wire transfer, contact the service immediately
In some cases, like the tech support scam, the perpetrator will ask for permission to access your computer. Once they have it, they will install malicious viruses or malware to take control. If you allowed them control, run a deep virus scan using your antivirus software. You may also need to contact a computer specialist to be sure it is clean. Additionally, take the steps below:
  • Change all your passwords on any login accounts and your computer. Make them very strong passwords using a complex combination of letters, numbers, and symbols.
  • Put a freeze on your credit and sign up for credit monitoring with a reputable company like IDStrong.com.
  • Report the scam to the FTC at ftc.gov/complaint.
When someone calls you out of the blue asking for information, donations or starts threatening you, let that be a red flag, it is probably a scam and you need to take action quickly to end the call before it’s too late.
About the Author
IDStrong Logo

Related Articles

4 Most Common Bitcoin Scams

Scams are creeping into all areas of life these days. Any new type of technology is at risk. Bitco ... Read More

Romance Scams, The Love to Escape from

Scams have been around a long time, that’s nothing new. One of the most disturbing and heartbrea ... Read More

Top 6 Craigslist Scams and How To Avoid It

Craigslist is a website used for localized classified ads. It was founded in 1995 by Craig Newmark ... Read More

Common PayPal Scams & How to Prevent Them

PayPal is one of the top digital currency exchanges in the world. Nearly everyone has heard of Pay ... Read More

Cash App Fraud: What to do if You've Got Scammed Through Cash App

Peer-to-peer payment apps like Cash App, Venmo, Zelle, Apple Pay, Google Pay, and Facebook Payment ... Read More

Latest Articles

Google Voice Scams: What They Are and How to Stay Safe

Google Voice Scams: What They Are and How to Stay Safe

Google Voice scams continue to pose a risk for users of this service. Scammers continuously attempt to lure users into divulging their verification PIN code.

What Are Pretexting Attacks: Scam Types and Security Tips?

What Are Pretexting Attacks: Scam Types and Security Tips?

Have you ever received a text from someone you do not know? Did you become alarmed by the message? Did the message contain information about you and the people you know?

What is a Time-based One-time Password (TOTP)?

What is a Time-based One-time Password (TOTP)?

Authentication is the process that verifies the user's identity to control access to resources, prevent unauthorized users from gaining access to the system, and record user activities (to hold them accountable for their activities).

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Notice

By proceeding with this scan, you agree to let IDStrong run a Free Scan of supplied parameters of your personal information and provide free preliminary findings in compliance with our Terms of Use and Privacy Notice. You consent to us using your provided information to complete the Free Scan and compare it against our records and breach databases or sources to provide your Free preliminary findings report.

Rest assured: IDStrong will not share your information with third parties or store your information beyond what is required to perform your scan and share your results.

Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close