Scam Encyclopedia
Comprehensive guides covering 200+ scam types across 15 categories. Learn to recognize, avoid, and report every type of fraud.
201
Scam Types
15
Categories
12
Languages
24/7
Updated Daily
Honeypot Token Scams: How Scammers Lock Your Crypto
Honeypot tokens appear to be legitimate cryptocurrency investments but contain hidden code that prevents you from selling or withdraws your funds when you try to exit.
Rug Pull Scams: How Crypto Exit Fraud Works
Rug pulls are cryptocurrency scams where developers abandon projects and steal investor funds, often within days of launch.
Seed Phrase Phishing: Crypto Wallet Security Guide
Scammers trick cryptocurrency users into revealing their seed phrases, gaining complete control of digital wallets and stealing all assets.
Token Approval Exploit: How Scammers Drain Web3 Wallets
Attackers trick users into approving unlimited token transfers, then silently drain wallets without additional signatures.
Sextortion Scams: Online Blackmail & Extortion
Scammers claim to have intimate videos of you and demand payment to prevent public exposure. Most claims are false, but the psychological pressure is intense.
Romance Scam: How Fake Love Leads to Financial Loss
Scammers create fake dating profiles to build emotional bonds and manipulate victims into sending money, gifts, or personal information.
Sextortion Scams: How Criminals Exploit Intimate Images
Scammers threaten to expose intimate images to demand immediate payment, exploiting shame and fear to extort money from victims.
Virtual Kidnapping Scams: Extortion Through False Abduction
Scammers falsely claim your loved one has been kidnapped and demand immediate ransom payment before you can contact them.
Business Email Compromise (BEC) Scams
Sophisticated criminals impersonate executives to trick employees into transferring large sums of money or sensitive data.
CEO Fraud: How Scammers Impersonate Executives
CEO fraud tricks employees into sending money by impersonating company leaders. Average losses exceed $50,000 per incident.
Reshipping & Money Mule Scams: Avoid Fraud Employment
Scammers pose as employers to recruit you as a 'money mule' or reshipping agent, making you complicit in money laundering and theft.
Ransomware Attacks: Protect Your Data from Digital Extortion
Ransomware encrypts your digital files, demanding payment to restore access, leading to significant financial loss and data disruption.
Remote Access Trojan (RAT) Scams
Remote Access Trojans (RATs) allow scammers to take full control of your computer, stealing data, installing malware, and causing significant financial and privacy damage.
Account Takeover (ATO) Scams: Protect Your Digital Life
Account Takeover (ATO) scams involve criminals seizing control of your online accounts to steal money, personal data, or commit further fraud.
Biometric Data Theft: Protecting Your Unique Identity
Biometric data theft involves criminals stealing your unique biological identifiers like fingerprints or facial scans to impersonate you, leading to severe financial and identity fraud.
Child Identity Theft: Protecting Your Child's Future
Child identity theft occurs when a criminal uses a minor's personal information to open accounts, obtain loans, or commit crimes, often going undetected for years.
Criminal Identity Theft: Clear Your Name
Criminal identity theft occurs when someone uses your personal information during an arrest or criminal investigation, creating a false criminal record in your name.
Medical Identity Theft: Protect Your Health & Finances
Medical identity theft occurs when criminals use your personal information to obtain medical services or drugs, leading to financial ruin and compromised health records.
Synthetic Identity Theft: How Scammers Create Fake Identities
Criminals blend real and fabricated personal information to create entirely fictional identities for fraud. This sophisticated scam costs victims and institutions billions annually.
Fake Pharmacy Scams: Counterfeit Drugs Online
Scammers pose as legitimate pharmacies to sell counterfeit, expired, or dangerous medications online, putting your health and wallet at risk.
Stem Cell Therapy Fraud: Identifying Illegal Treatments
Scammers pose as legitimate clinics offering unproven stem cell treatments for incurable diseases, charging thousands while causing serious harm.
AI-Powered Phishing: How Scammers Use AI to Target You
Scammers deploy artificial intelligence to create highly personalized phishing attacks with deepfake videos, customized emails, and voice impersonation that fool even cautious users.
Deepfake Video Impersonation Scams
Criminals use AI-generated deepfake videos to impersonate executives, celebrities, and trusted figures to deceive victims into sending money or revealing sensitive information.
Deepfake Voice Cloning Scams: AI Impersonation Fraud
Scammers use AI to clone your loved one's voice and demand urgent money, creating convincing emergency scenarios in minutes.