The Most Popular Money Transfer Scams

By 
Matt Di Vincere (Chief Editor)
Last Edited May 15, 2023

Money transfer scams continue to pose a significant threat in the digital era, with internet fraudsters frequently exploiting unsuspecting individuals and businesses when it comes to international money transfers or domestic. Understanding how to avoid money transfer scams and protect yourself from money transfer fraud is a crucial aspect of online financial safety.

Falling victim to common money transfer scams can lead to feelings of vulnerability and financial loss, prompting a vital need for effective money transfer fraud prevention. It’s essential to arm yourself with knowledge to shield your hard-earned money from potential scams.

As a foremost resource for international money transfers, we provide an extensive, searchable database encompassing all known money transfer scams, including money transfer scams exposed and money transfer scams statistics. This up-to-date and user-friendly resource will equip you with the necessary knowledge to defend against fraud. If you’ve encountered any scams, we welcome you to share your experience in the comment section, aiding in maintaining our comprehensive database.

Top Money Transfer Scams :

  • Careful Who You Trust: Emails Scams
  • Fake Invoices or “Whaling”
  • Supply and Business Scams
  • Job Scams
  • Prepayment Fraud
  • App Fraud
  • Cryptocurrency Scams
  • Fake prizes
  • The Nigerian Inheritance Scam
  • Telephone Marketing Scams
  • Untrustworthy Payment Systems
  • Illegal Services and Goods
  • The Missing Item Scam
  • Vishing
    • Careful Who You Trust: Emails Scams

      Scam Basis:

      victim side
      • Carelessness
      • Digital Illiteracy
      • Inattentiveness
      scammer side
      • Social engineering

      Loss Potential:

      100 -500 USD

      Prevalence:

      Average

      Mode of engaging:

      Active

      Threat Level:

      Above average
      Oftentimes scam artists will use a familiar email address, such as one that might look like your boss’s or a friend. They will ask for money to be urgently transferred, and the request will come with very specific instructions or emotional pleas. Usually, the first clue is the emergency nature of the request. Perhaps they are stuck somewhere and need to catch a flight or pay for a hotel. Other times they may be asking for a personal favour. The fake situation can be anything, from business to home or family. One of the setbacks of doing business in today’s fast-paced and modernized world is that you may not know everyone on your team. Companies and co-workers are often located across the globe and in vastly different time zones. That can make verifying an email request, especially one labelled urgent, very tricky as communication is often delayed. A good example of this would be a scammer posing as a co-worker and emailing you for urgent help. When getting an email from a colleague or a friend, be sure to verify with the person through other communication means before sending any money. Keep in mind that such attacks can happen using emails you already know if your friend has been hacked. Also question any “urgent” need for money, and verify with the supposed sender before taking action. >>> Attention! Such cases are especially dangerous when emails come from real hacked email accounts.
      Key Indicators
      • Being rushed along
      • Uncharacteristic behaviour
      • Request to bypass standard procedures
      How to protect yourself
      • Confirm and doublecheck
      • Communicate via a different channel to verify authenticity
      • Initiate the communication from your end
    • Fake Invoices or “Whaling”

      Scam Basis:

      victim side
      • Inattentiveness
      scammer side
      • Forgery

      Loss Potential:

      100 - 1m USD

      Prevalence:

      Above average

      Mode of engaging:

      Active

      Threat Level:

      Above average
      In the same way that a scammer may use an email from the head of the company to try to con employees, they can also target other specific areas of a company. Financial departments can be particularly vulnerable to a method called “whaling.” This is when a scammer gets their hands on real email accounts within a company and uses them to file fake invoices. Invoices may end up in the hands of other employees or even outside companies. Scammers often use a company’s own letterhead or standardized accounting forms, changing only a few words. If you think an invoice you’ve received has been forged or sent by scammers, always be sure to report this and verify. Con artists and thieves will move on from a new target only once they’ve been discovered. Otherwise they may try this trick multiple times.
      Key Indicators
      • Altering account info
      • Uncharacteristic behaviour
      • Altering account info
      How to protect yourself
      • Only use verified software you are familar with for payments.
      • Use multi-step payment confirmation
    • Supply and Business Scams

      Scam Basis:

      victim side
      • Frugality
      scammer side
      • Social engineering

      Loss Potential:

      100 - 300 USD

      Prevalence:

      Very Low

      Mode of engaging:

      Active

      Threat Level:

      Average
      With this con, the first step is that a person will be approached by someone claiming to be a representative for another company, usually offering services and goods. The representative will offer the potential customer all kinds of discounts and promotions, tailoring the sales conditions to make them just right. In the end, they will offer to give you not the company’s account to pay but their personal one, using the excuse of a killer discount or free stuff. Once payment is received, the scammer disappears. This scam is seen the most often and more frequently in the world of crypto-currency. Participants in crypto transactions are usually anonymous, making it impossible to identify or verify the person posing as a representative of a company except by contacting the business separately yourself. Here is an example of a very common type of scheme. One day my friend received an offer for his Discord channel. A popular YouTube blogger was offering to make a film about his current work. Their channel had thousands of subscribers and millions of views, and the blogger was offering all this publicity for an incredibly low amount. The one condition was that a partial pre-payment was required. My friend took it upon himself to find the Facebook account of the blogger and wrote him personally about the offer. The blogger replied that he had no idea what he was talking about. It turned out he never did commercial video offers, and there was no buying access to subscribers. The person claiming to be him had co-opted his name simply for the recognition.
      Key Indicators
      • Too good to be true
      • Uncharacteristic behaviour
      • Request to bypass standard procedures
      How to protect yourself
      • Be careful with offers that sound too good to be true
      • Avoid unofficial or illegal procedures
      • Communicate via a different channel to verify the authenticity
    • Job Scams

      Scam Basis:

      victim side
      • Fear
      • Greediness
      scammer side
      • Abuse of trust

      Loss Potential:

      10 - 50 USD

      Prevalence:

      High

      Mode of engaging:

      Combined

      Threat Level:

      Average
      Employment scams can be particularly brutal as they target vulnerable, desperate populations: the unemployed or those who live on the edge of job security, such as freelancers. There are a few different ways an employment scam can be run. For example, the scammer advertises that they need an employee for simple, easy work; all they need is their own computer. The interested victim fills out an application, providing personal information. Then they get a letter from the business in the mail. There’s work available, usually something mundane like typing or copying. But the catch is that in order to receive the work, the employer requires a deposit from the victim, sometimes to pay for a processing fee or postage. A scheme like this often sticks to small amounts under $20. The victim never receives the promised work, and the company disappears. Another version of this kind of scam is where the supposed employer requires that a job candidate give them money as a security deposit for work materials that never come, like a computer and office gear or a new cell phone. There are also lots of scams hiding out in the many freelancer-for-hire websites. Here, one person can directly hire another for a specific job, but many times clients disappear before paying, or they refuse to pay by claiming the work is bad quality. Because of this, many freelancers will only work with websites that reserve the payments from the clients before the work starts and hold it in reserve until the work is done.
      Key Indicators
      • A suspicious pretext for requesting money
      How to protect yourself
      • Never provide a deposit or pre-payment for employment
      • Research company information online to verify reputability
    • Prepayment Fraud

      Scam Basis:

      victim side
      • Sympathy
      • Fear
      • Baseless trust
      scammer side
      • Abuse of trust
      • Intimidation

      Loss Potential:

      1 - 1,000 USD

      Prevalence:

      Low

      Mode of engaging:

      Active

      Threat Level:

      Very Low
      Payment systems for services is a tool that scammers love to use. It can also take a few different forms. The Ask: This is a very straight-forward method as it directly asks the victims to transfer money. Sometimes this is framed as a loan; other times it may be asked under the pretext of pretending to be a non-profit or charity cause. Blackmail: After hacking into a victim’s accounts or computers, the scammer will threaten to reveal personal information or shaming media from the computer. If the victim hopes to stop it, the scammers will force them to transfer funds. It’s a simply, time-tested method, but blackmail unfortunately often works as many people fear the repercussions of not responding more than they care to call the police. Fraud: Scammers will sell services or goods but insist on partial deposit being paid up front. Then, of course, the goods do not appear, and the seller disappears. The goods offered are usually low-priced items, which many people will not dispute, such as phone accessories or tights. But this can be seen with high-end items as well, such as cars and motorcycles. Scammers often seek out ad portals that are buyer to seller direct and which do not require full verification of the buyer.
      Key Indicators
      • Being intimidated
      • Previously unheard of
      • Too good to be true
      • Uncharacteristic behaviour
      • Being intimidated
      How to protect yourself
      • Set up email and instant messaging accounts
      • Confirm and doublecheck
      • Avoid prepayment when possible
    • App Fraud

      Scam Basis:

      victim side
      • Baseless trust
      • Laziness
      • Digital Illiteracy
      scammer side
      • Malware
      • Abuse of trust

      Loss Potential:

      100 - 1m USD

      Prevalence:

      Low

      Mode of engaging:

      Combined

      Threat Level:

      High
      While companies like iTunes and Google Play do try to weed out the bad ones, fake apps are another way that scammers collect and steal data. Scammers will design an app that copies the same processes used by mobile banking and electronic transfers. Logging into the app and filling out a profile will often require the victim to give up sensitive information like payment card data, birthdate, and passwords. These fake apps are often very detailed and are designed to appear very real. They offer services like balances, money conversion, rollover credit debt, electronic payments, and Internet payments. As the victim sets up their profile, they are asked to provide username and password information to their bank accounts or even electronic accounts like PayPal. Apple and Google will usually eventually catch a fraud app and remove it from their stores but often not before it has claimed more than a few victims.
      Key Indicators
      • Soliciting sensitive info
      How to protect yourself
      • Research company information online to verify reputability
    • Cryptocurrency Scams

      Scam Basis:

      victim side
      • Baseless trust
      scammer side
      • Malware

      Loss Potential:

      100 - 1m USD

      Prevalence:

      Average

      Mode of engaging:

      Active

      Threat Level:

      High
      Most people only know Bitcoin, but there are now many different kinds of cryptocurrencies in the world, and they are used by people to pay for everything from gaming to shoes. The basis of this scam is that in order to use a cryptocurrency, there is a particular application to download called the “wallet.” The wallet is used for making calculations. It connects you to the blockchain and allows you to make payments. If a fraud wallet app is downloaded, it can misdirect any cryptocurrency coming in to the wallet and can empty out the account. There are also many fraudulent cryptocurrency exchanges. These are sites where cryptocurrency can be exchanged, usually for services,but after a user sends payment to the scammers, nothing is returned or given in exchange.
      Key Indicators
      • Shoddy reputation
      • Request to bypass standard procedures
      How to protect yourself
      • Research company information online to verify reputability
    • Fake prizes

      Scam Basis:

      victim side
      • Greediness
      • Baseless trust
      scammer side
      • Social engineering

      Loss Potential:

      10 - 200 USD

      Prevalence:

      Low

      Mode of engaging:

      Passive

      Threat Level:

      Very Low
      Many Internet users are used to seeing these kinds of promotions: An online company announces they will be giving away one free laptop,but in order to qualify for the laptop, you will need to purchase something from them, like a cord or headset. The drawing, however, is never actually held, because there is no prize. The fact is, if it seems too good to be true, it probably is. Before entering any drawings, it is always a good idea to google the contest. If it seems like the contest has been running in several iterations for a long time, it is probably not legitimate.
      Key Indicators
      • Too good to be true
      • Being distracted
      How to protect yourself
      • Research company information online to verify reputability
      • Only trust parties you've worked with before
    • The Nigerian Inheritance Scam

      Scam Basis:

      victim side
      • Greediness
      • Baseless trust
      scammer side
      • Social engineering

      Loss Potential:

      200 - 1,000 USD

      Prevalence:

      High

      Mode of engaging:

      Active

      Threat Level:

      Very Low
      By now, most people are familiar with the “Nigerian emails” as an Internet meme. But despite laughing at them in concept, many people still fall for them. The letters are almost always in English, and they tell you that you have either won or inherited a lot of money. They’ll tell you that even though you are not familiar with this family member, they have been watching you and decided to leave you a ridiculous amount of money. All you need to do is take care of a small fee to activate the account, and afterward, the company will deposit your funds. This, of course, is not what happens. People who fall for this scam will often fill out paperwork with their personal information to authorize the “transfer” as well as send the money. When the initial scammer is done with the scam, having received the money, they can also turn around and sell the victim’s info to another scammer.
      Key Indicators
      • Too good to be true
      • Previously unheard of
      • Shoddy reputation
      • Suspicious pretext for requesting money
      • Being rushed along
      How to protect yourself
      • Never send money to strangers or unknown companies
      • Never feel rushed into a decision
      • Research company information online to verify reputability
    • Telephone Marketing Scams

      Scam Basis:

      victim side
      • Baseless trust
      • Frugality
      scammer side
      • Social engineering
      • Fake business

      Loss Potential:

      10 - 200 USD

      Prevalence:

      High

      Mode of engaging:

      Passive

      Threat Level:

      Low
      It is true that everyone these days seems to have a master class. People have figured out how to get paid for offering advice and techniques for topics like “Finding Happiness” or “Getting Married Before Thirty.” Not to mention the amount of diet fraud out there offering to help pounds melt off for the price of one class. Of course, we know rationally there are no miracle cures, whether or not we want to admit it. But the appeal is too much for many people, and they pay a lot of money for a few videos and a pamphlet. These scams remain effective because they loudly call out a hole inside of us, a secret shame or aspiration. They sell hope with the promise of quick, money-back rewards, but there is often nothing to be learned in classes like these that a savvy consumer couldn’t read about on the Internet after one basic search.
      Key Indicators
      • Too good to be true
      How to protect yourself
      • Never feel rushed into a decision
    • Untrustworthy Payment Systems

      Scam Basis:

      victim side
      • Inattentiveness
      • Digital Illiteracy
      • Baseless trust
      scammer side
      • Fake business

      Loss Potential:

      100 - 1m USD

      Prevalence:

      Average

      Mode of engaging:

      Active

      Threat Level:

      Above average
      Buying things online is always a risk unless you deal with large, well-known companies. Payment systems can have bugs or can be easily hacked. Others are simply fraudulent; owners will lie about the reliability of a system or deceive users about their process. A good example of this is the recent scandal of the StormPay system. The system was designed to be an international, open payment option,but it was never able to perform as well as its competitors, and eventually more funds were needed to keep development up. The company simply lied to users and closed down all accounts from specific countries. As a consequence, StormPay became nothing more than an auction trading portal and eventually shuttered its doors.
      Key Indicators
      • Losing account access
      • Payment delay
      • Shoddy reputation
      How to protect yourself
      • Research company information online to verify reputability
      • Read the latest news about the service
    • Illegal Services and Goods

      Scam Basis:

      victim side
      • Fear
      • Greediness
      scammer side
      • Fake business

      Loss Potential:

      100 - 1m USD

      Prevalence:

      Average

      Mode of engaging:

      Combined

      Threat Level:

      Above average
      Dealing with the black market is always a high risk for consumers. After all, with illegitimate products, there is no regulation and no consequence for being cheated. Illegal services can include under-the-table loans, sex work, drug trafficking, and illegal imports. When dealing with this kind of activity, it is incredibly easy for the seller to simply get your payment and disappear, leaving consumers out of luck. After all, the victim cannot go to the police without being at risk of being arrested for the attempted illegal practice themselves. Any black market transaction carries a high risk that you will be cheated, and therefore it is always safer to stick with legal methods. This wisdom is particularly true for transactions online, as there is even less accountability. But many people feel more comfortable attempting illegal transactions because it seems more private or safe since they do not need to see the person in real life and do not risk being robbed or attacked. Unfortunately, even though personal safety might be better, the risk to your financial information is much greater.
      Key Indicators
      • Explicitly illegal offer
      • Suspicious pretext for requesting money
      • Being rushed along
      • Being intimidated
      How to protect yourself
      • Avoid unofficial or illegal procedures
    • The Missing Item Scam

      Scam Basis:

      victim side
      • Sympathy
      • Baseless trust
      scammer side
      • Abuse of trust

      Loss Potential:

      10 - 300 USD

      Prevalence:

      Average

      Mode of engaging:

      Active

      Threat Level:

      Above average
      This particularly heartless method will capitalize on the victim’s vulnerability. Scammers will get in touch with people who have posted about finding an animal or perhaps an item like a stolen bike or cell phone. They can find these listings on message boards or posted on flyers. The important part is that the victim has offered a reward. Scammers will contact them and offer to return the item but only if the victim pays first. Then, once they get paid, the scammers disappear. Anyone who wants to return something to you out of the goodness of their heart will not demand payment up front. You should never pay a reward before you have verified that they have your item and you have the item in hand. After all, a reward is supposed to be an extra plus after the fact.
      Key Indicators
      • Suspicious pretext for requesting money
      • Limited communication
      How to protect yourself
      • Avoid prepayment when possible
      • Request additional proof before payment
  • Vishing

    Scam Basis:

    victim side
    • Baseless trust
    • Digital Illiteracy
    scammer side
    • Malware

    Loss Potential:

    100 - 1m USD

    Prevalence:

    Low

    Mode of engaging:

    Active

    Threat Level:

    High
    This is a new method and is a good example of how online scams are evolving constantly. With this kind of fraud, the scammer uses robotic programming to collect information from victims, like card and bank account numbers or permissions. Scammers began using IVR (interactive voice responses) a few years ago. The victims are called through the use of robotic programming. The automatic voice explains they are calling on behalf of the person’s bank for a made-up reason, and because they are robotic, people tend to believe it is actually their bank. To further that impression, the robotic voice can also redirect the victim on the phone to an actual “bank employee” who can get their personal details to resolve the issue. In this way, scammers are able to collect massive amounts of banking and credit card data.
    Key Indicators
    • Robocall
    • Soliciting sensitive info
    How to protect yourself
    • Never divulge sensitive information, like passwords.
    • Beware of automated robocalls

A Money Transfer Fraud Story

AI Generated Image based on Cook’s army photos from USA Today

In a heart-wrenching case of money transfer fraud, a 76-year-old decorated Navy veteran, Larry Cook, was scammed out of over $3.6 million through a series of international wire transfers, most of which were directed towards Thailand. An intricate web of phishing emails and loan repayments led him to transfer massive amounts to potential scammers abroad, raising serious questions about the effectiveness of banks in preventing such money transfer scams.

Despite Cook’s credit union reporting him to adult protective services, a whopping 42 more international wires were processed. Cook’s niece, Janine Satterfield, alleges that both Wells Fargo and the Navy Federal Credit Union failed to protect her uncle from this financial exploitation, leading her to take legal action against the institutions. The case sheds light on the escalating issue of elder financial exploitation and emphasizes the importance of understanding how to avoid money transfer scams.

This case, along with countless others, underlines the necessity for enhanced money transfer fraud prevention and an understanding of common money transfer scams. It’s a solemn reminder that we’re all just a click away from becoming victims. Learn more about this case and its potential implications for banking regulations and money transfer scams prevention [Source: USA Today/ By Amritpal Kaur Sandhu-Longoria].

Tips To Avoid Wire Transfer Scams

Being wary and taking necessary precautions to reduce your vulnerability and risk of falling prey to money transfer scams is crucial. Recovering your money once lost can be tough, and fixing the situation can be almost impossible.

Here are some tips to help you avoid money transfer scams:

Do A Background Check On The Recipient

The first thing to do to protect yourself from money scams is to ensure you know the person you’re sending money to. Preferably, stick to sending money only to people you have interacted with, know, and trust.

If you need to make a money transfer to someone you don’t know personally, try to do a background check to ensure it is safe to send them money.

Send Small Sums If You’re Unsure Of The Recipient

If you need to send money to an unknown person, your first step should be to do a background check on their legitimacy. After that, send small amounts in installments instead of sending the entire amount in one go, if it is a large amount. This will mitigate your loss in case it does turn out to be a scammer.

Be Wary of Deadlines

Scammers often create a sense of urgency to make you transfer money on an impulse without questioning their motives. Therefore, if they offer limited-time offers or other promotions that make you feel like you must act immediately, always pause to check their legitimacy.

Sometimes, they may extend deadlines despite making it sound like a limited-period offer to tempt you to transfer money. These are major red flags of a potential scam, and it’s always good to maintain caution when dealing with deadlines.

Never Share Confidential Information And Use A Secure Payment Method

Please don’t share your personal information; scammers may use it to impersonate or hack your accounts and access your funds. Furthermore, if you make wire transfers and online payments, always use a secure platform to ensure you don’t give illegitimate or suspicious apps access to your data. This can leave you vulnerable to scams, and you may risk losing your money.

Always use a secure payment method or platform that encrypts your data and safeguards it from hackers and fraudsters, who may transfer money from your account without permission.

What To Do In The Event Of A Bank Transfer Fraud

As vigilant as you may be, mistakes happen, and sometimes, it can be impossible to safeguard yourself from bank transfer fraud. Knowing how to reduce the damage and protect yourself against other scams is important in such a case.

Here are some things to keep in mind in the event of bank transfer fraud:

  • Contact your bank to try to stop the transfer if you have personally initiated it, and if that isn’t possible, ask them to block list the recipient account in question if they offer that service.
  • Report any unauthorized withdrawal or debit to your bank if you haven’t initiated a transfer but still find that funds are being removed from your account.
  • Report the incident to your local police and state consumer protection office, and file an official fraud report to ensure it is on record.
  • Contact your insurer to see if payment protection insurance covers your losses.
  • Don’t transfer any more money to unknown parties, as the scammer may be attempting to get more money out of you under the guise of helping you.
  • Change your passwords, PINs, and other security details and information to protect yourself against further fraud.

Final Thoughts

Transferring money to familiar individuals or trusted companies typically presents the safest route. However, it’s prudent to exercise caution if a recipient raises suspicion, given that money transfers are expedient and challenging to reverse, offering little chance for recovery.

Understanding how to avoid money transfer scams, protect yourself from money transfer fraud, and the steps to take if you’re a victim is paramount in safeguarding against fraudsters. Know d what to do and how to act by making yourself educated on the topic. Money transfer scams news and stories from money transfer scams victims highlight the importance of staying vigilant. With this knowledge, you can exercise discretion and secure your financial transactions

 

More similar posts:

The Most Popular Money Transfer Scams

Money transfer scams continue to pose a significant threat in the digital era, with internet fraudsters frequently exploiting unsuspecting individuals

Anti Money Laundering

Anti Money Laundering: How Does It Work And How Is It Regulated

Everything You Need to Know About Money Laundering and Regulations Money laundering is one of the most common financial crimes.

How to Transfer a Pension Abroad: Your Friendly Guide

If you’re planning on retiring abroad, getting your pension in order will be one of your top priorities. In this

International money transfer history and timeline

Were you wondering about the history of the international money transfer industry? When did people start to send money abroad

bitcoin for money transfers

Will Bitcoin and Blockchain take over money transfers (remittances and other payments)?

In 2008, bitcoin was born. Bitcoin is a completely digital currency – otherwise known as a cryptocurrency. Bitcoin not only

Subscribe
Notify of

27 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments