Skip Navigation Documents in Portable Document Format (PDF) require Adobe Acrobat Reader 5.0 or higher to view,download Adobe® Acrobat Reader.
FDIC-Insured - Backed by the full faith and credit of the U.S. Government
Park State Bank
LOGIN

Fraud Education Center

Wooden blocks that spell the word fraud with a magnifying glass in the background

LEARN HOW TO protect yourself from FRAUD.


Contact Us


Welcome to Park State Bank’s Fraud Education Center, your go-to resource for staying informed and protecting yourself from fraud and scams. We’re committed to keeping you safe, so check back often for new updates and helpful tips.

RECOGNIZE TAX SCAMS AND FRAUD

GOT A TEXT ABOUT UNPAID TOLLS? IT'S PROBABLY A SCAM 

BUSINESS EMAIL COMPROMISE - HOW TO PROTECT YOURSELF 

DON'T ANSWER ANOTHER ONLINE QUIZ QUESTION UNTIL YOU READ THIS 

5 HOLIDAY SCAMS TO WATCH OUT FOR 

IDENTITY THEFT INFORMATION

HOW TO SAFELY USE MOBILE PAYMENT APPS & SERVICES 

STUDENT LOAN SCAMMERS ARE CIRCLING.  KEEP THEM AT BAY 

 

Identity Theft RESOURCES

You can call the Federal Trade Commission (FTC) Identity Theft Hotline toll free at 877-438-4338 or visit the following websites:
If you believe you are a victim of identity theft:
 

Fraud and Scam Reporting

Fraud Education

Blackmail or Extortion

Definition: The act of threatening to release sensitive, embarrassing, or explicit information about an individual unless a demand (usually money) is met.

Example: A hacker claims to have access to information, personal photos or videos and demands money to prevent them from being released to an unauthorized person(s).

Next Steps:

  1. Report to Authorities: Immediately contact your local law enforcement or cybercrime unit.
  2. Gather Evidence: Take screenshots, save emails, and record any communication as evidence.
  3. Change Accounts and Passwords: If your accounts were compromised, change your passwords immediately and enable two-factor authentication.
Business Email Compromise

Definition: A cybercrime where attackers use email to impersonate a trusted source to deceive companies into transferring money, making payments or otherwise disclosing sensitive information to them.

Example: A fraudster impersonates a trusted vendor and tricks the accounts payable department into making a payment to a fraudulent account.

Next Steps:

  1. Verify the Source: Contact the trusted source directly (using a known contact method) to confirm if the email request is legitimate.
  2. Report the Incident: If money was transferred, report it immediately to Park State Bank and law enforcement.
  3. Enable Email Security Measures: Use email filters, multi-factor authentication, and advanced security software to reduce the risk of future attacks.
Investment Scams (Pig Butchering)

Definition: Scammers pose as wealthy business professional or social media personality, in an attempt to deceive victims into making fraudulent investments, especially common by way of cryptocurrency.

Example: A scammer contacts you, pretending to be an affluent person, and convinces you to invest in a fake app that promises high returns.

Next Steps:

  1. Report the Scam: Report the scam to relevant authorities, such as the Federal Trade Commission (FTC) or your local consumer protection agency.
  2. Park State Bank or Crypto Platform: Notify us or your cryptocurrency platform about the fraudulent transaction to see if any funds can be recovered.
  3. Seek Legal Assistance: Consult with a legal professional if significant funds were lost, especially if there’s the potential to trace the scammers.
Charity / Holiday Scams

Definition: Fraudsters impersonate charitable organizations, especially during holidays, to solicit donations under false pretenses.

Example: A scammer sends an email asking for donations for a charity supporting disaster victims, but the money is pocketed by the fraudster.

Next Steps:

  1. Verify the Charity: Ensure the charity is legitimate by checking its credentials, such as its registered nonprofit status and reviews.
  2. Report to Authorities: Notify local authorities or consumer protection agencies if you suspect fraud.
  3. Monitor Your Accounts: Keep an eye on your financial accounts for any unauthorized transactions.
Cyberattack - Malware / Ransomware

Definition: An unauthorized intrusion where malicious software is used to disrupt, damage, or gain unauthorized access to a computer system, often encrypting data and demanding a ransom for its release.

Example: A pop-up is clicked which then infects the user’s device (i.e. computer, tablet, cellular device, etc) with a virus that steals information or locks the device.

Next Steps:

  1. Disconnect from the Network: Immediately disconnect the infected device from the internet to prevent further data theft or spread of malware.
  2. Report the Attack: Report the attack to local law enforcement or cybercrime agencies.
  3. Restore from Backup: If possible, restore your system or files from a clean, recent backup to minimize data loss.
  4. Do Not Pay the Ransom: Paying the ransom may not guarantee your files will be restored, and it encourages further criminal activity.
  5. Scan for Malware: Use reputable antivirus or anti-malware software to scan and remove any malicious software.
  6. Update Security Measures: Implement or update cybersecurity protocols such as firewalls, antivirus software, and regular backups to prevent future attacks.
Phishing / SMShing

Definition: Cybercriminals use emails or text messages to steal or compromise sensitive information.

Example: You receive an email or text that looks like it’s from a trusted source (i.e. credit card company, utility provider, or even Park State Bank), asking you to click a link and verify your account. The link is a phishing attempt that steals your login credentials.

Next Steps:

  1. Do Not Click on the Link: Avoid clicking on any suspicious links or opening attachments in phishing emails or text messages.
  2. Verify the Source: Contact the organization directly using trusted methods (such as their official website or phone number) to confirm if the communication is legitimate.
  3. Report the Phishing Attempt: Forward the suspicious email or text message to your email provider or telecommunications company to report it.
  4. Change Your Credentials: If you’ve accidentally shared login credentials, change your passwords immediately, and enable two-factor authentication on your accounts.
Debt Collection / Debt Settlement / Relief Scams

Definition: Fraudulent services promise to settle or reduce debt in exchange for upfront fees, but do not deliver any real help.

Example: A scammer promises to reduce your credit card debt by 50% for an upfront fee, but after you pay, they disappear and do nothing.

Next Steps:

  1. Do Not Pay Upfront Fees: Avoid paying any upfront fees for debt settlement or relief services, as this is a common sign of a scam.
  2. Contact Your Creditors Directly: Reach out to your creditors or loan providers to discuss payment options or negotiate directly with them.
  3. Report the Scam: File a complaint with the Federal Trade Commission (FTC) or your local consumer protection agency to help warn others.
  4. Check Your Credit Report: Regularly check your credit report to ensure no fraudulent activities or accounts have been opened in your name.
  5. Seek Legitimate Help: Consult a reputable nonprofit credit counselor for assistance with managing debt or improving financial health.
Fake Check Fraud

Definition: Scammers use counterfeit checks to trick individuals or businesses into accepting payments for nonexistent products or services.

Example: A scammer buys something from you online and sends a fake check for more than the agreed price, asking you to refund the difference.

Next Steps:

  1. Do Not Deposit the Check: Do not deposit the counterfeit check or send any money, even if the scammer insists.
  2. Verify the Check: Contact the Park State Bank directly to verify the authenticity of the check before proceeding with any transaction.
  3. Report the Fraud: Notify the relevant authorities, such as your local law enforcement or the U.S. Postal Inspection Service, if the fraud involved mailing.
  4. Protect Your Bank Account: Inform your us about the incident and monitor your accounts for any unauthorized transactions.
Fake Job Scams

Definition: Fraudulent job offers or investment schemes that promise high earnings but ultimately exploit the victim.

Example: You receive an email offering a job with a very high salary, but they require an upfront payment for training or equipment, and the job never materializes.

Next Steps:

  1. Do Not Pay for Job Offers: Never pay upfront for training, equipment, or any other fees related to a job that you’ve been offered.
  2. Research the Company: Verify the legitimacy of the company and the job offer by researching them online or checking reviews.
  3. Report the Scam: Report the fraudulent job offer to your local consumer protection agency, the Federal Trade Commission (FTC), or the job board where the scam originated.
  4. Monitor Financial Accounts: Keep an eye on your bank accounts for any signs of unauthorized payments or identity theft.
Family or Friend in Crisis Scams

Definition: Scammers pose as family members or friends in urgent need of money, often by creating a fabricated crisis.

Example: A scammer calls, pretending to be your grandchild, claiming they're in a car accident and need money to pay for bail.

Next Steps:

  1. Verify the Situation: Call or text the person directly using a known number to confirm if they are truly in crisis.
  2. Do Not Send Money Immediately: Never send money or share financial details without verifying the situation first.
  3. Alert Family Members: Let other family members or friends know about the scam attempt, so they can help investigate.
  4. Report the Scam: Report the scam to local law enforcement or consumer protection agencies.
Gift Card Scams

Definition: Fraudsters ask victims to purchase gift cards (e.g., Visa, Walmart) and send the codes as payment.

Example: A scammer pretends to be a government official or tech support, asking you to buy gift cards to settle a supposed fine or debt.

Next Steps:

  1. Do Not Buy Gift Cards: Never buy gift cards for someone you don't personally know or for an unexpected request.
  2. Verify the Request: Call or message the person directly using a known contact method to verify if the request is genuine.
  3. Report the Scam: Report the incident to the authorities, such as the Federal Trade Commission (FTC), and inform the store where the gift cards were purchased.
  4. Monitor Financial Accounts: Check your credit card or bank statements for any unauthorized transactions related to the scam.
Imposter Scams (Spoofing)

Definition: Scammers impersonate legitimate organizations, government entities, or technical support to trick victims into providing money or personal information.

Example: A scammer calls pretending to be from the IRS, demanding immediate payment for back taxes, threatening arrest if not paid.

Next Steps:

  1. Verify the Caller or Message: Contact the organization or entity directly using official contact information (e.g., website or phone number) to verify the legitimacy of the request.
  2. Do Not Provide Personal Information: Avoid sharing any personal, financial, or login details until you are certain the request is legitimate.
  3. Report the Scam: Report the incident to relevant authorities, such as the Federal Trade Commission (FTC) or local law enforcement.
  4. Block the Scammer: Block the number or email address from which the fraudulent communication was received.
Lottery / Prize Scams

Definition: Scammers claim you’ve won a lottery or prize but require a fee or personal information to claim the winnings.

Example: You get an email claiming you’ve won a large sum of money, but they ask you to pay a "processing fee" before you can receive the prize.

Next Steps:

  1. Do Not Pay Any Fees: Legitimate lottery or prize winnings never require payment of a processing fee or tax upfront.
  2. Verify the Prize: Check the legitimacy of the prize by contacting the official lottery organization directly using their official website or customer service.
  3. Report the Scam: Report the fraudulent claim to the relevant authorities, such as the Federal Trade Commission (FTC), or the lottery provider.
  4. Block the Scammer: If the scammer contacted you via phone, email, or text, block them to avoid further communication.
Money Mule Scams

Definition: Scammers recruit individuals to transfer illegally obtained money from one account to another, often using services like PayPal, Venmo, or CashApp.

Example: A scammer asks you to receive money via PayPal and then transfer it to another person, not knowing it’s illicit.

Next Steps:

  1. Stop All Communication: Cease all communication with the scammer immediately and stop transferring any funds.
  2. Report the Scam: Contact the authorities, such as the Federal Trade Commission (FTC) or your local law enforcement, to report the situation.
  3. Monitor Financial Accounts: Keep an eye on your bank accounts and payment services for unauthorized transactions or suspicious activity.
  4. Notify Park State Bank or Payment Provider: Inform us or service like PayPal, Venmo, or CashApp that you’ve been involved in a scam.
Rental / Vacation Rental Scams

Definition: Fraudsters post fake vacation rentals online, collecting payment without providing the promised accommodation.

Example: You find a great vacation rental online, send payment, but upon arrival, there’s no property, and the listing is gone.

Next Steps:

  1. Verify the Listing: Research the rental property or check for reviews from legitimate sources before sending any money.
  2. Use Trusted Platforms: Always use reputable booking sites that offer buyer protection when booking vacation rentals.
  3. Report the Fraud: Report the scam to the website or platform where the listing appeared, as well as to consumer protection authorities.
  4. Request a Refund: If you’ve already paid and the listing is fraudulent, try to contact the payment provider or platform to request a refund.
Romance Scams

Definition: Scammers create fake online relationships to manipulate victims into sending money for fake emergencies or trips.

Example: You meet someone online, and after a few months of "chatting", they ask you for money to visit you.

Next Steps:

  1. Stop Communicating: Cease communication with the scammer immediately and avoid sending money.
  2. Report the Scam: Report the scam to your local law enforcement, as well as to the Federal Trade Commission (FTC).
  3. Inform the Dating Platform: If you met the scammer on an online dating site, report the profile to the platform for review and removal.
  4. Review Your Finances: Check your financial accounts for any unauthorized transactions and report them to us or your payment service.
Selling Nonexistent Goods or Services (Ticket Sales Scams)

Definition: Fraudsters promise to sell goods, services, or event tickets that do not exist.

Example: You pay for concert tickets online, but the tickets are fake, and the seller disappears after receiving payment.

Next Steps:

  1. Do Not Pay for Tickets in Advance: Avoid paying for event tickets or goods until you are certain the seller is legitimate, and the items are real.
  2. Verify the Seller: Research the seller, read reviews, or check with official ticket vendors to confirm the validity of the listing.
  3. Report the Fraud: Report the fraudulent seller to the platform or website where the listing was found, as well as to local authorities or the consumer protection agency.
  4. Request a Refund: If you paid for fake tickets, try to request a refund from the platform or payment provider used for the transaction.