🐶 Fraud Friday Alert: Fake Pet Deposit Scams
🚨Here's How It Works:
-
You find a cute puppy/kitten listed on a Facebook page or Marketplace.
-
The page looks real — photos, “testimonials,” and friendly messages.
-
You’re asked to pay a deposit to “hold the animal.”
-
After payment, the seller ghosts you — or gives excuse after excuse.
✅ How to Protect Yourself:
-
Never send deposits to people you’ve only messaged online.
-
Reverse image search pet photos to see if they’re stolen.
-
Ask to video chat with the pet and see it live.
-
Be suspicious of pages with few followers or recent posts.
-
Visit in person when possible — or use a verified breeder or rescue.
Remember: If it seems too cute to be true, it probably is.
🦴 Stay smart. Share this with a fellow animal lover.
🚨 Fraud Friday: U.S. Cyber Risk Level Is Elevated
🔐Cybersecurity officials have raised the national cyber threat level due to a rise in coordinated attacks targeting banks, businesses, and government systems.
💡What this means:
Cybercriminals are becoming more aggressive and sophisticated in their attempts to steal personal and financial information.
🛑 Why now?
Recent global events—including geopolitical tensions, high-profile data breaches, and an increase in ransomware and phishing campaigns—have led to a spike in cybercrime activity across the U.S.
💡 How this affects you:
Scammers are taking advantage of the chaos, sending more convincing fake emails, texts, and calls to try to steal your personal and financial information.
🔸 How we’re responding:
Our systems and security teams are on high alert, monitoring 24/7 and taking all necessary precautions to protect your information.
✅ How to protect yourself:
- Don’t click on links or attachments from unknown sources
- Be wary of messages claiming to be from your bank or government
- Use strong, unique passwords and turn on multi-factor authentication
- Check your accounts often and set up alerts for unusual activity
🏦 Reminder: We will never ask you for your password, PIN, or verification codes by phone, text, or email.
⚠️Don’t Use P2P? You’re Still a Target
Think you’re safe because you don’t use payment apps? Think again. Fraudsters are getting creative.
Peer-to-peer (P2P) payment apps like Venmo, Cash App, Zelle®, and PayPal make it easy to send money instantly — but that convenience can come with serious risks. Once you send money, it’s usually gone for good, and scammers know it.
Unfortunately, P2P fraud is one of the hottest trends among cyber criminals. Even if you don’t use P2P, you can be a victim. A whopping 74% of Americans say they have received a scam text this year, while 83% have received a scam phone call. In a recent six-month period, the U.S. Federal Trade Commission saw more than that cost victims about $108 million.
🦹The Scam Playbook
P2P fraud often begins through a text message asking whether a transaction looks familiar. When you reply, the fraudster calls and explains that they are there to help. They often share information they know about you—such as phone number, address, birthday and more—which is easy to find on the internet. Finally, they attempt to get your password or have you reset it. They may even ask you to transfer money.
Sometimes scammers will pose as legitimate business and ask you to send a P2P payment for a good or service but never send the good or service after they receive payment.
Another common scam involves a fraudster “accidentally” sending you a P2P payment and asking you to send the money back, or they may overpay you for something you’re trying to sell online. This mistake of sending money might seem innocent, but the scammer likely deposited the money into their account from a stolen credit card or bank account. If the P2P platform eventually flags the transaction as fraud, it could hold you responsible for repaying those funds. Instead of sending the money back, always contact the P2P service directly to remedy the error.
😡Real-Life Example
Someone selling concert tickets online asks for payment via a P2P app. You send the money — but the tickets never arrive. The seller vanishes. There’s no refund, and no way to track them down.
💡 Why Use Your Bank’s P2P Over Third-Party Apps?
While apps like Venmo®, Zelle®*, and Cash App® are popular, they’re not all created equal — especially when it comes to security and accountability.
If your bank offers a P2P payment option inside your online or mobile banking, here’s why you should use it:
✅ Built-In Bank Protection
Your bank’s P2P tool is connected directly to your account — no third parties involved. That means:
- Better fraud monitoring
- More secure transactions
- Direct customer support if something goes wrong
🔐 Stronger Security
Because it’s within online banking, it’s protected by the same multi-layered security you already trust with your money.
🛡️ Fewer Scams, More Control
Scammers often target third-party apps. Your bank’s system reduces exposure to fake accounts and phishing tricks.
📞 Real Support, Real People
Having a problem? You can talk to a real person at your bank, not a chatbot or a generic help center.
👉 Bottom Line:
If your bank offers a P2P payment option, it’s the safest place to start. It may not have emojis or friend feeds — but it has something better: protection and peace of mind.
🔍How to Prevent P2P Fraud
🏃♂️The fast track…
✅ Only send money to people you know and trust
✅ Double-check usernames, phone numbers, and email addresses
✅ Never pay for goods or services from strangers through a P2P app
✅ Ignore urgent requests that pressure you to send money quickly
✅ Don’t share your verification codes or PINs — ever
🔍P2P Fraud Prevention
🤿The Deep Dive...
1. Enhance Security for Your Accounts 🛡️
Check the settings on your digital banking account and enable all security features, especially multi-factor authentication (MFA). MFA makes it more difficult for a hacker to gain account access by requiring a third piece of authenticating information that supplements usernames and passwords. Typically, this third piece of information is a code sent via text, phone call or email.
2. Keep Your Password to Yourself 🤫
Never share your password with anyone. No financial institution should ever ask you for your password.
Further, ensure your digital banking password is secure and use unique passwords for all important accounts. Ideally, your password should be at least 15 characters. And while password length is important, complexity amplifies strength. To maximize security, consider using a passphrase or complete punctuated sentence. Your passwords should not contain any identifying information, such as a spouse’s name, important dates, hobbies, etc.
3. Avoid Suspicious Links 🤔🤨
Never click on a link sent to you in a text or email you weren’t expecting. Before clicking on any email link, hover over it with your mouse to see what site the link directs to. If the underlying address does not match the address in the email, do not click it. Verifying the link is legitimate by contacting the sender is always a safe measure.
4. Don’t Feel Pressured 🙅♂️🙅♀️
Don’t feel pressured during a conversation or when reading an urgent email. Fraudsters often use scare tactics or forced urgency to make you feel like you must act immediately. If someone urges you to act fast or emphasizes scary outcomes, their claims are likely fraudulent. Take a step back and evaluate the situation to avoid making decisions that might put you at risk.
Additionally, exercise caution if someone claiming to be from a financial institution pressures you for payment with an unexpected phone call or text. Typically, institutions send a written statement or correspondence via mail or email to alert you of payments.
5. Confirm the Caller 🔍
If someone claiming to be associated with a financial institution calls you to discuss potential fraud on your account, confirm that caller’s identity. Ask their name, then hang up and call the institution directly to ask for them. You can also call the number on the back of your card.
6. Never Send A Payment To Yourself💰
Never send a payment to yourself, especially at the direction of someone helping you. Fraudsters may call and impersonate your financial institution, claiming to alert you to suspicious activity on your account or to ensure your account isn’t frozen. These scammers often try to make you think you’re sending money to yourself when you’re sending money to them.
7. Stay Vigilant 👀
Fraudsters can spoof phone numbers to make it look like they are calling from your financial institution, so it’s important to stay vigilant. Spoofing is an effective way for cyber criminals to disguise their identity, allowing them to display what looks like a legitimate number on your caller ID. It may not be immediately apparent if a call is spoofed, so exercise caution when answering calls from unknown numbers and responding to requests for personal information.
Fraud Friday: When Love is a Lie – Watch Out for Romance Scams!

They pretend to love you… but they’re only after your money.
Romance scams are on the rise, and the emotional and financial toll they leave behind is devastating.
What is a Romance Scam?
A romance scam occurs when a criminal creates a fake online identity to gain a victim’s affection and trust. The scammer then manipulates the victim into sending money, gifts, or personal information — all under the false pretense of a romantic relationship.
Red Flags of a Romance Scam:
- They fall in love FAST – Within days or weeks, they’re professing deep love.
- They won’t meet in person – They claim to be overseas, in the military, or working on an oil rig.
- They avoid video calls – Excuses like bad internet or broken cameras are common.
- They ask for money – For travel, medical emergencies, visa issues, or a sudden “investment opportunity.”
- They isolate you – Discouraging you from telling friends or family about them.
- They spin emotional stories – Designed to manipulate your heart and your wallet.
Common Tactics Used by Romance Scammers:
- Fake profiles on dating sites or social media
- Phishing emails with flirty or romantic messages
- Stolen photos of real people (often models or military personnel)
- Promises of marriage or a future together
How to Protect Yourself:
✅ Never send money or gift cards to someone you haven’t met in person.
✅ Do a reverse image search of their profile photo.
✅ Be cautious if they quickly move the conversation off a dating app.
✅ Talk to someone you trust before taking any action.
✅ Report suspicious profiles to the platform you met them on.
Already Sent Money or Info?
- Act fast! Contact your bank, credit card company, or wire transfer service.
- Report it: ReportFraud.ftc.gov
Stay Safe Out There
Falling in love should never leave you broke or broken-hearted.
Spread the word – because when love is a lie, awareness is your best protection.
Your passwords are the first line of defense against fraud. Using weak or reused passwords makes it way too easy for hackers to access your accounts — banking, email, shopping, and more.
🚨Top Weak Passwords of 2023–2024 (NordPass & cybersecurity analysis)
These passwords were found most often in breached databases and take less than 1 second to crack:
|
Rank |
Password |
Time to Crack |
|
1 |
123456 |
< 1 second |
|
2 |
admin |
< 1 second |
|
3 |
12345678 |
< 1 second |
|
4 |
qwerty |
< 1 second |
|
5 |
password |
< 1 second |
|
6 |
12345 |
< 1 second |
|
7 |
123456789 |
< 1 second |
|
8 |
guest |
< 1 second |
|
9 |
111111 |
< 1 second |
|
10 |
123123 |
< 1 second |
🔁 Also commonly used (and insecure):
- 000000
- letmein
- iloveyou
- abc123
- welcome
- passw0rd (even with a zero!)
- 1q2w3e4r
Why Strong Passwords Matter:
Cybercriminals use automated tools to guess passwords in seconds. Weak passwords (like “123456”) are cracked almost instantly. A strong password makes it much harder for fraudsters to get in.
What Makes a Password Strong:
✅ At least 12 characters
✅ A mix of upper & lowercase letters
✅ Includes numbers
✅ Includes special characters (like !, $, %)
✅ Not based on easily guessed info (no names, birthdays, or “password123”)
✅ Strong Password Examples:
- G7u!rNq9#vTb$2w
- R3d!Sh0e$RunFast!
- T!nC@n_J0ck3y#2025
(Use a password manager to generate and save these!)
🛡️ Take 5 minutes today to update weak passwords — your future self will thank you!
What Is QR Code Fraud?
QR code fraud happens when a malicious or tampered QR code leads a victim to:
- A phishing website that steals credentials or personal information.
- A malware download, which can infect a phone or device.
- A fraudulent payment page, where users unknowingly send money to a scammer.
- An app download that looks legitimate but performs malicious actions in the background.
Common Attack Methods:
- QR code overlay: Criminals stick their own QR code over a legitimate one (e.g., on parking meters or restaurant tables).
- Phishing QR codes: Embedded in fake emails, flyers, or social media.
- QR code generators: Fraudsters send victims a QR code claiming it’s for a payment or prize, tricking them into scanning it.
How to Avoid QR Code Fraud
- Inspect before you scan:
- Check for tampering—like stickers placed over existing codes.
- Avoid scanning random QR codes from flyers, light poles, or suspicious websites.
- Use a secure QR scanner:
- Some apps and phone camera software preview the URL before visiting it. Check it carefully.
- Don’t enter sensitive data after scanning:
- If the code brings you to a login page or payment portal, make sure the URL is legitimate (starts with https://, matches the correct domain).
- Be wary of QR codes in emails or messages:
- Treat them like suspicious links—especially if they come from unknown senders or seem out of context.
- Use official apps for payments:
- For things like parking, donations, or bills, use verified apps or websites rather than scanning codes directly.
- Update your device regularly:
- Ensure your smartphone has the latest security patches.
Signs of a Safe QR Code
- Comes from a trusted source (e.g., within a known app, website, or from a business you know).
- Shows a clear preview of the URL before opening.
- You were expecting it (e.g., scanned a menu at a familiar restaurant, feel to be sure it’s not a sticker over the top of the actual QR Code).
Voice cloning scams are one of the fastest growing and most alarming types of fraud in 2025, due to the increasing power and availability of AI tools that can replicate a person’s voice with shocking accuracy. Here’s a detailed breakdown of how these scams work, how to spot them, and how to protect yourself:
What Are Voice Cloning Scams?
Voice cloning scams use artificial intelligence to mimic someone’s voice—often a loved one, colleague, or authority figure. Scammers only need a short audio sample (sometimes just a few seconds) to create a convincing clone.
They then use this voice to:
- Call a victim and pretend to be someone they know.
- Leave voice messages with urgent or emotional requests.
- Convince them to send money or provide sensitive information.
Common Scenarios
- “Emergency” Family Member Scam
You get a call from someone who sounds like your son, daughter, or spouse saying they’ve been in an accident, arrested, or robbed. They beg you to wire money or send crypto right away. - Boss/CEO Scam
A scammer mimics your boss asking you to quickly transfer funds or share confidential company information. These are often used in business email compromise (BEC) schemes. - Kidnapping Scam
Some criminals clone a child’s voice, claiming they’ve been kidnapped and demanding ransom—playing on intense parental fear.
How Scammers Get Voice Samples
- Social media videos (TikTok, Instagram, YouTube)
- Voicemails
- Podcast interviews or online meetings
- Phone calls recorded without consent
Why These Scams Work
- Emotional urgency: Scammers rely on panic to short-circuit logical thinking.
- Realistic audio: AI-generated voices sound startlingly genuine, complete with emotion, tone, and cadence.
- Spoofed caller IDs: Makes it look like the call is coming from a familiar number.
How to Protect Yourself
1. Set a Family “Code Word”
Something only your loved ones would know. If you get a suspicious call, ask for the code word before responding.
2. Don’t Trust Voice Alone
Always verify with a second method (text, direct call, or video chat).
3. Be Cautious with What You Post
Limit public sharing of videos/audio that includes your voice, especially for children and elderly relatives.
4. Don’t Act Under Pressure
Scammers try to rush you. Take a breath, hang up, and call the person back on a verified number.
5. Enable Privacy Settings
Keep your personal and family content private on social media platforms.
What to Do If You Suspect a Voice Cloning Scam
- Hang up immediately.
- Contact the person directly using a known, trusted number.
- Report it to the FTC at reportfraud.ftc.gov.
- Alert your bank or financial institution if you’ve sent money.
To Prevent Check Fraud
Consider Digital Payments:
- Reduce Reliance On Checks: Use online bill pay, electronic transfers (ACH), or mobile payment options to minimize the need for physical checks.
- Utilize strong passwords, enable two-factor authentication, and be wary of phishing attempts.
- If you must write checks, consider using your bank's bill pay service for added security.
Monitor Your Account:
- Regularly review statements: Check your account activity regularly for any unauthorized transactions.
- Set up alerts: Enable account alerts for suspicious activity, such as large withdrawals or unusual transactions.
- Report any suspicious activity immediately: Contact your bank if you notice anything that seems out of place.
Secure Checks and Information:
- Store checks safely: Keep your checkbook in a secure location and limit access to it.
- Use non-erasable ink: Use a gel pen with black ink to make it difficult to alter checks.
- Fill out checks completely: Avoid leaving blank spaces on checks, as this can make them easier to tamper with.
- Deface and retain voided checks: Prevent misuse by defacing and keeping voided checks.
- Secure check stock: Store blank checks in a locked location and limit access to them.
Be Cautious When Accepting Checks:
- Verify the payee: Ensure you are paying the correct payee before depositing or cashing a check.
- Avoid checks from unknown sources: Be wary of accepting checks from individuals or companies you don't know.
- Don't cash or deposit checks for more than the expected amount: Be cautious if you receive a check for a larger amount than you expect.
Secure Mailing of Checks:
- Use secure mailboxes: Avoid leaving checks in unsecured mailboxes.
- Hand-Deliver checks when possible: If you must mail a check, consider hand-delivering it to the post office instead of using a mailbox.
- Confirm receipt: Verify with the recipient that they received your check.
Stay Informed:
- Be aware of common fraud schemes: Educate yourself on common check fraud schemes to better protect yourself.
- Report suspected fraud: If you suspect you have been a victim of check fraud, report it to your bank and the authorities.
