HomeSecurity CenterCommon Scams

Common Scams

Losing money or property to scams can be devastating. Explore common scams and
practical fraud prevention tips to help you recognize suspicious activity and protect your information.

Explore Common Scams

Impersonation Scams

How it works: Scammers pretend to be someone you trust — like a bank employee, government official, company executive, or even a family member — to trick you into sharing personal information or sending money. These scams often use urgency, fear, or emotional pressure to override your instincts. Examples:
  • A caller claims to be from your bank’s fraud department and urges you to move money to a “safe” account.
  • An email appears to come from your CEO, asking you to wire funds for a confidential project.
  • A scammer poses as a known vendor and requests updated payment details.
  • Someone pretends to be a grandchild in trouble, asking for bail money or emergency help.
Red flags to watch for:
    • Urgent requests for money or sensitive information.
    • Messages or calls from familiar-looking contacts that feel “off.”
    • Pressure to act quickly or keep the request secret.
    • Unusual payment methods like gift cards, wire transfers, or cryptocurrency.
How it works: Scammers use artificial intelligence to make their schemes more convincing and harder to detect. AI tools can generate realistic voices, videos, images, and messages — making impersonation and manipulation easier than ever. These scams often mimic trusted people or organizations and play on urgency, emotion, or curiosity. Examples:
  • Voice cloning: A scammer uses AI to mimic a loved one’s voice, calling to say they’re in trouble and need money immediately.
  • Deepfake videos: A fake video of a celebrity or executive urges you to invest in a crypto scheme or scan a QR code.
  • AI phishing emails: Messages look professional and personalized, asking you to update account info or click a link to avoid service disruption.
  • Manipulated AI summaries: Tools like Gemini can be tricked into summarizing emails with fake security alerts and support numbers.
  • Disaster scams: AI-generated images of flood victims or pets in distress are used to solicit fake donations.
Red flags to watch for:
  • Requests for money or sensitive info from someone you can’t verify in person.
  • Emotional appeals tied to emergencies, disasters, or urgent deadlines.
  • Messages that look real but contain odd details, unusual grammar, or suspicious links.
  • AI-generated content that seems too polished or emotionally manipulative.
How it works: Scammers create fake profiles on dating sites, social media, or apps to build emotional connections with victims. Once trust is established, they invent a crisis or urgent need — often financial — and ask for money, gifts, or sensitive information. Examples:
  • Someone you’ve been messaging online says they’re stuck overseas and need money for a plane ticket or medical emergency.
  • A scammer claims to be in the military or working abroad and can’t meet in person but quickly expresses deep affection.
  • They ask you to move the conversation off the dating platform and communicate only by email or messaging apps.
Red flags to watch for:
  • Requests for money — especially via wire transfer, gift cards, or cryptocurrency.
  • Refusal to meet in person or video chat, often citing work or travel.
  • Overly romantic language early in the relationship.
  • Stories that involve sudden emergencies, accidents, or legal trouble.
How it works: Scammers call pretending to be someone official or familiar — like a government agent, bank representative, or even a family member — to trick you into sharing personal information or sending money. These calls often use scare tactics or urgency to pressure you. Examples:
  • A caller claims to be from the IRS or local police, saying you’ll be arrested unless you pay a fine immediately.
  • Someone says your bank account has been compromised and asks you to “verify” your account or move your money to a “safe” account.
  • A person pretends to be your grandchild in trouble, asking for bail money or emergency funds.
Red flags to watch for:
  • Demands for payment via gift cards, wire transfers, or cryptocurrency.
  • Caller ID shows a local number, but the person refuses to identify themselves or provide callback info.
  • Pressure to act immediately or keep the call secret.
  • Requests for sensitive information like your Social Security number, bank account, or passwords.
How it works: Scammers use fake investment opportunities — often involving cryptocurrency — to lure victims with promises of high returns, minimal risk, or exclusive access. These scams may appear on social media, dating apps, or through unsolicited messages, and often include fake platforms, charts, or testimonials to build trust. Examples:
  • “Pig butchering” scams: A scammer builds a relationship over time — often through dating apps or social media — and eventually convinces the victim to invest in a fraudulent crypto platform. The victim sees fake profits before the scammer drains the account.
  • Get-rich-quick schemes: Promoted online or via influencers, these scams promise fast returns through crypto trading or investment apps. Victims may be shown fake dashboards or profit reports to encourage more deposits.
  • Fake endorsements: Scammers use doctored videos or impersonate celebrities to promote bogus investment opportunities.
Red flags to watch for:
  • Promises of guaranteed returns or “no risk” investments.
  • Pressure to act quickly or invest more to “unlock” higher profits.
  • Requests to move money to unfamiliar platforms or wallets.
  • Lack of transparency about who’s behind the investment or how it works.

How it works:
Scammers create fake websites, social media ads, or listings that look like legitimate retailers. They lure you in with low prices, limited-time offers, or hard-to-find items — but once you pay, the product never arrives or is completely different from what was advertised.

Examples:

    • A website sells discounted electronics or branded clothing but disappears after you place an order.
    • A social media ad promotes a “limited edition” item with glowing reviews — but the product is counterfeit or never ships.
    • A seller on a marketplace asks you to pay outside the platform (e.g., via Venmo or wire transfer) and then vanishes.

 

Red flags to watch for:

  • Prices that seem too good to be true.
  • No contact information or vague return/refund policies.
  • Requests to pay via gift cards, wire transfers, or peer-to-peer apps.
  • Poor grammar, pixelated product images, or suspicious URLs.
How it works: Scammers pose as recruiters, employers, or HR representatives offering fake job opportunities. They may contact you through email, social media, or job boards and often use real company names to appear legitimate. Examples:
  • A “recruiter” sends a job offer with high pay and flexible hours, but asks for personal information or payment for training materials.
  • A fake remote job requires you to deposit a check and send part of the money back — the check later bounces.
  • A scammer claims to be hiring for a well-known company and conducts interviews via messaging apps, then requests your Social Security number or bank details.
Red flags to watch for:
  • Requests for payment upfront (e.g., for equipment, background checks, or training).
  • Interviews conducted only by text or chat, with no video or phone call.
  • Job offers that arrive quickly without a formal application or interview.
  • Poor grammar, generic job descriptions, or suspicious email addresses.
How it works: Check fraud involves the illegal use, alteration, or creation of checks to steal money. Scammers may steal checks from mailboxes, forge signatures, alter legitimate checks, or create counterfeit ones. These schemes often exploit the time it takes for banks to verify checks — known as “float time” — making it seem like funds are available when they’re not. Examples:
  • A stolen check is “washed” with chemicals to erase ink and rewrite the payee and amount.
  • A scammer sends a fake check for more than the agreed amount and asks you to refund the difference.
  • A counterfeit check is deposited via mobile app, and the scammer withdraws funds before the bank realizes it’s fake.
  • A legitimate check is altered to change the payee or amount, then cashed fraudulently.
Red flags to watch for:
  • Unexpected checks arriving by mail, especially from unknown sources.
  • Requests to deposit a check and send money back.
  • Checks with smudged ink, missing security features, or mismatched fonts.
  • Pressure to act quickly before the check “clears.”

How it works:
Phishing and smishing scams use fake emails or text messages to trick you into clicking malicious links, downloading harmful files, or sharing personal information. These messages often look like they’re from trusted companies, banks, or government agencies — and they usually create a sense of urgency.

  • Phishing (email-based):

    • You receive an email that looks like it’s from your bank, asking you to “verify your account” by clicking a link.
    • A message claims your package couldn’t be delivered and asks you to update your shipping info.
    • The email may include logos, official-looking language, and links that lead to fake websites.

     

    Smishing (text-based):

    • A text says your debit card is locked and urges you to call a number or click a link.
    • You get a message about winning a prize or gift card, asking you to respond quickly.
    • Some texts may appear to come from local numbers or use your name to feel more personal.

     

    Red flags to watch for:

    • Messages with urgent language like “Act now,” “Your account is at risk,” or “Final notice.”
    • Links that don’t match the company’s official website.
    • Requests for login credentials, Social Security numbers, or payment info.
    • Poor grammar, odd formatting, or unfamiliar sender addresses.
A type of targeted email scam How it works: BEC scams involve cybercriminals impersonating trusted individuals — such as executives, vendors, or coworkers — to trick employees into sending money, sharing sensitive data, or clicking malicious links. These scams are often highly targeted and timed to appear legitimate, making them harder to detect than typical phishing attempts. Examples:
  • A scammer poses as your CEO and requests an urgent wire transfer for a confidential deal.
  • A vendor’s email is spoofed to send a fake invoice with updated payment instructions.
  • A compromised email account sends a PDF that leads to a fake login page, stealing credentials.
  • During busy periods (like elections or quarter-end), scammers impersonate colleagues and ask for gift cards or sensitive documents.

Red flags to watch for:
  • Unusual or urgent requests for money, especially via wire transfer or gift cards.
  • Emails that look legitimate but contain subtle misspellings or odd formatting.
  • Requests to bypass normal procedures or keep the transaction confidential.
  • Attachments or links that redirect to login pages or ask for credentials.

A type of imposter scam

How it works:
Scammers pretend to be a grandchild or other relative in distress — often calling late at night or using urgent language to catch you off guard. They may claim to be in jail, in the hospital, or stranded in another country, and ask for money to be sent immediately.

Examples:

    • A caller says, “Grandma, it’s me,” and asks for bail money after a supposed arrest.
    • Someone claims to be your grandchild and says they’ve been in a car accident and need help paying medical bills.
    • The scammer may use voice cloning or spoofed caller ID to make the call seem more believable.

 

Red flags to watch for:

  • Requests to keep the situation secret — “Don’t tell Mom or Dad.”
  • Pressure to act quickly and send money via wire transfer, gift cards, or cryptocurrency.
  • Refusal to answer questions that would confirm their identity.
  • Emotional manipulation — sounding scared, crying, or using dramatic stories.
How it works: Scammers trick you into buying gift cards and sending them the codes — often by pretending to be someone you trust, like a boss, coworker, government official, or family member. They claim it’s urgent and may say the gift cards are needed for a surprise, emergency, or payment. Examples:
  • You get an email that looks like it’s from your supervisor, asking you to buy gift cards for a client event and send the codes right away.
  • A caller says they’re from the IRS or utility company and threatens legal action unless you pay with gift cards.
  • A scammer poses as a loved one in trouble and asks for gift cards to cover bail, medical bills, or travel costs.
Red flags to watch for:
  • Requests to buy gift cards and share the numbers or photos of the back.
  • Pressure to act quickly or keep the request secret.
  • Claims that gift cards are the only accepted form of payment.
  • Messages with poor grammar or unusual phrasing, even if they appear to come from someone you know.

Important things to remember.

Field & Main Bank will never contact you via unsolicited email, text or phone call asking for sensitive information, passwords, or PINs. If you receive a call, voicemail, email, or text from someone claiming to be from Field & Main Bank and you think it’s suspicious, contact Field & Main immediately. Call us or visit your local branch so our team can review your account and take quick action to protect your information. If you’re ever unsure, reach out — we’re here to help you stay secure.

Fraud Prevention & Education

Protect Yourself from Scams and Fraud

Stay informed with practical tips and real examples to help you spot, avoid, and report fraud. Learn how Field & Main helps keep your accounts secure — and what you can do to protect your information every day.

Man using tablet

Crypto Safety Checklist

Before sending money or investing online, use this quick checklist to confirm a platform’s legitimacy.

1. Check for registration and licensing
Legitimate platforms are registered with financial authorities.
Verify them through official sites.

2. Research the company’s reputation
Look for reviews, news and real feedback.
Be cautious if you find little information or only overly positive testimonials.

3. Inspect the website and contact info
Watch for grammar errors or missing contact details.
Scam sites often look professional but lack transparency.

4. Avoid pressure tactics
Scammers may push you to “act fast” or promise guaranteed returns.
Real platforms never rush you or guarantee profits.

5. Use secure payment methods
Never send crypto or money to someone you haven’t verified.
Avoid platforms that only accept wire transfers, gift cards or peer-to-peer apps.

6. Ask questions
Trust your instincts. If something feels off, reach out to your bank or a trusted financial advisor before making any decisions.

UPGRADE YOUR SECURITY

Make the Switch to eStatements