Scam Terms Library

Terms Associated With Common Scams and Scammers

Below you’ll find a library of Terms that are commonly associated with Scams and Scammers. We will continue to build this list and provide it as a resource for anyone needing quick access to scam terminology. 

Common Scam Terms Lookup Library

Advance-Fee Fraud – A scam where victims are asked to pay upfront fees for a service, loan, or prize, which never materializes. The scammer disappears after receiving the payment, leaving the victim with nothing.

Bait-and-Switch – A deceptive tactic in which an attractive offer is presented, but when the victim attempts to purchase, they are coerced into buying a more expensive or inferior product instead.

Baiting – A scam tactic where victims are lured with enticing offers, such as free products or services, only for the scammer to exploit the situation for payment or other illicit actions.

Black Hat SEO – A set of unethical SEO practices used by scammers to manipulate search engine rankings in their favor, often leading to fraudulent websites that mislead or scam users.

Blackmail – A form of extortion in which a scammer threatens to reveal damaging information unless a victim pays money or provides something of value. It often involves personal or sensitive data.

Bogus Check – A counterfeit check that is written with insufficient funds or from a non-existent account. Victims are tricked into depositing the check before discovering it is fraudulent.

Bogus Invoice – Fraudulent invoices sent to businesses or individuals, often claiming payment is owed for goods or services that were never rendered. The scammer tries to convince the victim to pay the invoice.

Charity Scam – Fraudulent schemes where scammers pose as charity organizations, seeking donations under false pretenses. The victim unknowingly donates to a non-existent or illegitimate cause.

Clickbait – A misleading tactic used to lure individuals into clicking on sensational or misleading headlines or ads, often leading to scams or malicious content that generates ad revenue for scammers.

Counterfeit Goods – Fake products made to look like authentic, branded goods but often of inferior quality. These goods are sold to unsuspecting customers at reduced prices.

Debt Relief Scam – Fraudulent companies that promise to reduce or eliminate a person’s debt for an upfront fee but never deliver the promised results, leaving the victim with more financial trouble.

Deceptive Advertising – Advertising that misleads consumers through false or exaggerated claims, often promoting subpar products, services, or deals that are too good to be true.

Deceptive Trade Practices – Dishonest business practices designed to mislead or exploit consumers. This can include false advertising, misleading pricing, or hidden fees in transactions.

Digital Piracy – The illegal distribution of copyrighted digital content, such as movies, software, or music, often involving scammers who charge for pirated copies as if they were legitimate.

Fake App – A fraudulent app designed to mimic a legitimate one in order to steal personal data or trick users into paying for non-existent services or products.

Fake Email – Emails crafted to resemble official communication but sent with the intent of deceiving the recipient into disclosing sensitive information, such as passwords or credit card details.

Fake Identity – The creation of a false identity used to deceive others, often to gain access to financial accounts or personal information for fraudulent purposes.

Fake Job Offer – A scam where individuals are offered fake employment opportunities to steal personal information, money, or both. The scam often asks for application fees or personal identification details.

Fake Lottery – A fraudulent claim that someone has won a lottery or prize they did not enter. Victims are often asked to pay fees or taxes to claim their non-existent prize.

Fake Product Review – Reviews created by scammers to deceive consumers into believing a product is of high quality or effective, leading them to make unnecessary purchases.

Fake Repair Services – Fraudulent repair services where scammers offer to fix items like cars or home appliances but either do subpar work or take payment without providing the service.

Fake Scholarship – A scam offering non-existent scholarships in exchange for application fees or personal information. Victims are led to believe they have won a scholarship but are left with nothing.

Fraud – Any act of deception intended for personal or financial gain, which can include misrepresentation of information, stealing funds, or making false claims to deceive others.

Fraudulent Invoice – A scam where a fraudulent invoice is sent to a business or individual requesting payment for non-existent goods or services, hoping the victim will unknowingly pay it.

Fraudulent Loan – A loan that involves deception, such as charging fees upfront or offering unrealistic terms. The scammer may not intend to provide the loan or may use stolen information for fraudulent purposes.

Fraudulent Transaction – A financial transaction based on deceit, such as making purchases with stolen credit cards or conducting fake sales to steal money from victims.

Ghost Job Posting – A fake job advertisement created to gather personal information from job seekers. These scammers typically use the opportunity to collect resumes and personal data without offering any real employment.

Ghosting – When a scammer disappears after carrying out a fraudulent transaction or scheme, leaving the victim without the promised goods, services, or resolution.

Impersonation – Pretending to be someone else, often a trusted figure like a bank representative or government official, to deceive the victim into providing personal information or money.

Imposter – A person who fraudulently presents themselves as someone else, often to gain access to funds, resources, or confidential information from their victims.

Identity Fraud – A crime in which someone illegally uses another person’s personal information, such as Social Security numbers, bank details, or credit card information, to steal money or commit other crimes.

Identity Theft – The act of stealing personal information to assume someone’s identity, often for financial gain, and using this stolen identity to open accounts, make purchases, or access funds.

Investment Scam – A fraudulent investment opportunity promising high returns but designed to steal money from the victim. Common scams include Ponzi schemes, fake stocks, and fraudulent real estate deals.

Invoice Scam – A scam where a fraudulent invoice is sent to a business or individual requesting payment for non-existent goods or services, hoping the victim will unknowingly pay it.

Jury Duty Scam – A scam where scammers impersonate court officials and claim that the victim missed jury duty, demanding payment of fines or personal information to avoid legal consequences.

Loan Shark – A person or business that offers loans at illegally high interest rates, often using intimidation or threats to collect debts from victims.

Malicious Software (Malware) – A type of software designed to harm, exploit, or steal information from a device, often used by scammers to install keyloggers or steal banking information.

Money Mule – A person who is recruited by fraudsters to transfer illegally obtained money, often by using their bank account or wire transfers, in exchange for a small payment or commission.

Money Laundering – The process of concealing the origins of illegally obtained money, often through complex transactions, to make it appear legitimate. It is often linked with organized crime or scams.

Non-Disclosure – When critical information is intentionally withheld from a victim, leading them to make decisions or purchases based on incomplete or deceptive details.

Overpayment Scam – A scam where a victim is tricked into accepting a payment that exceeds the agreed amount, only to be asked to refund the difference. The original payment later bounces.

Phishing – A fraudulent attempt to acquire sensitive information such as usernames, passwords, or credit card details by pretending to be a trustworthy entity, often via email or fake websites.

Ponzi Scheme – A form of investment scam in which returns are paid to earlier investors from the contributions of newer investors, rather than from profits. The scheme collapses when new investors dry up.

Pyramid Scheme – A fraudulent system where participants earn money primarily by recruiting new members rather than from any legitimate sale of goods or services. Eventually, the scheme collapses due to lack of new recruits.

Ransomware – A type of malicious software that locks a victim’s files or computer, demanding a ransom payment to restore access. It often spreads through phishing emails or infected websites.

Refund Fraud – A scam where a fraudster manipulates or fabricates a purchase or return to claim a refund, often by using stolen credit card information or fake receipts.

Romance Scam – A type of scam where a fraudster builds a romantic relationship with a victim online and then exploits the relationship to convince them to send money or gifts.

Shady Deal – A suspicious or unethical business transaction where the terms are misleading or dishonest, designed to benefit the scammer while disadvantaging the victim.

Sham Contract – A fake or deceptive contract created with the intention to defraud another party. It may include false terms, misrepresentations, or unauthorized agreements.

Smishing – Smishing is a type of phishing attack that uses SMS or text messages to deceive individuals into revealing sensitive information or installing malicious software.

Spear Phishing – A more targeted form of phishing where scammers use personal information to craft a more convincing message to a specific individual or organization.

Spoofing – A type of fraud in which a scammer impersonates another person, entity, or website to deceive victims into providing sensitive information or money.

Stolen Credit Card Fraud – The unauthorized use of a stolen credit card or credit card information to make fraudulent purchases or withdrawals from the victim’s account.

Synthetic Identity Theft – A form of identity theft where fraudsters create new, fake identities using a mix of real and fabricated information, often to apply for credit cards, loans, or other financial services.

Ticket Scam – A fraudulent scheme in which scammers sell non-existent or invalid tickets for events such as concerts, sports games, or travel, often via online platforms or social media.

Timeshare Scam – A scam where fraudulent companies offer fake timeshare ownership opportunities, tricking victims into making payments for properties or memberships that don’t exist.

Toll-Free Scam – A scam in which scammers charge inflated fees for services, often using toll-free numbers to appear legitimate. Victims are often billed for nonexistent services or products.

Trojan Horse – A type of malware that pretends to be a legitimate software or file to trick victims into downloading it. Once installed, it can steal data or install other malicious programs.

Unsolicited Email – An unsolicited message sent to a large number of recipients, often with the goal of gathering sensitive information, promoting fake products, or spreading scams.

Unsolicited Phone Call – A scam phone call that contacts victims without invitation, often to sell fake products, ask for donations, or steal personal information through deceptive tactics.

Upfront Payment Scam – A scam where victims are asked to pay for a service or product before receiving it, only to never receive anything in return after paying.

Wire Transfer Scam – A type of scam where a victim is tricked into sending money via wire transfer, often with the scammer posing as a trusted person or company to create a sense of urgency.

Work-from-Home Scam – A scam where victims are promised easy, high-paying jobs that allow them to work from home, but are instead asked to pay fees or provide personal information without any legitimate employment.

Zero-Day Attack – A type of cybersecurity attack that exploits vulnerabilities in software or systems that have not yet been identified or patched by the developer, often used in scams to gain unauthorized access.