Apple Support Text Scam: Fake Apple Security Alerts Explained
Written by: Thomas Orsolya
Published on:
A text message claiming to be from Apple Support can look urgent, professional, and believable. It may warn about a suspicious Apple Pay charge, an Apple ID login, a locked account, or a purchase you never made.
But many of these messages are not from Apple. They are scams designed to make you call a fake support number, where criminals pretend to be Apple representatives and pressure you into giving them remote access, personal information, banking details, or gift card codes.
Apple warns that scammers may impersonate Apple through fraudulent messages, phone calls, and other tactics to trick people into sharing account credentials, security codes, financial information, or money.
What Is the Apple Support Text Scam?
The Apple Support Text Scam is a phishing and fake tech support scheme that starts with a text message pretending to come from Apple, Apple Support, Apple Pay, Apple Security, or Apple Billing.
The message usually claims there is a problem that needs immediate attention. It may say:
Your Apple ID has been locked.
A suspicious Apple Pay transaction was detected.
Someone tried to access your Apple account.
A payment was made at the Apple Store.
Your iCloud account is at risk.
Your device has been hacked.
Your Apple subscription was renewed.
A refund or cancellation requires confirmation.
Some versions include a link to a fake Apple login page. Others include a phone number and tell you to call “Apple Support” immediately.
The phone-number version is especially dangerous because victims may feel safer calling than clicking a link. But once they call, they are connected to scammers running a fake support operation.
Example of an Apple Support Scam Text
A scam text may look like this:
Apple Support Alert: We noticed unusual activity on your Apple account. Your account has been temporarily restricted for security reasons.
If this was not you, contact Apple Support immediately at +1 XXX-XXX-XXXX to restore account safety.
Reply STOP to opt out.
Another version may say:
Apple Pay Security Reminder We noticed a $143.95 Apple Pay transaction at Apple Store (CA) that did not match usual patterns.
If this was not you, call Apple Support at +1 XXX-XXX-XXXX.
The wording changes, but the goal is the same: make you panic, make you call, and make you follow the scammer’s instructions.
Why the Scam Looks Convincing
This scam works because it uses familiar Apple-related language. Many people use iPhones, Apple Pay, iCloud, Apple Music, or App Store subscriptions, so a warning about Apple can feel believable.
Scammers also use details that sound official:
Specific dollar amounts
Fake case numbers
Apple Pay or Apple Store references
“Security reminder” language
“Temporary restriction” warnings
“No action needed if this was you” phrasing
“Reply STOP” opt-out language
Repeated mentions of “Apple Support”
That last detail matters. Scammers often repeat trusted brand names to make the message feel legitimate. A fake text may say “Apple Support” several times because the scammer wants the victim to associate the phone number with Apple.
But the phone number is not Apple. It is the trap.
How the Apple Support Text Scam Works
1. The victim receives a fake Apple message
The scam begins with a text message claiming there is a problem with your Apple account, Apple Pay, iCloud, Apple Store purchase, or device security.
The message is designed to create concern without giving you time to think. It may say your account is restricted, your payment is blocked, or a transaction is waiting for confirmation.
This pressure is intentional. Scammers want you to react quickly instead of verifying the message through official Apple channels.
2. The message tells you to call a fake support number
Many Apple Support text scams do not rely on links. Instead, they tell you to call a phone number.
This makes the scam feel more legitimate to some victims. People are often suspicious of links, but they may trust a phone conversation more.
Once you call, the scammer answers as if they are Apple Support, Apple Security, Apple Billing, Apple Pay Support, or the Apple Fraud Department.
3. The fake agent collects information
The scammer may begin by asking for basic details to “verify” your account.
They may ask for:
Your full name
Your phone number
Your Apple ID email address
Your device model
Your bank name
The last four digits of your card
Whether you use Apple Pay
Whether you have online banking
Whether you recently made Apple purchases
This is not real verification. It is data collection.
Even if you do not give them your password, small pieces of personal information can help scammers target you again or make the call feel more convincing.
4. They claim your device or account is compromised
After building trust, the scammer usually escalates the situation.
They may say:
“Your Apple ID has been hacked.”
“Your iPhone is infected.”
“Someone is using your Apple Pay.”
“Your bank account is connected to the breach.”
“There are multiple suspicious logins.”
“We need to secure your device now.”
“Do not hang up or the restriction may fail.”
This is the fake emergency stage. The scammer wants you scared enough to obey.
The FTC says tech support scammers try to scare people into believing there is a problem with their computer, then use those lies to get financial information or remote access.
5. They ask you to install remote access software
The scammer may then instruct you to install a remote access app such as:
AnyDesk
TeamViewer
UltraViewer
Zoho Assist
LogMeIn
ScreenConnect
Similar screen-sharing tools
These apps are not scams by themselves. They are legitimate tools. The scam happens when criminals use them to view or control your device.
The fake Apple agent may describe the app as:
A secure Apple diagnostic tool
A screen-sharing verification session
A refund tool
A fraud reversal tool
A security scanner
A way to remove hackers
A way to restore Apple Pay
Once connected, the scammer may see what you type, watch your banking activity, guide you through payments, or manipulate you into exposing private information.
FTC guidance specifically warns that scammers may ask for remote access after claiming to be tech support, including scammers pretending to be from Apple.
6. They target your money
After remote access is granted, the scam can move in several directions.
The scammer may ask you to open your bank account to “check whether the Apple transaction posted.” They may ask you to log in to PayPal, Cash App, Venmo, or another payment service. They may claim they need to issue a refund or reverse a suspicious charge.
From there, they may try to:
Steal banking credentials
Capture one-time verification codes
Trick you into approving payments
Convince you to transfer money to a “safe” account
Claim a fake refund error occurred
Tell you to withdraw cash
Pressure you into buying gift cards
This is why remote access is so dangerous. The scammer no longer has to rely only on what you say. They can watch your actions in real time.
7. They demand gift cards
Many fake Apple Support scams eventually lead to gift cards.
The scammer may tell you to buy Apple Gift Cards, Target cards, Walmart cards, Best Buy cards, or other prepaid cards. They may say the cards are needed to verify your identity, unlock your account, cancel a transaction, or complete a refund.
That is false.
Apple gift cards are for Apple purchases, not account protection, refunds, fraud reversal, taxes, fines, or tech support. Apple warns that if someone asks you to use Apple Gift Cards for something outside Apple purchases, it may be a scam.
Common Apple Support Text Scam Variations
The scam may appear under different names. Watch for messages claiming to be from:
Apple ID Security
These messages claim your Apple ID was locked, accessed from a new location, or suspended due to suspicious activity.
Apple Pay Support
These texts claim there was a suspicious Apple Pay transaction, often at an Apple Store, online merchant, or unknown location.
Apple Billing
These messages claim you were charged for an App Store, iCloud, Apple Music, or Apple TV subscription.
Apple Store Order Verification
These texts claim an expensive Apple product was ordered under your name, such as an iPhone, MacBook, iPad, or AirPods.
iCloud Security
These messages claim your iCloud account is full, locked, hacked, or about to lose data unless you respond.
Apple Refund Department
These scams claim Apple owes you money or that a refund failed, then use that excuse to ask for banking details or remote access.
Red Flags of an Apple Support Text Scam
It arrives unexpectedly
A real Apple issue should be verified through your Apple device, Apple account, Wallet app, App Store purchase history, or official Apple Support. Treat unexpected texts with suspicion.
It includes a phone number
A text that pressures you to call a support number is a major warning sign. Do not trust phone numbers included in unsolicited security alerts.
It creates urgency
Scammers often say your account is locked, restricted, hacked, or about to be charged. The goal is to make you act before thinking.
It asks for remote access
No legitimate Apple Support process should require you to install AnyDesk, TeamViewer, UltraViewer, or similar software because of an unexpected text message.
It asks for gift cards
Gift cards are never a valid way to fix an Apple account, cancel a charge, verify identity, or receive a refund.
It asks for verification codes
Never give anyone your Apple ID verification code, bank code, SMS code, or two-factor authentication code. Scammers use these codes to access your accounts.
It asks you to log in while they watch
If someone on the phone asks you to open your bank account, Apple ID, email, or payment app while screen sharing, end the call immediately.
It says “Reply STOP”
Scammers add “Reply STOP” to make the message look like a legitimate automated text. That line does not prove anything.
What to Do If You Receive an Apple Support Scam Text
Do not call the number.
Do not click links.
Do not reply with personal information.
Do not install remote access software.
Do not buy gift cards.
Instead:
Open your iPhone settings, Wallet app, App Store account, or Apple Account directly.
Check your bank or credit card app for real charges.
Contact your bank using the number on the back of your card if money is involved.
Use Apple’s official Support app or official Apple website if you need help.
Block the sender.
Report the message if possible.
Apple says suspicious messages that appear to be from Apple can be reported, and Apple provides guidance for phishing and other security issues through its official support pages.
What to Do If You Called the Fake Apple Support Number
If you called but did not share anything, hang up and block the number.
If you gave information, installed software, or opened financial accounts during the call, act quickly.
If you installed remote access software
Disconnect the session immediately.
Uninstall the remote access app.
Restart your device.
Change your Apple Account password.
Change your email password.
Change passwords for banking and payment accounts.
Review trusted devices connected to your Apple Account.
Check for unknown apps, profiles, or browser extensions.
Contact your bank if you opened banking apps during the call.
If you shared your Apple ID password
Change it immediately. If you cannot log in, start Apple’s account recovery process. Apple says unusual activity, unrecognized trusted devices, account changes, or purchase activity you do not recognize can be signs that an Apple Account may be compromised
If you shared banking information
Contact your bank or card issuer immediately. Tell them you may have been targeted by a fake Apple Support scam. Ask them to block affected cards, monitor your accounts, and reverse unauthorized transactions where possible.
If you shared verification codes
Assume the related account may be compromised. Change the password for that account immediately and contact the provider if it was tied to banking, email, Apple ID, or payment apps.
If you bought gift cards
Contact the gift card company immediately. Provide the card numbers, receipts, screenshots, and the scammer’s phone number. Ask whether the funds can be frozen.
The FTC advises people who paid scammers with gift cards to contact the gift card company right away and report the scam. (Consumer Advice)
How to Report the Apple Support Text Scam
You can report the scam to:
Apple, through its official phishing and security reporting guidance
Your mobile carrier by forwarding the text to 7726, if supported
The FTC at ReportFraud.ftc.gov if you are in the United States
Your bank or card issuer if payment information was involved
Local law enforcement if you lost money
Save evidence before deleting anything. Keep screenshots of the text, the phone number, call logs, gift card receipts, remote access app names, and any payment records.
How to Protect Yourself From Future Apple Support Scams
Use one rule: do not trust contact information inside unexpected messages.
If a message claims to be from Apple, verify it separately. Open your Apple device settings, Apple Support app, Wallet app, App Store purchase history, or bank app directly. Do not use links or phone numbers from the text.
Also:
Keep two-factor authentication enabled on your Apple Account.
Use a strong, unique Apple Account password.
Never share verification codes.
Do not give remote access to unsolicited callers.
Do not buy gift cards for support issues.
Keep your device updated.
Be skeptical of urgent account warnings.
Teach family members about fake Apple Support calls, especially older relatives who may be targeted.
Is Your Device Infected? Scan for Malware
If your computer or phone is slow, showing unwanted pop-ups, or acting strangely, malware could be the cause. Running a scan with Malwarebytes Anti-Malware Free is one of the most reliable ways to detect and remove harmful software. The free version can identify and clean common infections such as adware, browser hijackers, trojans, and other unwanted programs.
Malwarebytes works on Windows, Mac, and Android devices. Choose your operating system below and follow the steps to scan your device and remove any malware that might be slowing it down.
Malwarebytes for WindowsMalwarebytes for MacMalwarebytes for Android
Run a Malware Scan with Malwarebytes for Windows
Malwarebytes stands out as one of the leading and widely-used anti-malware solutions for Windows, and for good reason. It effectively eradicates various types of malware that other programs often overlook, all at no cost to you. When it comes to disinfecting an infected device, Malwarebytes has consistently been a free and indispensable tool in the battle against malware. We highly recommend it for maintaining a clean and secure system.
Download Malwarebytes
Download the latest version of Malwarebytes for Windows using the official link below. Malwarebytes will scan your computer and remove adware, browser hijackers, and other malicious software for free.
(The above link will open a new page from where you can download Malwarebytes)
Install Malwarebytes
After the download is complete, locate the MBSetup file, typically found in your Downloads folder. Double-click on the MBSetup file to begin the installation of Malwarebytes on your computer. If a User Account Control pop-up appears, click “Yes” to continue the Malwarebytes installation.
Follow the On-Screen Prompts to Install Malwarebytes
When the Malwarebytes installation begins, the setup wizard will guide you through the process.
You’ll first be prompted to choose the type of computer you’re installing the program on—select either “Personal Computer” or “Work Computer” as appropriate, then click on Next.
Malwarebytes will now begin the installation process on your device.
When the Malwarebytes installation is complete, the program will automatically open to the “Welcome to Malwarebytes” screen.
On the final screen, simply click on the Open Malwarebytes option to start the program.
Enable “Rootkit scanning”.
Malwarebytes Anti-Malware will now start, and you will see the main screen as shown below. To maximize Malwarebytes’ ability to detect malware and unwanted programs, we need to enable rootkit scanning. Click on the “Settings” gear icon located on the left of the screen to access the general settings section.
In the settings menu, enable the “Scan for rootkits” option by clicking the toggle switch until it turns blue.
Now that you have enabled rootkit scanning, click on the “Dashboard” button in the left pane to get back to the main screen.
Perform a Scan with Malwarebytes.
To start a scan, click the Scan button. Malwarebytes will automatically update its antivirus database and begin scanning your computer for malicious programs.
Wait for the Malwarebytes scan to complete.
Malwarebytes will now scan your computer for browser hijackers and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check the status of the scan to see when it is finished.
Quarantine detected malware
Once the Malwarebytes scan is complete, it will display a list of detected malware, adware, and potentially unwanted programs. To effectively remove these threats, click the “Quarantine” button.
Malwarebytes will now delete all of the files and registry keys and add them to the program’s quarantine.
Restart your computer.
When removing files, Malwarebytes may require a reboot to fully eliminate some threats. If you see a message indicating that a reboot is needed, please allow it. Once your computer has restarted and you are logged back in, you can continue with the remaining steps.
Once the scan completes, remove all detected threats. Your Windows computer should now be clean and running smoothly again, free of trojans, adware, and other malware.
If your current antivirus allowed this malicious program on your computer, you may want to consider purchasing Malwarebytes Premium to protect against these types of threats in the future. If you are still having problems with your computer after completing these instructions, then please follow one of the steps:
Malwarebytes for Mac is an on-demand scanner that can destroy many types of malware that other software tends to miss without costing you absolutely anything. When it comes to cleaning up an infected device, Malwarebytes has always been free, and we recommend it as an essential tool in the fight against malware.
Download Malwarebytes for Mac.
You can download Malwarebytes for Mac by clicking the link below.
When Malwarebytes has finished downloading, double-click on the setup file to install Malwarebytes on your computer. In most cases, downloaded files are saved to the Downloads folder.
Follow the on-screen prompts to install Malwarebytes.
When the Malwarebytes installation begins, you will see the Malwarebytes for Mac Installer which will guide you through the installation process. Click “Continue“, then keep following the prompts to continue with the installation process.
When your Malwarebytes installation completes, the program opens to the Welcome to Malwarebytes screen. Click the “Get started” button.
Select “Personal Computer” or “Work Computer”.
The Malwarebytes Welcome screen will first ask you what type of computer are you installing this program, click either Personal Computer or Work Computer.
Click on “Scan”.
To scan your computer with Malwarebytes, click on the “Scan” button. Malwarebytes for Mac will automatically update the antivirus database and start scanning your computer for malware.
Wait for the Malwarebytes scan to complete.
Malwarebytes will scan your computer for adware, browser hijackers, and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
Click on “Quarantine”.
When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes has detected. To remove the malware that Malwarebytes has found, click on the “Quarantine” button.
Restart computer.
Malwarebytes will now remove all the malicious files that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your computer.
After scanning, delete any detected threats. Your Mac should now be free from adware, unwanted extensions, and other potentially harmful software.
If your current antivirus allowed a malicious program on your computer, you might want to consider purchasing the full-featured version of Malwarebytes Anti-Malware to protect against these types of threats in the future. If you are still experiencing problems while trying to remove a malicious program from your computer, please ask for help in our Mac Malware Removal Help & Support forum.
Run a Malware Scan with Malwarebytes for Android
Malwarebytes for Android automatically detects and removes dangerous threats like malware and ransomware so you don’t have to worry about your most-used device being compromised. Aggressive detection of adware and potentially unwanted programs keeps your Android phone or tablet running smooth.
Download Malwarebytes for Android.
You can download Malwarebytes for Android by clicking the link below.
In the Google Play Store, tap “Install” to install Malwarebytes for Android on your device.
When the installation process has finished, tap “Open” to begin using Malwarebytes for Android. You can also open Malwarebytes by tapping on its icon in your phone menu or home screen.
Follow the on-screen prompts to complete the setup process
When Malwarebytes will open, you will see the Malwarebytes Setup Wizard which will guide you through a series of permissions and other setup options. This is the first of two screens that explain the difference between the Premium and Free versions. Swipe this screen to continue. Tap on “Got it” to proceed to the next step. Malwarebytes for Android will now ask for a set of permissions that are required to scan your device and protect it from malware. Tap on “Give permission” to continue. Tap on “Allow” to permit Malwarebytes to access the files on your phone.
Update database and run a scan with Malwarebytes for Android
You will now be prompted to update the Malwarebytes database and run a full system scan.
Click on “Update database” to update the Malwarebytes for Android definitions to the latest version, then click on “Run full scan” to perform a system scan.
Wait for the Malwarebytes scan to complete.
Malwarebytes will now start scanning your phone for adware and other malicious apps. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
Click on “Remove Selected”.
When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes for Android has detected. To remove the malicious apps that Malwarebytes has found, tap on the “Remove Selected” button.
Restart your phone.
Malwarebytes for Android will now remove all the malicious apps that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your device.
When the scan is finished, remove all detected threats. Your Android phone should now be free of malicious apps, adware, and unwanted browser redirects.
If your current antivirus allowed a malicious app on your phone, you may want to consider purchasing the full-featured version of Malwarebytes to protect against these types of threats in the future. If you are still having problems with your phone after completing these instructions, then please follow one of the steps:
Restore your phone to factory settings by going to Settings > General management > Reset > Factory data reset.
After cleaning your device, it’s important to protect it from future infections and annoying pop-ups. We recommend installing an ad blocker such as AdGuard. AdGuard blocks malicious ads, prevents phishing attempts, and stops dangerous redirects, helping you stay safe while browsing online.
The Bottom Line
The Apple Support Text Scam is not a real Apple security alert. It is a fake support scam designed to move victims from a scary text message into a phone call with criminals.
Once on the call, scammers may claim your Apple ID, iPhone, Apple Pay, iCloud, or bank account is compromised. They may ask for remote access, personal information, banking details, verification codes, or gift cards.
Do not call the number in the text. Do not install remote access apps. Do not share codes. Do not buy gift cards.
Check your Apple and bank accounts only through official apps, official websites, or verified phone numbers.
FAQ
Is the Apple Support text message real?
Usually no, especially if it tells you to call an unfamiliar phone number, click a suspicious link, or act immediately to protect your account. Scammers often impersonate Apple Support to make fake security alerts look believable.
Why did I receive an Apple Support scam text?
Your phone number may have been collected from a data breach, public listing, spam database, or random mass-texting campaign. Receiving the text does not mean your Apple account was actually hacked.
What do Apple Support scam texts usually say?
They may claim your Apple ID was locked, your iCloud account is at risk, your Apple Pay account has suspicious activity, or an expensive Apple purchase was made in your name. The message then pushes you to call a fake support number or click a fake Apple link.
Should I call the number in the text?
No. Do not call any phone number included in an unexpected Apple Support text. If you need help, use the Apple Support app, Apple’s official website, or a verified Apple phone number.
What happens if I call the fake Apple Support number?
You may reach scammers pretending to be Apple agents. They may claim your device is infected, your Apple ID is hacked, or your bank account is at risk. Then they may ask for remote access, payment information, verification codes, or gift cards.
Will Apple ask me to install AnyDesk or TeamViewer?
No. If someone claiming to be Apple Support asks you to install AnyDesk, TeamViewer, UltraViewer, or another remote access app after a suspicious text, it is a scam.
Will Apple ask for gift cards to fix my account?
No. Apple will never ask you to buy gift cards to cancel a charge, unlock an account, verify your identity, remove hackers, or issue a refund.
Should I reply STOP to the text?
No. Do not reply. Replying may confirm your number is active and could lead to more scam messages.
What should I do if I clicked a link in the text?
Do not enter any information. Close the page, clear your browser history if needed, and change your Apple Account password if you typed it into a suspicious site. Also enable two-factor authentication if it is not already active.
What should I do if I gave the scammer remote access?
Disconnect immediately, uninstall the remote access app, restart your device, change important passwords, check your Apple Account for unknown devices, and contact your bank if you opened any financial apps or websites during the call.
What should I do if I shared my Apple ID password?
Change your Apple Account password immediately. Review trusted devices, check for unfamiliar account changes, and remove any devices you do not recognize.
What should I do if I gave them a verification code?
Assume the related account may be compromised. Change the password right away and review account activity. If the code was for your bank, email, Apple ID, or payment app, contact that provider immediately.
How can I check if there is really a problem with my Apple account?
Open your Apple device settings, the Apple Support app, the App Store purchase history, or your Wallet app directly. Do not use links or phone numbers from the text message.
How do I report an Apple Support scam text?
You can report suspicious Apple-related messages to Apple, forward the text to 7726 if your carrier supports spam reporting, and report financial losses to your bank or local fraud authority.
Can scammers steal money without my password?
Yes. If you give them remote access, share verification codes, open banking apps while they are watching, or follow their payment instructions, they may be able to steal money even without knowing your Apple password.
10 Rules to Avoid Online Scams
Here are 10 practical safety rules to help you avoid malware, online shopping scams, crypto scams, and other online fraud. Each tip includes a quick “if you already got hit” action.
Stop and verify before you click, log in, download, or pay.
Most scams win by creating urgency. Verify using a trusted method: type the website address yourself, use the official app, or call a known number (not the one in the message).
If you already clicked: close the page, do not enter passwords, and run a malware scan.
Keep your operating system, browser, and apps updated.
Updates patch security holes used by malware and malicious ads. Turn on automatic updates where possible.
If you saw a scary “update now” pop-up: close it and update only through your device settings or the official app store.
Use layered protection: antivirus plus an ad blocker.
Antivirus helps block malware. An ad blocker reduces scam redirects, phishing pages, and malvertising.
If your browser is acting weird: remove unknown extensions, reset the browser, then run a full scan.
Install apps, software, and extensions only from official sources.
Avoid cracked software, “keygens,” and random downloads. During installs, choose Custom/Advanced and decline bundled offers you do not recognize.
If you already installed something suspicious: uninstall it, restart, and scan again.
Treat links and attachments as untrusted by default.
Phishing often impersonates delivery services, banks, and popular brands. If it is unexpected, do not open attachments or log in through the message.
If you entered credentials: change the password immediately and enable 2FA.
Shop safely: research the store, then pay with protection.
Be cautious with brand-new stores, “closing sale” stories, and prices that make no sense. Prefer credit cards or PayPal for dispute options. Avoid wire transfers, gift cards, and crypto payments.
If you already paid: contact your card issuer or PayPal quickly to dispute the transaction.
Crypto rule: never pay a “fee” to withdraw or recover money.
Common patterns include fake profits, then “tax,” “gas,” or “verification” fees. Another is a “recovery agent” who demands upfront crypto.
If you already sent crypto: stop paying, save evidence (wallet addresses, TXIDs, chats), and report the scam to the platform used.
Secure your accounts with unique passwords and 2FA (start with email).
Use a password manager and unique passwords for every account. Enable 2FA using an authenticator app when possible.
If you suspect an account takeover: change passwords, sign out of all devices, and review recent logins and recovery settings.
Back up important files and keep one backup offline.
Backups protect you from ransomware and device failure. Keep at least one backup on an external drive that is not always connected.
If you suspect infection: do not connect backup drives until the system is clean.
If you think you are a victim: stop losses, document evidence, and escalate fast.
Move quickly. Speed matters for disputes, account recovery, and limiting damage.
Stop payments and contact: do not send more money or respond to the scammer.
Call your bank or card issuer: block transactions, replace the card if needed, and start a dispute or chargeback.
Secure your email first: change the email password, enable 2FA, and remove unfamiliar recovery options.
Secure other accounts: change passwords, enable 2FA, and log out of all sessions.
Scan your device: remove suspicious apps or extensions, then run a full malware scan.
Save evidence: screenshots, emails, order pages, tracking pages, wallet addresses, TXIDs, and chat logs.
Report it: to the payment provider, marketplace, social platform, exchange, or wallet service involved.
These rules are intentionally simple. Most online losses happen when decisions are rushed. Slow down, verify independently, and use payment methods and account controls that give you recourse.
Thomas is an expert at uncovering scams and providing in-depth reporting on cyber threats and online fraud. As an editor, he is dedicated to keeping readers informed on the latest developments in cybersecurity and tech.