Bank of America Text Scams: The Shocking Truth Behind Fake Fraud Alerts

You’re going about your day when a text pops up: “BofA Payment Accepted for $153.48 at PetSmart. Was this you?” It looks legitimate. It even sounds like the real Bank of America (BoA). But here’s the chilling truth: it’s a scam.

These phishing attacks are not just widespread—they’re evolving. In recent years, Bank of America customers have become frequent targets of sophisticated smishing campaigns. These scams mimic real fraud alerts, luring victims into a trap that can compromise their personal data, banking credentials, and more.

If you think you could never fall for it, think again. These scammers are professionals.

Read on to discover how the Bank of America text scam works, how to recognize it, and what you can do if you’ve been caught in their net.

222

Scam Overview

Bank of America (BoA) is one of the largest financial institutions in the United States, which makes it a prime target for cybercriminals and fraudsters. Among the most effective tools in a scammer’s arsenal today is the phishing text message—known as “smishing” (SMS phishing).

What is the BoA Text Scam?

The BoA text scam is a deceptive technique where scammers send fake messages that appear to come from Bank of America. These messages typically warn of suspicious account activity, declined transactions, or a suspended debit card. The goal is to alarm the recipient into acting quickly without thinking.

Often, these texts include a phone number to call or a link to click. In many cases, the sender’s name may resemble an official BoA department, such as “BofA_Support_Line@comcast.net” or variations like “bofa-alert@haix.it”. The messages may even include legitimate-sounding phrasing such as:

  • “(Fraud) Alert: Your BoFA ATM/Debit card has been suspended. Please call 1-800-XXX-XXXX to verify.”
  • “BofA Payment Accepted for $153.48 at PetSmart on 04/21. Was this you? IF NO RING 8XX-XXX-XXXX.”

These messages are constructed to mirror actual Bank of America fraud alerts. In fact, they are so convincing that many victims call the number provided, only to be redirected to a fake call center or interactive voice system that imitates BoA’s actual fraud department.

Once victims are hooked, the scam progresses with tactics that further compromise security and drain financial resources.

The Scope of the Scam

This is not a fringe operation. Data from recent investigations have uncovered extensive and coordinated campaigns targeting BoA users across the country:

  • 59+ card suspension messages traced to scam campaigns.
  • 97+ unique phone numbers used in smishing attempts.
  • 254+ spoofed email addresses mimicking legitimate BoA alerts.
  • Suspicious domains and email headers, such as those ending in “@comcast.net” or “@haix.it”.

Domains like “b_o_f_a_support_line@comcast.net” are designed to hide behind foreign infrastructure, making them difficult to shut down or trace. These operations often use rotating phone numbers and disposable email addresses to avoid detection.

What’s more alarming is how sophisticated these scam networks have become. Many use automated voice systems and scripted customer service agents who can answer common questions, making it incredibly difficult to distinguish them from actual BoA representatives.

Psychological Manipulation

These scams rely on a sense of urgency and fear. By mimicking the language and formatting of real BoA alerts, they lower the guard of even the most cautious users. Scammers use pressure tactics like immediate suspension of cards or large unauthorized transactions to provoke panic.

Victims are often caught during vulnerable moments—early in the morning, late at night, or when they’re distracted. This timing is strategic. By triggering an emotional response, scammers bypass rational thinking and manipulate victims into compliance.

And once they have your attention, they make you believe that only immediate action will prevent financial disaster. That action, unfortunately, often leads you directly into their trap.

How The Scam Works: Step-by-Step Breakdown

Understanding how this scam unfolds is critical to avoiding it. Below is a detailed step-by-step walkthrough of how these fake BoA text scams are orchestrated.

Step 1: The Setup – Spoofed Message

The scam begins with a text message. It might look like this:

“BofA Payment Accepted for $153.48 at PetSmart. Was this you? IF NO, call 800-XXX-XXXX.”

Or:

“Alert: Your BofA ATM/Debit card has been suspended. Please verify activity immediately by calling 888-XXX-XXXX.”

These messages are often sent from spoofed email addresses like:

  • b_o_f_a_support_line@comcast.net
  • alerts_bofa@protonmail.com

They may also use caller ID masking techniques to display a name resembling “Bank of America” or “BoFA Security.”

This first message is the bait—crafted to mimic real financial alerts in tone, structure, and content. Many use clever formatting and capitalize on the fear of unauthorized spending or blocked funds.

Step 2: The Hook – Call the Number

Once you call the provided number, you’ll encounter one of two things:

  1. An Interactive Voice Response (IVR) menu that mimics BoA’s actual fraud hotline.
  2. A live scammer pretending to be a fraud specialist from Bank of America.

The system may play hold music or even queue messages similar to BoA’s official line. Live scammers are trained to sound reassuring and competent. They might introduce themselves with names, badge numbers, and even offer to “verify” your case ID to build legitimacy.

In both cases, the illusion of legitimacy is strong. These scammers follow detailed, scripted dialogues. Their tone is professional, and the background noise may even simulate a real call center environment.

Step 3: Verification Request – Gathering Information

They’ll begin asking for standard verification details:

  • Full name
  • Date of birth
  • ZIP code
  • Last four digits of your Social Security Number
  • Full debit or credit card number
  • Online banking username

To build further trust, they may even send you a real BoA-style 2FA (two-factor authentication) code to your phone and ask you to read it back. This enables them to bypass your account protections.

Once this information is collected, it’s either used immediately to access your accounts or sold on the dark web to other criminals.

Step 4: The Remote Access Ruse

Once they have initial access, the scam intensifies. The caller will claim your device has been compromised or infected. To “fix” the issue or process a “refund,” they will ask you to:

  • Download a remote desktop app such as AnyDesk, TeamViewer, or Zoho Assist.

These tools give the scammer full access to your computer or smartphone.

They walk you through installing the app, adjusting permissions, and even leaving it open for “further diagnostics.” What they’re really doing is preparing to take full control over your digital life.

Step 5: Taking Over

With remote access in place, the scammer now has real-time control over your device. Here’s what happens next:

  • They log into your online banking to monitor transactions.
  • They install malware or keyloggers to capture passwords.
  • They transfer money out or make unauthorized purchases.
  • They may change account settings, lock you out, or reroute recovery emails.

In many cases, they will create a scenario where you appear to be refunded too much money. Then they ask you to return the “excess” using:

  • Gift cards (Google Play, Apple, Target)
  • Zelle or Cash App transfers

You are instructed to purchase gift cards and send the codes immediately, under the guise of reconciling the mistake. Victims have reported losing thousands of dollars through this technique. Some have even been told to go to multiple stores to avoid gift card purchase limits.

Step 6: Vanishing Act

Once the scammers have what they want, the number stops working. Emails bounce back. You’re left locked out of your accounts or out thousands of dollars.

By this point, your personal data may already be in circulation. Many victims face additional fraud attempts days or weeks later, sometimes from different angles like email phishing or fake tech support calls.

What to Do If You’ve Fallen Victim

If you’ve already interacted with a scammer through a BoA text scam, it’s essential to act fast. Here’s a detailed checklist to help you mitigate the damage.

1. Disconnect and Uninstall Remote Tools

If you allowed remote access via AnyDesk, TeamViewer, or similar:

  • Immediately disconnect from the internet.
  • Uninstall any remote access applications.
  • Reboot your device in Safe Mode.
  • Revoke access permissions granted to third-party apps.

2. Secure Your Accounts

  • Change your Bank of America online banking password immediately.
  • Change passwords for any email or social accounts that use the same credentials.
  • Enable Two-Factor Authentication (2FA) wherever possible.
  • Use a password manager to generate and store secure passwords.

3. Contact Bank of America Fraud Department

Call BoA directly at their official number: 1-800-432-1000

  • Report the scam.
  • Request a freeze on your account.
  • Ask for a new debit/credit card.
  • Monitor pending transactions for anything suspicious.

4. Monitor Your Credit and Bank Statements

  • Set up fraud alerts with major credit bureaus (Experian, Equifax, TransUnion).
  • Consider placing a credit freeze to prevent new accounts from being opened in your name.
  • Monitor your statements daily for unauthorized charges.
  • Sign up for a credit monitoring service if possible.

5. Report the Scam

Also report the scam to your local law enforcement agency. If gift cards were purchased, report the codes as stolen to the issuing companies.

6. Scan Your Device

Use reputable antivirus or antimalware software to scan your device.

  • Delete suspicious files or software.
  • Restore your device from a clean backup if needed.
  • Keep your software and operating system updated.

7. Don’t Blame Yourself

These scammers are highly skilled at manipulation. The best thing you can do now is learn from the experience and share it with others to prevent future victims.

Even well-informed individuals can fall for well-crafted scams. Stay vigilant, informed, and proactive about your cybersecurity.

Is Your Device Infected? Scan for Malware

If your computer or phone is slow, showing unwanted pop-ups, or acting strangely, malware could be the cause. Running a scan with Malwarebytes Anti-Malware Free is one of the most reliable ways to detect and remove harmful software. The free version can identify and clean common infections such as adware, browser hijackers, trojans, and other unwanted programs.

Malwarebytes works on Windows, Mac, and Android devices. Choose your operating system below and follow the steps to scan your device and remove any malware that might be slowing it down.

Malwarebytes for WindowsMalwarebytes for MacMalwarebytes for Android

Run a Malware Scan with Malwarebytes for Windows

Malwarebytes stands out as one of the leading and widely-used anti-malware solutions for Windows, and for good reason. It effectively eradicates various types of malware that other programs often overlook, all at no cost to you. When it comes to disinfecting an infected device, Malwarebytes has consistently been a free and indispensable tool in the battle against malware. We highly recommend it for maintaining a clean and secure system.

  1. Download Malwarebytes

    Download the latest version of Malwarebytes for Windows using the official link below. Malwarebytes will scan your computer and remove adware, browser hijackers, and other malicious software for free.

    MALWAREBYTES FOR WINDOWS DOWNLOAD LINK

    (The above link will open a new page from where you can download Malwarebytes)
  2.  

    Install Malwarebytes

    After the download is complete, locate the MBSetup file, typically found in your Downloads folder. Double-click on the MBSetup file to begin the installation of Malwarebytes on your computer. If a User Account Control pop-up appears, click “Yes” to continue the Malwarebytes installation.

    MBAM1
  3. Follow the On-Screen Prompts to Install Malwarebytes

    When the Malwarebytes installation begins, the setup wizard will guide you through the process.

    • You’ll first be prompted to choose the type of computer you’re installing the program on—select either “Personal Computer” or “Work Computer” as appropriate, then click on Next.

      MBAM3 1
    • Malwarebytes will now begin the installation process on your device.

      MBAM4
    • When the Malwarebytes installation is complete, the program will automatically open to the “Welcome to Malwarebytes” screen.

      MBAM6 1
    • On the final screen, simply click on the Open Malwarebytes option to start the program.

      MBAM5 1
  4. Enable “Rootkit scanning”.

    Malwarebytes Anti-Malware will now start, and you will see the main screen as shown below. To maximize Malwarebytes’ ability to detect malware and unwanted programs, we need to enable rootkit scanning. Click on the “Settings” gear icon located on the left of the screen to access the general settings section.

    MBAM8

    In the settings menu, enable the “Scan for rootkits” option by clicking the toggle switch until it turns blue.

    MBAM9

    Now that you have enabled rootkit scanning, click on the “Dashboard” button in the left pane to get back to the main screen.

  5. Perform a Scan with Malwarebytes.

    To start a scan, click the Scan button. Malwarebytes will automatically update its antivirus database and begin scanning your computer for malicious programs.

    MBAM10
  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now scan your computer for browser hijackers and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check the status of the scan to see when it is finished.

    MBAM11
  7. Quarantine detected malware

    Once the Malwarebytes scan is complete, it will display a list of detected malware, adware, and potentially unwanted programs. To effectively remove these threats, click the “Quarantine” button.

    MBAM12

    Malwarebytes will now delete all of the files and registry keys and add them to the program’s quarantine.

    MBAM13

  8. Restart your computer.

    When removing files, Malwarebytes may require a reboot to fully eliminate some threats. If you see a message indicating that a reboot is needed, please allow it. Once your computer has restarted and you are logged back in, you can continue with the remaining steps.

    MBAM14

Once the scan completes, remove all detected threats. Your Windows computer should now be clean and running smoothly again, free of trojans, adware, and other malware.

If your current antivirus allowed this malicious program on your computer, you may want to consider purchasing Malwarebytes Premium to protect against these types of threats in the future.
If you are still having problems with your computer after completing these instructions, then please follow one of the steps:

Run a Malware Scan with Malwarebytes for Mac

Malwarebytes for Mac is an on-demand scanner that can destroy many types of malware that other software tends to miss without costing you absolutely anything. When it comes to cleaning up an infected device, Malwarebytes has always been free, and we recommend it as an essential tool in the fight against malware.

  1. Download Malwarebytes for Mac.

    You can download Malwarebytes for Mac by clicking the link below.

    MALWAREBYTES FOR MAC DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Mac)
  2. Double-click on the Malwarebytes setup file.

    When Malwarebytes has finished downloading, double-click on the setup file to install Malwarebytes on your computer. In most cases, downloaded files are saved to the Downloads folder.

    Double-click on setup file to install Malwarebytes

  3. Follow the on-screen prompts to install Malwarebytes.

    When the Malwarebytes installation begins, you will see the Malwarebytes for Mac Installer which will guide you through the installation process. Click “Continue“, then keep following the prompts to continue with the installation process.

    Click Continue to install Malwarebytes for Mac

    Click again on Continue to install Malwarebytes for Mac for Mac

    Click Install to install Malwarebytes on Mac

    When your Malwarebytes installation completes, the program opens to the Welcome to Malwarebytes screen. Click the “Get started” button.

  4. Select “Personal Computer” or “Work Computer”.

    The Malwarebytes Welcome screen will first ask you what type of computer are you installing this program, click either Personal Computer or Work Computer.
    Select Personal Computer or Work Computer mac

  5. Click on “Scan”.

    To scan your computer with Malwarebytes, click on the “Scan” button. Malwarebytes for Mac will automatically update the antivirus database and start scanning your computer for malware.
    Click on Scan button to start a system scan Mac

  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will scan your computer for adware, browser hijackers, and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Wait for Malwarebytes for Mac to scan for malware

  7. Click on “Quarantine”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes has detected. To remove the malware that Malwarebytes has found, click on the “Quarantine” button.
    Review the malicious programs and click on Quarantine to remove malware

  8. Restart computer.

    Malwarebytes will now remove all the malicious files that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your computer.
    Malwarebytes For Mac requesting to restart computer

After scanning, delete any detected threats. Your Mac should now be free from adware, unwanted extensions, and other potentially harmful software.

If your current antivirus allowed a malicious program on your computer, you might want to consider purchasing the full-featured version of Malwarebytes Anti-Malware to protect against these types of threats in the future.
If you are still experiencing problems while trying to remove a malicious program from your computer, please ask for help in our Mac Malware Removal Help & Support forum.

Run a Malware Scan with Malwarebytes for Android

Malwarebytes for Android automatically detects and removes dangerous threats like malware and ransomware so you don’t have to worry about your most-used device being compromised. Aggressive detection of adware and potentially unwanted programs keeps your Android phone or tablet running smooth.

  1. Download Malwarebytes for Android.

    You can download Malwarebytes for Android by clicking the link below.

    MALWAREBYTES FOR ANDROID DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Android)
  2. Install Malwarebytes for Android on your phone.

    In the Google Play Store, tap “Install” to install Malwarebytes for Android on your device.

    Tap Install to install Malwarebytes for Android

    When the installation process has finished, tap “Open” to begin using Malwarebytes for Android. You can also open Malwarebytes by tapping on its icon in your phone menu or home screen.
    Malwarebytes for Android - Open App

  3. Follow the on-screen prompts to complete the setup process

    When Malwarebytes will open, you will see the Malwarebytes Setup Wizard which will guide you through a series of permissions and other setup options.
    This is the first of two screens that explain the difference between the Premium and Free versions. Swipe this screen to continue.
    Malwarebytes Setup Screen 1
    Tap on “Got it” to proceed to the next step.
    Malwarebytes Setup Screen 2
    Malwarebytes for Android will now ask for a set of permissions that are required to scan your device and protect it from malware. Tap on “Give permission” to continue.
    Malwarebytes Setup Screen 3
    Tap on “Allow” to permit Malwarebytes to access the files on your phone.
    Malwarebytes Setup Screen 4

  4. Update database and run a scan with Malwarebytes for Android

    You will now be prompted to update the Malwarebytes database and run a full system scan.

    Malwarebytes fix issue

    Click on “Update database” to update the Malwarebytes for Android definitions to the latest version, then click on “Run full scan” to perform a system scan.

    Update database and run Malwarebytes scan on phone

  5. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now start scanning your phone for adware and other malicious apps. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Malwarebytes scanning Android for Vmalware

  6. Click on “Remove Selected”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes for Android has detected. To remove the malicious apps that Malwarebytes has found, tap on the “Remove Selected” button.
    Remove malware from your phone

  7. Restart your phone.

    Malwarebytes for Android will now remove all the malicious apps that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your device.


When the scan is finished, remove all detected threats. Your Android phone should now be free of malicious apps, adware, and unwanted browser redirects.

If your current antivirus allowed a malicious app on your phone, you may want to consider purchasing the full-featured version of Malwarebytes to protect against these types of threats in the future.
If you are still having problems with your phone after completing these instructions, then please follow one of the steps:

After cleaning your device, it’s important to protect it from future infections and annoying pop-ups. We recommend installing an ad blocker such as AdGuard. AdGuard blocks malicious ads, prevents phishing attempts, and stops dangerous redirects, helping you stay safe while browsing online.

Frequently Asked Questions (FAQ)

What is the Bank of America text scam?

The Bank of America text scam is a phishing scheme where scammers send fraudulent SMS messages claiming to be from BoA. These messages often reference fake transactions or account suspensions and urge recipients to call a phone number or click a link. The goal is to steal personal information, banking credentials, and gain remote access to devices.

Is Bank of America really sending these texts?

No. These texts do not come from Bank of America. While they are designed to look official, they are part of a smishing campaign operated by scammers. BoA does not send texts from email-based addresses or ask customers to call unverified numbers.

How can I tell if a text from BoA is fake?

Watch for these red flags:

  • The message comes from an email domain like “@comcast.net” or “@haix.it.”
  • It asks you to call a number not listed on BoA’s official website.
  • It includes poor grammar, strange capitalization, or urgent threats.
  • It asks for sensitive information like your full SSN, card number, or 2FA code.

What happens if I call the number in the scam text?

You will likely be connected to a scam call center or fake automated system. The scammers will impersonate BoA employees and try to collect your private details or convince you to install remote access software like AnyDesk. This can lead to identity theft and financial loss.

Why do scammers ask for remote access to my device?

They claim your device is compromised or needs to be secured. Once connected, they can:

  • Steal banking credentials.
  • Transfer funds in real-time.
  • Install malware.
  • Lock you out of your own accounts.

What should I do if I already responded to a scam message?

Take these steps immediately:

  1. Disconnect from the internet.
  2. Uninstall any remote access apps.
  3. Contact Bank of America directly at 1-800-432-1000.
  4. Change all affected passwords.
  5. Report the scam to the FTC and IC3.
  6. Monitor your bank and credit statements closely.

Can scammers access my BoA account with a 2FA code?

Yes. If you give them the two-factor authentication code sent to your phone, they can bypass security and access your account. Never share 2FA codes with anyone over the phone or through a text message.

Should I report these texts?

Absolutely. Reporting helps authorities track and stop these scams. Forward suspicious messages to Bank of America’s fraud department at abuse@bankofamerica.com, and file a report with the FTC and IC3.

Is it safe to use BoA’s mobile app or website?

Yes, as long as you access it directly through the official app or by typing in the URL (https://www.bankofamerica.com). Avoid clicking on links in unsolicited messages or emails.

Will Bank of America ever ask me to download software?

No. Bank of America will never ask you to download remote desktop tools or give anyone control of your device. If someone claims otherwise, it’s a scam.

The Bottom Line

The Bank of America text scam is a highly organized and convincing fraud operation that preys on fear and urgency. From fake fraud alerts to full-on remote takeovers of your devices, these scams are a growing threat to consumers everywhere.

Always be skeptical of unexpected texts requesting immediate action or personal information. When in doubt, contact your bank directly through official channels. Never trust a number or link from an unsolicited message.

Stay alert, stay informed, and never let urgency override caution. The more you know, the harder it is for scammers to succeed.

If you found this article helpful, share it with friends and family—you could save someone from falling victim to this dangerous scam.

10 Rules to Avoid Online Scams

Here are 10 practical safety rules to help you avoid malware, online shopping scams, crypto scams, and other online fraud. Each tip includes a quick “if you already got hit” action.

  1. Stop and verify before you click, log in, download, or pay.

    warning sign

    Most scams win by creating urgency. Verify using a trusted method: type the website address yourself, use the official app, or call a known number (not the one in the message).

    If you already clicked: close the page, do not enter passwords, and run a malware scan.

  2. Keep your operating system, browser, and apps updated.

    updates guide

    Updates patch security holes used by malware and malicious ads. Turn on automatic updates where possible.

    If you saw a scary “update now” pop-up: close it and update only through your device settings or the official app store.

  3. Use layered protection: antivirus plus an ad blocker.

    shield guide

    Antivirus helps block malware. An ad blocker reduces scam redirects, phishing pages, and malvertising.

    If your browser is acting weird: remove unknown extensions, reset the browser, then run a full scan.

  4. Install apps, software, and extensions only from official sources.

    install guide

    Avoid cracked software, “keygens,” and random downloads. During installs, choose Custom/Advanced and decline bundled offers you do not recognize.

    If you already installed something suspicious: uninstall it, restart, and scan again.

  5. Treat links and attachments as untrusted by default.

    cursor sign

    Phishing often impersonates delivery services, banks, and popular brands. If it is unexpected, do not open attachments or log in through the message.

    If you entered credentials: change the password immediately and enable 2FA.

  6. Shop safely: research the store, then pay with protection.

    trojan horse

    Be cautious with brand-new stores, “closing sale” stories, and prices that make no sense. Prefer credit cards or PayPal for dispute options. Avoid wire transfers, gift cards, and crypto payments.

    If you already paid: contact your card issuer or PayPal quickly to dispute the transaction.

  7. Crypto rule: never pay a “fee” to withdraw or recover money.

    lock sign

    Common patterns include fake profits, then “tax,” “gas,” or “verification” fees. Another is a “recovery agent” who demands upfront crypto.

    If you already sent crypto: stop paying, save evidence (wallet addresses, TXIDs, chats), and report the scam to the platform used.

  8. Secure your accounts with unique passwords and 2FA (start with email).

    lock sign

    Use a password manager and unique passwords for every account. Enable 2FA using an authenticator app when possible.

    If you suspect an account takeover: change passwords, sign out of all devices, and review recent logins and recovery settings.

  9. Back up important files and keep one backup offline.

    backup sign

    Backups protect you from ransomware and device failure. Keep at least one backup on an external drive that is not always connected.

    If you suspect infection: do not connect backup drives until the system is clean.

  10. If you think you are a victim: stop losses, document evidence, and escalate fast.

    warning sign

    Move quickly. Speed matters for disputes, account recovery, and limiting damage.

    • Stop payments and contact: do not send more money or respond to the scammer.
    • Call your bank or card issuer: block transactions, replace the card if needed, and start a dispute or chargeback.
    • Secure your email first: change the email password, enable 2FA, and remove unfamiliar recovery options.
    • Secure other accounts: change passwords, enable 2FA, and log out of all sessions.
    • Scan your device: remove suspicious apps or extensions, then run a full malware scan.
    • Save evidence: screenshots, emails, order pages, tracking pages, wallet addresses, TXIDs, and chat logs.
    • Report it: to the payment provider, marketplace, social platform, exchange, or wallet service involved.

These rules are intentionally simple. Most online losses happen when decisions are rushed. Slow down, verify independently, and use payment methods and account controls that give you recourse.

3 thoughts on “Bank of America Text Scams: The Shocking Truth Behind Fake Fraud Alerts”

  1. This happened to an 80 year old person. B of A’s help-did not bother to talk to this client. the client had only 1 B of A Credit card for over 50 years. No checking, savings or anyother BOA Account. The bank president put him in a room and told him to call the 800 number on the. back of the one credit card he had in his wallet. Many hours over several days were on hold to BOA, and no help. They could not even tell the client the dates they supposedly issued other cards to the client. (he got 4 cards within one week ) He did not ask for any of those cards) so now, he is stuck. BOA after one month ,closed his case, claiming the fraud came from his phone number. The their obtained a second card and got just under 10 Grand off of card one, transferred it to the new card-and is off with this money. So BOA closed the investigation. Reported the fraud to the clients credit reports and the money, back to thge clients account, as now they claim he owes the money. I am sure BOA is aware of this scam using their BOA name and logo. so no help from this worthless bank. We had a personal friend get the texts off of the clients cell phone. We are waiting for the fraud package that BOA used for their investigation. Once we get it, we have to file many reports to different agencies. And as the clock is ticking, try to get help to avoid ruining the clients credit and demanding this debt to be paid by the client. When we called the fraud unit, they could not answer all the questions, like when did they send out the added cards and who requested them. Now as it stands, one can say the client falsely filed a fraud claim and BOD now sees it as the client committed fraud by reporting this. BOA always was bad, this takes it to a new limit. if you see the class action suit filed against BOD for not investigating fraud, this is not news to this bank,

    Reply
    • Hi Dani, thank you for sharing this. That sounds like a serious fraud case, especially involving an elderly victim and accounts/cards they say they did not request. Keep pushing for written records from the bank, file police and identity theft reports, and consider complaints with the CFPB and state attorney general.

      Reply
    • Hi Dani, thank you for sharing this.

      That sounds like a serious fraud and identity-theft situation, especially involving an elderly person and cards they say they never requested. Keep pushing for written records from the bank, file police and identity theft reports, and consider complaints with the CFPB and your state attorney general.

      Reply

Comment on this post

Previous

Gtop10.net Scam Exposed: Why You Should Never Trust “Free” Gaming Items

Next

Bloxa.us Scam Exposed – The Truth Behind the Robux Giveaway