Bank of America Text Scams: The Shocking Truth Behind Fake Fraud Alerts
Written by: Thomas Orsolya
Published on:
You’re going about your day when a text pops up: “BofA Payment Accepted for $153.48 at PetSmart. Was this you?” It looks legitimate. It even sounds like the real Bank of America (BoA). But here’s the chilling truth: it’s a scam.
These phishing attacks are not just widespread—they’re evolving. In recent years, Bank of America customers have become frequent targets of sophisticated smishing campaigns. These scams mimic real fraud alerts, luring victims into a trap that can compromise their personal data, banking credentials, and more.
If you think you could never fall for it, think again. These scammers are professionals.
Read on to discover how the Bank of America text scam works, how to recognize it, and what you can do if you’ve been caught in their net.
Scam Overview
Bank of America (BoA) is one of the largest financial institutions in the United States, which makes it a prime target for cybercriminals and fraudsters. Among the most effective tools in a scammer’s arsenal today is the phishing text message—known as “smishing” (SMS phishing).
What is the BoA Text Scam?
The BoA text scam is a deceptive technique where scammers send fake messages that appear to come from Bank of America. These messages typically warn of suspicious account activity, declined transactions, or a suspended debit card. The goal is to alarm the recipient into acting quickly without thinking.
Often, these texts include a phone number to call or a link to click. In many cases, the sender’s name may resemble an official BoA department, such as “BofA_Support_Line@comcast.net” or variations like “bofa-alert@haix.it”. The messages may even include legitimate-sounding phrasing such as:
“(Fraud) Alert: Your BoFA ATM/Debit card has been suspended. Please call 1-800-XXX-XXXX to verify.”
“BofA Payment Accepted for $153.48 at PetSmart on 04/21. Was this you? IF NO RING 8XX-XXX-XXXX.”
These messages are constructed to mirror actual Bank of America fraud alerts. In fact, they are so convincing that many victims call the number provided, only to be redirected to a fake call center or interactive voice system that imitates BoA’s actual fraud department.
Once victims are hooked, the scam progresses with tactics that further compromise security and drain financial resources.
The Scope of the Scam
This is not a fringe operation. Data from recent investigations have uncovered extensive and coordinated campaigns targeting BoA users across the country:
59+ card suspension messages traced to scam campaigns.
97+ unique phone numbers used in smishing attempts.
Suspicious domains and email headers, such as those ending in “@comcast.net” or “@haix.it”.
Domains like “b_o_f_a_support_line@comcast.net” are designed to hide behind foreign infrastructure, making them difficult to shut down or trace. These operations often use rotating phone numbers and disposable email addresses to avoid detection.
What’s more alarming is how sophisticated these scam networks have become. Many use automated voice systems and scripted customer service agents who can answer common questions, making it incredibly difficult to distinguish them from actual BoA representatives.
Psychological Manipulation
These scams rely on a sense of urgency and fear. By mimicking the language and formatting of real BoA alerts, they lower the guard of even the most cautious users. Scammers use pressure tactics like immediate suspension of cards or large unauthorized transactions to provoke panic.
Victims are often caught during vulnerable moments—early in the morning, late at night, or when they’re distracted. This timing is strategic. By triggering an emotional response, scammers bypass rational thinking and manipulate victims into compliance.
And once they have your attention, they make you believe that only immediate action will prevent financial disaster. That action, unfortunately, often leads you directly into their trap.
How The Scam Works: Step-by-Step Breakdown
Understanding how this scam unfolds is critical to avoiding it. Below is a detailed step-by-step walkthrough of how these fake BoA text scams are orchestrated.
Step 1: The Setup – Spoofed Message
The scam begins with a text message. It might look like this:
“BofA Payment Accepted for $153.48 at PetSmart. Was this you? IF NO, call 800-XXX-XXXX.”
Or:
“Alert: Your BofA ATM/Debit card has been suspended. Please verify activity immediately by calling 888-XXX-XXXX.”
These messages are often sent from spoofed email addresses like:
b_o_f_a_support_line@comcast.net
alerts_bofa@protonmail.com
They may also use caller ID masking techniques to display a name resembling “Bank of America” or “BoFA Security.”
This first message is the bait—crafted to mimic real financial alerts in tone, structure, and content. Many use clever formatting and capitalize on the fear of unauthorized spending or blocked funds.
Step 2: The Hook – Call the Number
Once you call the provided number, you’ll encounter one of two things:
An Interactive Voice Response (IVR) menu that mimics BoA’s actual fraud hotline.
A live scammer pretending to be a fraud specialist from Bank of America.
The system may play hold music or even queue messages similar to BoA’s official line. Live scammers are trained to sound reassuring and competent. They might introduce themselves with names, badge numbers, and even offer to “verify” your case ID to build legitimacy.
In both cases, the illusion of legitimacy is strong. These scammers follow detailed, scripted dialogues. Their tone is professional, and the background noise may even simulate a real call center environment.
Step 3: Verification Request – Gathering Information
They’ll begin asking for standard verification details:
Full name
Date of birth
ZIP code
Last four digits of your Social Security Number
Full debit or credit card number
Online banking username
To build further trust, they may even send you a real BoA-style 2FA (two-factor authentication) code to your phone and ask you to read it back. This enables them to bypass your account protections.
Once this information is collected, it’s either used immediately to access your accounts or sold on the dark web to other criminals.
Step 4: The Remote Access Ruse
Once they have initial access, the scam intensifies. The caller will claim your device has been compromised or infected. To “fix” the issue or process a “refund,” they will ask you to:
Download a remote desktop app such as AnyDesk, TeamViewer, or Zoho Assist.
These tools give the scammer full access to your computer or smartphone.
They walk you through installing the app, adjusting permissions, and even leaving it open for “further diagnostics.” What they’re really doing is preparing to take full control over your digital life.
Step 5: Taking Over
With remote access in place, the scammer now has real-time control over your device. Here’s what happens next:
They log into your online banking to monitor transactions.
They install malware or keyloggers to capture passwords.
They transfer money out or make unauthorized purchases.
They may change account settings, lock you out, or reroute recovery emails.
In many cases, they will create a scenario where you appear to be refunded too much money. Then they ask you to return the “excess” using:
Gift cards (Google Play, Apple, Target)
Zelle or Cash App transfers
You are instructed to purchase gift cards and send the codes immediately, under the guise of reconciling the mistake. Victims have reported losing thousands of dollars through this technique. Some have even been told to go to multiple stores to avoid gift card purchase limits.
Step 6: Vanishing Act
Once the scammers have what they want, the number stops working. Emails bounce back. You’re left locked out of your accounts or out thousands of dollars.
By this point, your personal data may already be in circulation. Many victims face additional fraud attempts days or weeks later, sometimes from different angles like email phishing or fake tech support calls.
What to Do If You’ve Fallen Victim
If you’ve already interacted with a scammer through a BoA text scam, it’s essential to act fast. Here’s a detailed checklist to help you mitigate the damage.
1. Disconnect and Uninstall Remote Tools
If you allowed remote access via AnyDesk, TeamViewer, or similar:
Immediately disconnect from the internet.
Uninstall any remote access applications.
Reboot your device in Safe Mode.
Revoke access permissions granted to third-party apps.
2. Secure Your Accounts
Change your Bank of America online banking password immediately.
Change passwords for any email or social accounts that use the same credentials.
Also report the scam to your local law enforcement agency. If gift cards were purchased, report the codes as stolen to the issuing companies.
6. Scan Your Device
Use reputable antivirus or antimalware software to scan your device.
Delete suspicious files or software.
Restore your device from a clean backup if needed.
Keep your software and operating system updated.
7. Don’t Blame Yourself
These scammers are highly skilled at manipulation. The best thing you can do now is learn from the experience and share it with others to prevent future victims.
Even well-informed individuals can fall for well-crafted scams. Stay vigilant, informed, and proactive about your cybersecurity.
Is Your Device Infected? Scan for Malware
If your computer or phone is slow, showing unwanted pop-ups, or acting strangely, malware could be the cause. Running a scan with Malwarebytes Anti-Malware Free is one of the most reliable ways to detect and remove harmful software. The free version can identify and clean common infections such as adware, browser hijackers, trojans, and other unwanted programs.
Malwarebytes works on Windows, Mac, and Android devices. Choose your operating system below and follow the steps to scan your device and remove any malware that might be slowing it down.
Malwarebytes for WindowsMalwarebytes for MacMalwarebytes for Android
Run a Malware Scan with Malwarebytes for Windows
Malwarebytes stands out as one of the leading and widely-used anti-malware solutions for Windows, and for good reason. It effectively eradicates various types of malware that other programs often overlook, all at no cost to you. When it comes to disinfecting an infected device, Malwarebytes has consistently been a free and indispensable tool in the battle against malware. We highly recommend it for maintaining a clean and secure system.
Download Malwarebytes
Download the latest version of Malwarebytes for Windows using the official link below. Malwarebytes will scan your computer and remove adware, browser hijackers, and other malicious software for free.
(The above link will open a new page from where you can download Malwarebytes)
Install Malwarebytes
After the download is complete, locate the MBSetup file, typically found in your Downloads folder. Double-click on the MBSetup file to begin the installation of Malwarebytes on your computer. If a User Account Control pop-up appears, click “Yes” to continue the Malwarebytes installation.
Follow the On-Screen Prompts to Install Malwarebytes
When the Malwarebytes installation begins, the setup wizard will guide you through the process.
You’ll first be prompted to choose the type of computer you’re installing the program on—select either “Personal Computer” or “Work Computer” as appropriate, then click on Next.
Malwarebytes will now begin the installation process on your device.
When the Malwarebytes installation is complete, the program will automatically open to the “Welcome to Malwarebytes” screen.
On the final screen, simply click on the Open Malwarebytes option to start the program.
Enable “Rootkit scanning”.
Malwarebytes Anti-Malware will now start, and you will see the main screen as shown below. To maximize Malwarebytes’ ability to detect malware and unwanted programs, we need to enable rootkit scanning. Click on the “Settings” gear icon located on the left of the screen to access the general settings section.
In the settings menu, enable the “Scan for rootkits” option by clicking the toggle switch until it turns blue.
Now that you have enabled rootkit scanning, click on the “Dashboard” button in the left pane to get back to the main screen.
Perform a Scan with Malwarebytes.
To start a scan, click the Scan button. Malwarebytes will automatically update its antivirus database and begin scanning your computer for malicious programs.
Wait for the Malwarebytes scan to complete.
Malwarebytes will now scan your computer for browser hijackers and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check the status of the scan to see when it is finished.
Quarantine detected malware
Once the Malwarebytes scan is complete, it will display a list of detected malware, adware, and potentially unwanted programs. To effectively remove these threats, click the “Quarantine” button.
Malwarebytes will now delete all of the files and registry keys and add them to the program’s quarantine.
Restart your computer.
When removing files, Malwarebytes may require a reboot to fully eliminate some threats. If you see a message indicating that a reboot is needed, please allow it. Once your computer has restarted and you are logged back in, you can continue with the remaining steps.
Once the scan completes, remove all detected threats. Your Windows computer should now be clean and running smoothly again, free of trojans, adware, and other malware.
If your current antivirus allowed this malicious program on your computer, you may want to consider purchasing Malwarebytes Premium to protect against these types of threats in the future. If you are still having problems with your computer after completing these instructions, then please follow one of the steps:
Malwarebytes for Mac is an on-demand scanner that can destroy many types of malware that other software tends to miss without costing you absolutely anything. When it comes to cleaning up an infected device, Malwarebytes has always been free, and we recommend it as an essential tool in the fight against malware.
Download Malwarebytes for Mac.
You can download Malwarebytes for Mac by clicking the link below.
When Malwarebytes has finished downloading, double-click on the setup file to install Malwarebytes on your computer. In most cases, downloaded files are saved to the Downloads folder.
Follow the on-screen prompts to install Malwarebytes.
When the Malwarebytes installation begins, you will see the Malwarebytes for Mac Installer which will guide you through the installation process. Click “Continue“, then keep following the prompts to continue with the installation process.
When your Malwarebytes installation completes, the program opens to the Welcome to Malwarebytes screen. Click the “Get started” button.
Select “Personal Computer” or “Work Computer”.
The Malwarebytes Welcome screen will first ask you what type of computer are you installing this program, click either Personal Computer or Work Computer.
Click on “Scan”.
To scan your computer with Malwarebytes, click on the “Scan” button. Malwarebytes for Mac will automatically update the antivirus database and start scanning your computer for malware.
Wait for the Malwarebytes scan to complete.
Malwarebytes will scan your computer for adware, browser hijackers, and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
Click on “Quarantine”.
When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes has detected. To remove the malware that Malwarebytes has found, click on the “Quarantine” button.
Restart computer.
Malwarebytes will now remove all the malicious files that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your computer.
After scanning, delete any detected threats. Your Mac should now be free from adware, unwanted extensions, and other potentially harmful software.
If your current antivirus allowed a malicious program on your computer, you might want to consider purchasing the full-featured version of Malwarebytes Anti-Malware to protect against these types of threats in the future. If you are still experiencing problems while trying to remove a malicious program from your computer, please ask for help in our Mac Malware Removal Help & Support forum.
Run a Malware Scan with Malwarebytes for Android
Malwarebytes for Android automatically detects and removes dangerous threats like malware and ransomware so you don’t have to worry about your most-used device being compromised. Aggressive detection of adware and potentially unwanted programs keeps your Android phone or tablet running smooth.
Download Malwarebytes for Android.
You can download Malwarebytes for Android by clicking the link below.
In the Google Play Store, tap “Install” to install Malwarebytes for Android on your device.
When the installation process has finished, tap “Open” to begin using Malwarebytes for Android. You can also open Malwarebytes by tapping on its icon in your phone menu or home screen.
Follow the on-screen prompts to complete the setup process
When Malwarebytes will open, you will see the Malwarebytes Setup Wizard which will guide you through a series of permissions and other setup options. This is the first of two screens that explain the difference between the Premium and Free versions. Swipe this screen to continue. Tap on “Got it” to proceed to the next step. Malwarebytes for Android will now ask for a set of permissions that are required to scan your device and protect it from malware. Tap on “Give permission” to continue. Tap on “Allow” to permit Malwarebytes to access the files on your phone.
Update database and run a scan with Malwarebytes for Android
You will now be prompted to update the Malwarebytes database and run a full system scan.
Click on “Update database” to update the Malwarebytes for Android definitions to the latest version, then click on “Run full scan” to perform a system scan.
Wait for the Malwarebytes scan to complete.
Malwarebytes will now start scanning your phone for adware and other malicious apps. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
Click on “Remove Selected”.
When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes for Android has detected. To remove the malicious apps that Malwarebytes has found, tap on the “Remove Selected” button.
Restart your phone.
Malwarebytes for Android will now remove all the malicious apps that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your device.
When the scan is finished, remove all detected threats. Your Android phone should now be free of malicious apps, adware, and unwanted browser redirects.
If your current antivirus allowed a malicious app on your phone, you may want to consider purchasing the full-featured version of Malwarebytes to protect against these types of threats in the future. If you are still having problems with your phone after completing these instructions, then please follow one of the steps:
Restore your phone to factory settings by going to Settings > General management > Reset > Factory data reset.
After cleaning your device, it’s important to protect it from future infections and annoying pop-ups. We recommend installing an ad blocker such as AdGuard. AdGuard blocks malicious ads, prevents phishing attempts, and stops dangerous redirects, helping you stay safe while browsing online.
Frequently Asked Questions (FAQ)
What is the Bank of America text scam?
The Bank of America text scam is a phishing scheme where scammers send fraudulent SMS messages claiming to be from BoA. These messages often reference fake transactions or account suspensions and urge recipients to call a phone number or click a link. The goal is to steal personal information, banking credentials, and gain remote access to devices.
Is Bank of America really sending these texts?
No. These texts do not come from Bank of America. While they are designed to look official, they are part of a smishing campaign operated by scammers. BoA does not send texts from email-based addresses or ask customers to call unverified numbers.
How can I tell if a text from BoA is fake?
Watch for these red flags:
The message comes from an email domain like “@comcast.net” or “@haix.it.”
It asks you to call a number not listed on BoA’s official website.
It includes poor grammar, strange capitalization, or urgent threats.
It asks for sensitive information like your full SSN, card number, or 2FA code.
What happens if I call the number in the scam text?
You will likely be connected to a scam call center or fake automated system. The scammers will impersonate BoA employees and try to collect your private details or convince you to install remote access software like AnyDesk. This can lead to identity theft and financial loss.
Why do scammers ask for remote access to my device?
They claim your device is compromised or needs to be secured. Once connected, they can:
Steal banking credentials.
Transfer funds in real-time.
Install malware.
Lock you out of your own accounts.
What should I do if I already responded to a scam message?
Take these steps immediately:
Disconnect from the internet.
Uninstall any remote access apps.
Contact Bank of America directly at 1-800-432-1000.
Change all affected passwords.
Report the scam to the FTC and IC3.
Monitor your bank and credit statements closely.
Can scammers access my BoA account with a 2FA code?
Yes. If you give them the two-factor authentication code sent to your phone, they can bypass security and access your account. Never share 2FA codes with anyone over the phone or through a text message.
Should I report these texts?
Absolutely. Reporting helps authorities track and stop these scams. Forward suspicious messages to Bank of America’s fraud department at abuse@bankofamerica.com, and file a report with the FTC and IC3.
Is it safe to use BoA’s mobile app or website?
Yes, as long as you access it directly through the official app or by typing in the URL (https://www.bankofamerica.com). Avoid clicking on links in unsolicited messages or emails.
Will Bank of America ever ask me to download software?
No. Bank of America will never ask you to download remote desktop tools or give anyone control of your device. If someone claims otherwise, it’s a scam.
The Bottom Line
The Bank of America text scam is a highly organized and convincing fraud operation that preys on fear and urgency. From fake fraud alerts to full-on remote takeovers of your devices, these scams are a growing threat to consumers everywhere.
Always be skeptical of unexpected texts requesting immediate action or personal information. When in doubt, contact your bank directly through official channels. Never trust a number or link from an unsolicited message.
Stay alert, stay informed, and never let urgency override caution. The more you know, the harder it is for scammers to succeed.
If you found this article helpful, share it with friends and family—you could save someone from falling victim to this dangerous scam.
10 Rules to Avoid Online Scams
Here are 10 practical safety rules to help you avoid malware, online shopping scams, crypto scams, and other online fraud. Each tip includes a quick “if you already got hit” action.
Stop and verify before you click, log in, download, or pay.
Most scams win by creating urgency. Verify using a trusted method: type the website address yourself, use the official app, or call a known number (not the one in the message).
If you already clicked: close the page, do not enter passwords, and run a malware scan.
Keep your operating system, browser, and apps updated.
Updates patch security holes used by malware and malicious ads. Turn on automatic updates where possible.
If you saw a scary “update now” pop-up: close it and update only through your device settings or the official app store.
Use layered protection: antivirus plus an ad blocker.
Antivirus helps block malware. An ad blocker reduces scam redirects, phishing pages, and malvertising.
If your browser is acting weird: remove unknown extensions, reset the browser, then run a full scan.
Install apps, software, and extensions only from official sources.
Avoid cracked software, “keygens,” and random downloads. During installs, choose Custom/Advanced and decline bundled offers you do not recognize.
If you already installed something suspicious: uninstall it, restart, and scan again.
Treat links and attachments as untrusted by default.
Phishing often impersonates delivery services, banks, and popular brands. If it is unexpected, do not open attachments or log in through the message.
If you entered credentials: change the password immediately and enable 2FA.
Shop safely: research the store, then pay with protection.
Be cautious with brand-new stores, “closing sale” stories, and prices that make no sense. Prefer credit cards or PayPal for dispute options. Avoid wire transfers, gift cards, and crypto payments.
If you already paid: contact your card issuer or PayPal quickly to dispute the transaction.
Crypto rule: never pay a “fee” to withdraw or recover money.
Common patterns include fake profits, then “tax,” “gas,” or “verification” fees. Another is a “recovery agent” who demands upfront crypto.
If you already sent crypto: stop paying, save evidence (wallet addresses, TXIDs, chats), and report the scam to the platform used.
Secure your accounts with unique passwords and 2FA (start with email).
Use a password manager and unique passwords for every account. Enable 2FA using an authenticator app when possible.
If you suspect an account takeover: change passwords, sign out of all devices, and review recent logins and recovery settings.
Back up important files and keep one backup offline.
Backups protect you from ransomware and device failure. Keep at least one backup on an external drive that is not always connected.
If you suspect infection: do not connect backup drives until the system is clean.
If you think you are a victim: stop losses, document evidence, and escalate fast.
Move quickly. Speed matters for disputes, account recovery, and limiting damage.
Stop payments and contact: do not send more money or respond to the scammer.
Call your bank or card issuer: block transactions, replace the card if needed, and start a dispute or chargeback.
Secure your email first: change the email password, enable 2FA, and remove unfamiliar recovery options.
Secure other accounts: change passwords, enable 2FA, and log out of all sessions.
Scan your device: remove suspicious apps or extensions, then run a full malware scan.
Save evidence: screenshots, emails, order pages, tracking pages, wallet addresses, TXIDs, and chat logs.
Report it: to the payment provider, marketplace, social platform, exchange, or wallet service involved.
These rules are intentionally simple. Most online losses happen when decisions are rushed. Slow down, verify independently, and use payment methods and account controls that give you recourse.
3 thoughts on “Bank of America Text Scams: The Shocking Truth Behind Fake Fraud Alerts”
This happened to an 80 year old person. B of A’s help-did not bother to talk to this client. the client had only 1 B of A Credit card for over 50 years. No checking, savings or anyother BOA Account. The bank president put him in a room and told him to call the 800 number on the. back of the one credit card he had in his wallet. Many hours over several days were on hold to BOA, and no help. They could not even tell the client the dates they supposedly issued other cards to the client. (he got 4 cards within one week ) He did not ask for any of those cards) so now, he is stuck. BOA after one month ,closed his case, claiming the fraud came from his phone number. The their obtained a second card and got just under 10 Grand off of card one, transferred it to the new card-and is off with this money. So BOA closed the investigation. Reported the fraud to the clients credit reports and the money, back to thge clients account, as now they claim he owes the money. I am sure BOA is aware of this scam using their BOA name and logo. so no help from this worthless bank. We had a personal friend get the texts off of the clients cell phone. We are waiting for the fraud package that BOA used for their investigation. Once we get it, we have to file many reports to different agencies. And as the clock is ticking, try to get help to avoid ruining the clients credit and demanding this debt to be paid by the client. When we called the fraud unit, they could not answer all the questions, like when did they send out the added cards and who requested them. Now as it stands, one can say the client falsely filed a fraud claim and BOD now sees it as the client committed fraud by reporting this. BOA always was bad, this takes it to a new limit. if you see the class action suit filed against BOD for not investigating fraud, this is not news to this bank,
Hi Dani, thank you for sharing this. That sounds like a serious fraud case, especially involving an elderly victim and accounts/cards they say they did not request. Keep pushing for written records from the bank, file police and identity theft reports, and consider complaints with the CFPB and state attorney general.
That sounds like a serious fraud and identity-theft situation, especially involving an elderly person and cards they say they never requested. Keep pushing for written records from the bank, file police and identity theft reports, and consider complaints with the CFPB and your state attorney general.
Thomas is an expert at uncovering scams and providing in-depth reporting on cyber threats and online fraud. As an editor, he is dedicated to keeping readers informed on the latest developments in cybersecurity and tech.
This happened to an 80 year old person. B of A’s help-did not bother to talk to this client. the client had only 1 B of A Credit card for over 50 years. No checking, savings or anyother BOA Account. The bank president put him in a room and told him to call the 800 number on the. back of the one credit card he had in his wallet. Many hours over several days were on hold to BOA, and no help. They could not even tell the client the dates they supposedly issued other cards to the client. (he got 4 cards within one week ) He did not ask for any of those cards) so now, he is stuck. BOA after one month ,closed his case, claiming the fraud came from his phone number. The their obtained a second card and got just under 10 Grand off of card one, transferred it to the new card-and is off with this money. So BOA closed the investigation. Reported the fraud to the clients credit reports and the money, back to thge clients account, as now they claim he owes the money. I am sure BOA is aware of this scam using their BOA name and logo. so no help from this worthless bank. We had a personal friend get the texts off of the clients cell phone. We are waiting for the fraud package that BOA used for their investigation. Once we get it, we have to file many reports to different agencies. And as the clock is ticking, try to get help to avoid ruining the clients credit and demanding this debt to be paid by the client. When we called the fraud unit, they could not answer all the questions, like when did they send out the added cards and who requested them. Now as it stands, one can say the client falsely filed a fraud claim and BOD now sees it as the client committed fraud by reporting this. BOA always was bad, this takes it to a new limit. if you see the class action suit filed against BOD for not investigating fraud, this is not news to this bank,
Hi Dani, thank you for sharing this. That sounds like a serious fraud case, especially involving an elderly victim and accounts/cards they say they did not request. Keep pushing for written records from the bank, file police and identity theft reports, and consider complaints with the CFPB and state attorney general.
Hi Dani, thank you for sharing this.
That sounds like a serious fraud and identity-theft situation, especially involving an elderly person and cards they say they never requested. Keep pushing for written records from the bank, file police and identity theft reports, and consider complaints with the CFPB and your state attorney general.