Chase Bank Fraud Department Scam Calls: How to Spot and Stop Them
Written by: Thomas Orsolya
Published on:
Imagine picking up the phone on a quiet Saturday, only to hear someone claiming to be from the Chase Bank fraud department. They sound convincing. They say your account is in danger. They ask you to act quickly. For many people, this is how the Chase Bank Fraud Department scam begins. It is one of the most dangerous phone scams today, and thousands of victims have already fallen prey to it. This article will uncover exactly how the scam works, what warning signs to watch for, and what steps to take if you become a victim.
Scam Overview
The Chase Bank Fraud Department scam is a form of tech support and phishing fraud designed to trick people into giving away sensitive financial information. Scammers pose as representatives from Chase Bank, one of the largest banks in the United States, and claim there is suspicious activity or fraudulent charges on your account. Their goal is to pressure you into handing over your personal and banking details or giving them remote access to your devices.
At first glance, the call feels legitimate. The scammers often spoof official-looking phone numbers, sometimes even displaying “Chase Bank Fraud Department” on caller ID. This tactic is meant to build instant trust and urgency. Many victims believe they are truly speaking with Chase representatives because the conversation sounds professional, and the caller uses banking terminology.
The scam usually begins with a statement about suspicious charges. For example, the scammer might say there has been a credit application for a new iPhone 17 Max in your name. They will then ask if this purchase was authorized. Once you deny it, they move into the pressure phase. They claim they need to verify your identity or stop the fraudulent transaction, but for that to happen, you must provide personal information, such as your full name, date of birth, Social Security number, or even your online banking credentials.
Scammers also use an alternative technique that ties into tech support fraud. In this version, they may ask you to write down a special phone number to call back. When you dial this number, you reach a fake support center where scammers insist they need remote access to your computer or phone through software like AnyDesk, TeamViewer, or LogMeIn. They pretend this is necessary to secure your accounts or issue a refund. Once connected, they steal stored passwords, financial records, and sensitive files.
Gift card fraud is another hallmark of this scam. After convincing you that your account is compromised, scammers instruct you to buy gift cards, sometimes worth hundreds or thousands of dollars, and provide them with the codes. They claim this is part of the fraud investigation or a way to safeguard your money temporarily. In reality, once you hand over those codes, the funds are gone forever.
The reason this scam is so dangerous is that it exploits fear and urgency. Victims believe they are protecting themselves, but instead, they are giving scammers the exact tools they need to steal money or identities. Older adults and individuals unfamiliar with digital security are especially vulnerable, but anyone can become a target.
The calls are becoming increasingly sophisticated. Some scammers even provide fake employee ID numbers, case reference numbers, or send follow-up texts to confirm their “legitimacy.” In some cases, victims report hearing background noise that resembles a real call center, making the operation seem more convincing.
The Federal Trade Commission (FTC), the Federal Communications Commission (FCC), and several cybersecurity watchdog groups have warned about the rising frequency of Chase-related fraud calls. Despite ongoing awareness campaigns, many consumers remain unaware of the exact mechanics of these scams, which makes education and prevention critical.
Scams like this are not limited to Chase Bank. Similar fraud calls impersonate Wells Fargo, Bank of America, Citi, and other financial institutions. However, Chase remains a prime target because of its large customer base.
In short, the Chase Bank Fraud Department scam is designed to trick you into believing your money is in danger so that you make rushed decisions that benefit the scammer. It blends elements of phishing, social engineering, and tech support fraud into a single, highly manipulative operation.
How the Scam Works
Understanding the mechanics of this scam is the best way to protect yourself. Below is a detailed step-by-step breakdown of how scammers typically operate.
Step 1: Initial Contact
The scam begins with a phone call, usually from an 888 or spoofed number. Caller ID may display “Chase Fraud Department.” The scammer introduces themselves as a fraud investigator or bank officer. Their tone is urgent but professional.
Step 2: Claim of Suspicious Activity
The caller informs you that suspicious activity has been detected on your account. A common story involves a high-value purchase, such as the latest iPhone or a large online order. They ask if you authorized the transaction. This creates immediate fear and confusion.
Step 3: Urgency and Authority
Once you deny the purchase, the scammer emphasizes the urgency of the situation. They claim that unless you act quickly, the fraudulent charge will go through. To appear credible, they may provide a fake case number, employee ID, or reference code.
Step 4: Request for Personal Information
The scammer then transitions to extracting information. They may ask for:
Full name
Date of birth
Social Security number
Online banking username and password
Debit or credit card numbers
Security codes
The scammer frames this as a necessary step to verify your identity and stop the fraudulent charge.
Step 5: Call-Back Number Trick
If you appear hesitant, the scammer may give you another phone number to call back. This number connects to a fake call center staffed by other scammers who continue the deception. Their goal is to extend the scam by providing additional “support.”
Step 6: Remote Access Request
In many cases, scammers escalate the fraud by requesting remote access to your device. They ask you to install remote access tools such as AnyDesk or TeamViewer. They claim they need to check for malware, verify transactions, or issue a refund. Once connected, they can:
Steal saved passwords
Access online banking portals
Copy sensitive documents
Install additional malware
Step 7: The Refund Scam
Some scammers use the classic “refund scam.” They claim they will refund the fraudulent charge but pretend to accidentally refund too much money. They then pressure you to return the excess amount by wire transfer, cryptocurrency, or gift cards. In reality, no refund ever happened.
Step 8: Gift Card Payments
Another tactic involves instructing victims to buy gift cards from major retailers. The scammer claims this is a secure way to “protect” funds during the fraud investigation. Once you provide the gift card codes, the scammer redeems them instantly, and the money is unrecoverable.
Step 9: Psychological Manipulation
Throughout the interaction, scammers use psychological tricks to maintain control. They may act frustrated if you question them, guilt-trip you by saying you are wasting their time, or reassure you that they are “just trying to help.” This emotional manipulation is designed to lower your defenses.
Step 10: Endgame
The scam concludes once the scammer has extracted enough information, stolen money, or gained access to your accounts. Often, victims only realize they have been scammed after checking their accounts and noticing unauthorized withdrawals.
What to Do if You Have Fallen Victim
If you have already provided information or money to these scammers, it is crucial to act quickly. Here are the steps you should take immediately:
1. Contact Chase Bank Directly
Call the official Chase customer service number listed on the back of your card or on the official Chase website. Do not call any number given to you by the scammer. Explain the situation and ask Chase to freeze or monitor your accounts.
2. Change Your Online Banking Passwords
Log in to your Chase account from a secure device and change your username and password. Also update security questions and enable two-factor authentication if available.
3. Notify Your Credit Card Issuers
If you provided card information, contact your credit card companies to block the compromised cards and issue replacements.
Local Police: File a police report for documentation.
IC3: If money was transferred online, report to the FBI’s Internet Crime Complaint Center at ic3.gov.
5. Run Security Scans
If you installed remote access software, disconnect your device from the internet immediately. Then run full antivirus and anti-malware scans. In some cases, you may need professional IT support to ensure your system is secure.
6. Monitor Your Credit Reports
Place a fraud alert with the three major credit bureaus:
Equifax: 1-800-685-1111
Experian: 1-888-397-3742
TransUnion: 1-888-909-8872
Check your credit reports for any unauthorized activity. You may also consider a credit freeze to prevent new accounts from being opened in your name.
7. Recover Gift Card Losses (If Applicable)
If you purchased gift cards for scammers, contact the retailer immediately. While recovery is unlikely, some retailers may be able to freeze unused balances if you act quickly.
8. Stay Alert for Follow-Up Scams
Scammers often target victims more than once. They may call again pretending to be law enforcement or another bank representative. Do not trust any unsolicited calls. Hang up and verify directly with official channels.
Is Your Device Infected? Scan for Malware
If your computer or phone is slow, showing unwanted pop-ups, or acting strangely, malware could be the cause. Running a scan with Malwarebytes Anti-Malware Free is one of the most reliable ways to detect and remove harmful software. The free version can identify and clean common infections such as adware, browser hijackers, trojans, and other unwanted programs.
Malwarebytes works on Windows, Mac, and Android devices. Choose your operating system below and follow the steps to scan your device and remove any malware that might be slowing it down.
Malwarebytes for WindowsMalwarebytes for MacMalwarebytes for Android
Run a Malware Scan with Malwarebytes for Windows
Malwarebytes stands out as one of the leading and widely-used anti-malware solutions for Windows, and for good reason. It effectively eradicates various types of malware that other programs often overlook, all at no cost to you. When it comes to disinfecting an infected device, Malwarebytes has consistently been a free and indispensable tool in the battle against malware. We highly recommend it for maintaining a clean and secure system.
Download Malwarebytes
Download the latest version of Malwarebytes for Windows using the official link below. Malwarebytes will scan your computer and remove adware, browser hijackers, and other malicious software for free.
(The above link will open a new page from where you can download Malwarebytes)
Install Malwarebytes
After the download is complete, locate the MBSetup file, typically found in your Downloads folder. Double-click on the MBSetup file to begin the installation of Malwarebytes on your computer. If a User Account Control pop-up appears, click “Yes” to continue the Malwarebytes installation.
Follow the On-Screen Prompts to Install Malwarebytes
When the Malwarebytes installation begins, the setup wizard will guide you through the process.
You’ll first be prompted to choose the type of computer you’re installing the program on—select either “Personal Computer” or “Work Computer” as appropriate, then click on Next.
Malwarebytes will now begin the installation process on your device.
When the Malwarebytes installation is complete, the program will automatically open to the “Welcome to Malwarebytes” screen.
On the final screen, simply click on the Open Malwarebytes option to start the program.
Enable “Rootkit scanning”.
Malwarebytes Anti-Malware will now start, and you will see the main screen as shown below. To maximize Malwarebytes’ ability to detect malware and unwanted programs, we need to enable rootkit scanning. Click on the “Settings” gear icon located on the left of the screen to access the general settings section.
In the settings menu, enable the “Scan for rootkits” option by clicking the toggle switch until it turns blue.
Now that you have enabled rootkit scanning, click on the “Dashboard” button in the left pane to get back to the main screen.
Perform a Scan with Malwarebytes.
To start a scan, click the Scan button. Malwarebytes will automatically update its antivirus database and begin scanning your computer for malicious programs.
Wait for the Malwarebytes scan to complete.
Malwarebytes will now scan your computer for browser hijackers and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check the status of the scan to see when it is finished.
Quarantine detected malware
Once the Malwarebytes scan is complete, it will display a list of detected malware, adware, and potentially unwanted programs. To effectively remove these threats, click the “Quarantine” button.
Malwarebytes will now delete all of the files and registry keys and add them to the program’s quarantine.
Restart your computer.
When removing files, Malwarebytes may require a reboot to fully eliminate some threats. If you see a message indicating that a reboot is needed, please allow it. Once your computer has restarted and you are logged back in, you can continue with the remaining steps.
Once the scan completes, remove all detected threats. Your Windows computer should now be clean and running smoothly again, free of trojans, adware, and other malware.
If your current antivirus allowed this malicious program on your computer, you may want to consider purchasing Malwarebytes Premium to protect against these types of threats in the future. If you are still having problems with your computer after completing these instructions, then please follow one of the steps:
Malwarebytes for Mac is an on-demand scanner that can destroy many types of malware that other software tends to miss without costing you absolutely anything. When it comes to cleaning up an infected device, Malwarebytes has always been free, and we recommend it as an essential tool in the fight against malware.
Download Malwarebytes for Mac.
You can download Malwarebytes for Mac by clicking the link below.
When Malwarebytes has finished downloading, double-click on the setup file to install Malwarebytes on your computer. In most cases, downloaded files are saved to the Downloads folder.
Follow the on-screen prompts to install Malwarebytes.
When the Malwarebytes installation begins, you will see the Malwarebytes for Mac Installer which will guide you through the installation process. Click “Continue“, then keep following the prompts to continue with the installation process.
When your Malwarebytes installation completes, the program opens to the Welcome to Malwarebytes screen. Click the “Get started” button.
Select “Personal Computer” or “Work Computer”.
The Malwarebytes Welcome screen will first ask you what type of computer are you installing this program, click either Personal Computer or Work Computer.
Click on “Scan”.
To scan your computer with Malwarebytes, click on the “Scan” button. Malwarebytes for Mac will automatically update the antivirus database and start scanning your computer for malware.
Wait for the Malwarebytes scan to complete.
Malwarebytes will scan your computer for adware, browser hijackers, and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
Click on “Quarantine”.
When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes has detected. To remove the malware that Malwarebytes has found, click on the “Quarantine” button.
Restart computer.
Malwarebytes will now remove all the malicious files that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your computer.
After scanning, delete any detected threats. Your Mac should now be free from adware, unwanted extensions, and other potentially harmful software.
If your current antivirus allowed a malicious program on your computer, you might want to consider purchasing the full-featured version of Malwarebytes Anti-Malware to protect against these types of threats in the future. If you are still experiencing problems while trying to remove a malicious program from your computer, please ask for help in our Mac Malware Removal Help & Support forum.
Run a Malware Scan with Malwarebytes for Android
Malwarebytes for Android automatically detects and removes dangerous threats like malware and ransomware so you don’t have to worry about your most-used device being compromised. Aggressive detection of adware and potentially unwanted programs keeps your Android phone or tablet running smooth.
Download Malwarebytes for Android.
You can download Malwarebytes for Android by clicking the link below.
In the Google Play Store, tap “Install” to install Malwarebytes for Android on your device.
When the installation process has finished, tap “Open” to begin using Malwarebytes for Android. You can also open Malwarebytes by tapping on its icon in your phone menu or home screen.
Follow the on-screen prompts to complete the setup process
When Malwarebytes will open, you will see the Malwarebytes Setup Wizard which will guide you through a series of permissions and other setup options. This is the first of two screens that explain the difference between the Premium and Free versions. Swipe this screen to continue. Tap on “Got it” to proceed to the next step. Malwarebytes for Android will now ask for a set of permissions that are required to scan your device and protect it from malware. Tap on “Give permission” to continue. Tap on “Allow” to permit Malwarebytes to access the files on your phone.
Update database and run a scan with Malwarebytes for Android
You will now be prompted to update the Malwarebytes database and run a full system scan.
Click on “Update database” to update the Malwarebytes for Android definitions to the latest version, then click on “Run full scan” to perform a system scan.
Wait for the Malwarebytes scan to complete.
Malwarebytes will now start scanning your phone for adware and other malicious apps. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
Click on “Remove Selected”.
When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes for Android has detected. To remove the malicious apps that Malwarebytes has found, tap on the “Remove Selected” button.
Restart your phone.
Malwarebytes for Android will now remove all the malicious apps that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your device.
When the scan is finished, remove all detected threats. Your Android phone should now be free of malicious apps, adware, and unwanted browser redirects.
If your current antivirus allowed a malicious app on your phone, you may want to consider purchasing the full-featured version of Malwarebytes to protect against these types of threats in the future. If you are still having problems with your phone after completing these instructions, then please follow one of the steps:
Restore your phone to factory settings by going to Settings > General management > Reset > Factory data reset.
After cleaning your device, it’s important to protect it from future infections and annoying pop-ups. We recommend installing an ad blocker such as AdGuard. AdGuard blocks malicious ads, prevents phishing attempts, and stops dangerous redirects, helping you stay safe while browsing online.
Frequently Asked Questions (FAQ)
How can I tell if a call from Chase Bank is real?
A legitimate Chase Bank representative will never pressure you into making quick decisions, ask for your full Social Security number, demand gift card payments, or request remote access to your devices. Always verify by calling the number on the back of your Chase card or visiting the official Chase website.
Why do scammers use gift cards in this fraud?
Gift cards are nearly impossible to trace and provide instant value to scammers. Once you share the code, the funds are gone, and recovering them is extremely unlikely. No bank or government agency will ever ask you to pay with gift cards.
What should I do if I gave a scammer remote access to my computer?
Disconnect your device from the internet immediately. Run a full security scan using trusted antivirus software. Change all online banking and email passwords from a secure device. If you are unsure whether your system is clean, seek help from a professional IT technician.
Does Chase Bank call customers about fraud?
Yes, Chase may contact you about suspicious activity, but they will never ask for your passwords, remote access, or payments through gift cards. If in doubt, hang up and call Chase directly at the official number on their website.
How do scammers spoof Chase’s phone number?
Scammers use a technique called caller ID spoofing, which makes their number appear as though it is coming from Chase or another trusted source. Because caller ID can be manipulated, never rely on it as proof of legitimacy.
What happens if I gave my Social Security number to a scammer?
If you shared your Social Security number, place a fraud alert on your credit file with all three credit bureaus. Monitor your credit reports for unauthorized activity. Consider a credit freeze and report potential identity theft at identitytheft.gov.
Can I get my money back if I fell for the Chase Bank fraud department scam?
Recovery depends on how the money was stolen. If scammers accessed your bank account, report it immediately to Chase, as they may be able to reverse certain transactions. Gift card payments are nearly impossible to recover. Wire transfers and cryptocurrency payments are also very difficult to trace.
Who should I report the scam to?
You should report the scam to Chase Bank, the Federal Trade Commission (FTC), the Federal Communications Commission (FCC), and the FBI’s Internet Crime Complaint Center (IC3). Filing a police report locally also provides documentation if you face identity theft later.
How can I protect myself from future scams?
Enable two-factor authentication on your accounts, use strong and unique passwords, and never share sensitive information over the phone unless you initiated the call. Stay updated on scam alerts through the FTC and your bank’s fraud prevention resources.
The Bottom Line
The Chase Bank Fraud Department scam is a dangerous and evolving threat that uses fear and urgency to trick victims. By pretending to be from Chase, scammers create false authority and manipulate people into giving away sensitive information or money. Recognizing the signs, understanding how the scam works, and taking quick action if you fall victim can save you from devastating financial losses.
The best defense is awareness. Always verify calls directly with your bank using official numbers. Never give out personal details to unsolicited callers, and never install remote access software at a stranger’s request. Staying informed and cautious can protect you and your loved ones from becoming the next target.
10 Rules to Avoid Online Scams
Here are 10 practical safety rules to help you avoid malware, online shopping scams, crypto scams, and other online fraud. Each tip includes a quick “if you already got hit” action.
Stop and verify before you click, log in, download, or pay.
Most scams win by creating urgency. Verify using a trusted method: type the website address yourself, use the official app, or call a known number (not the one in the message).
If you already clicked: close the page, do not enter passwords, and run a malware scan.
Keep your operating system, browser, and apps updated.
Updates patch security holes used by malware and malicious ads. Turn on automatic updates where possible.
If you saw a scary “update now” pop-up: close it and update only through your device settings or the official app store.
Use layered protection: antivirus plus an ad blocker.
Antivirus helps block malware. An ad blocker reduces scam redirects, phishing pages, and malvertising.
If your browser is acting weird: remove unknown extensions, reset the browser, then run a full scan.
Install apps, software, and extensions only from official sources.
Avoid cracked software, “keygens,” and random downloads. During installs, choose Custom/Advanced and decline bundled offers you do not recognize.
If you already installed something suspicious: uninstall it, restart, and scan again.
Treat links and attachments as untrusted by default.
Phishing often impersonates delivery services, banks, and popular brands. If it is unexpected, do not open attachments or log in through the message.
If you entered credentials: change the password immediately and enable 2FA.
Shop safely: research the store, then pay with protection.
Be cautious with brand-new stores, “closing sale” stories, and prices that make no sense. Prefer credit cards or PayPal for dispute options. Avoid wire transfers, gift cards, and crypto payments.
If you already paid: contact your card issuer or PayPal quickly to dispute the transaction.
Crypto rule: never pay a “fee” to withdraw or recover money.
Common patterns include fake profits, then “tax,” “gas,” or “verification” fees. Another is a “recovery agent” who demands upfront crypto.
If you already sent crypto: stop paying, save evidence (wallet addresses, TXIDs, chats), and report the scam to the platform used.
Secure your accounts with unique passwords and 2FA (start with email).
Use a password manager and unique passwords for every account. Enable 2FA using an authenticator app when possible.
If you suspect an account takeover: change passwords, sign out of all devices, and review recent logins and recovery settings.
Back up important files and keep one backup offline.
Backups protect you from ransomware and device failure. Keep at least one backup on an external drive that is not always connected.
If you suspect infection: do not connect backup drives until the system is clean.
If you think you are a victim: stop losses, document evidence, and escalate fast.
Move quickly. Speed matters for disputes, account recovery, and limiting damage.
Stop payments and contact: do not send more money or respond to the scammer.
Call your bank or card issuer: block transactions, replace the card if needed, and start a dispute or chargeback.
Secure your email first: change the email password, enable 2FA, and remove unfamiliar recovery options.
Secure other accounts: change passwords, enable 2FA, and log out of all sessions.
Scan your device: remove suspicious apps or extensions, then run a full malware scan.
Save evidence: screenshots, emails, order pages, tracking pages, wallet addresses, TXIDs, and chat logs.
Report it: to the payment provider, marketplace, social platform, exchange, or wallet service involved.
These rules are intentionally simple. Most online losses happen when decisions are rushed. Slow down, verify independently, and use payment methods and account controls that give you recourse.
2 thoughts on “Chase Bank Fraud Department Scam Calls: How to Spot and Stop Them”
A person who claims to be with Chase bank (foreign accent) called me from this number 1 877 226 0071 said fraud on account. I do not have an account with chase bank, and this person called twice same person so now I have been called twice. Please investigate I believe it’s a scam. I tried calling your Chase bank company headquarters and was stuck in voice mail loop. When a customer service person finally got on the phone I explained and this person kept asking me for my social security number which I am not giving. I am not a customer of Chase bank.
That does sound suspicious, especially since you do not even have a Chase account. I would treat it as a scam call, stop engaging with the caller, and do not give out your Social Security number or any personal information. If someone claims to be Chase, the safe move is to ignore the incoming call and use only official Chase contact channels.
Your comment should help warn others who get similar calls.
Thomas is an expert at uncovering scams and providing in-depth reporting on cyber threats and online fraud. As an editor, he is dedicated to keeping readers informed on the latest developments in cybersecurity and tech.
A person who claims to be with Chase bank (foreign accent) called me from this number 1 877 226 0071 said fraud on account. I do not have an account with chase bank, and this person called twice same person so now I have been called twice. Please investigate I believe it’s a scam. I tried calling your Chase bank company headquarters and was stuck in voice mail loop. When a customer service person finally got on the phone I explained and this person kept asking me for my social security number which I am not giving. I am not a customer of Chase bank.
Hi Maureen, thank you for reporting this.
That does sound suspicious, especially since you do not even have a Chase account. I would treat it as a scam call, stop engaging with the caller, and do not give out your Social Security number or any personal information. If someone claims to be Chase, the safe move is to ignore the incoming call and use only official Chase contact channels.
Your comment should help warn others who get similar calls.