Fake Bank of America Robocalls: How the Scam Really Works

Fake Bank of America robocalls are being used to push people into calling scam phone numbers. Once victims call back, they are not connected to Bank of America. They are routed to fake support agents who claim there is fraud, a device infection, a hacked account, or a refund issue that needs urgent attention.

The real goal is simple: get the victim scared, gain remote access to their phone or computer, extract personal and banking information, and steal money.

scam 4 3

Scam Overview

Fake Bank of America robocalls are a type of impersonation scam. The call may claim that your Bank of America account has suspicious activity, that a transaction was blocked, that your debit card was used somewhere unusual, or that your online banking access has been compromised.

The message usually tells you to press a number or call back immediately. The caller ID may even appear to show “Bank of America” or a local number, but caller ID can be spoofed. Scammers often make fake calls look like they are coming from a trusted company, bank, or support department.

Once you call the number, the scam changes from a bank alert into a fake tech support scam. The person on the phone may say your device is infected, your online banking session has been hacked, or your account is being controlled by criminals. They may claim they need to “secure” your device before they can help with the bank problem.

This is where the scam becomes dangerous.

The scammer may ask you to download AnyDesk, TeamViewer, UltraViewer, Zoho Assist, or another remote access app. Remote access tools are legitimate when used by trusted IT professionals, but scammers misuse them to take control of victims’ devices, view sensitive information, and manipulate online banking sessions. AnyDesk itself warns that scammers can misuse remote access software to steal data, access codes, and money, and advises users not to give device access to people they do not know.

Bank of America and Merrill also warn consumers not to download software or give remote access to someone they do not know, and state that Bank of America will not call and tell customers to move money to protect themselves from fraud.

The FTC describes the same pattern in tech support scams: scammers persuade victims to call a number, then ask for remote access, pretend to find viruses or security problems, and charge money for fake repairs.

In these fake Bank of America robocalls, the “bank” story is only the bait. The real operation is designed to gain control, create panic, and push the victim into sending money.

How the Fake Bank of America Robocall Scam Works

1. The victim receives an alarming robocall

The scam usually starts with an automated phone call. The message may sound official and urgent.

It may say things like:

“Your Bank of America account has been temporarily locked.”

“We detected suspicious activity on your debit card.”

“A transaction has been attempted from your account.”

“Your online banking access may be compromised.”

“To speak with the security department, press 1.”

The message is designed to make you act before thinking. Scammers know that people react quickly when they believe their money is at risk.

2. The robocall gives a fake callback number

Some robocalls ask you to press a number. Others tell you to call a phone number shown in the message or displayed on caller ID.

That number does not connect you to Bank of America. It connects you to a scam call center pretending to be Bank of America fraud support, security support, customer service, or technical support.

The scammers may answer professionally. They may use fake employee names, fake case numbers, fake department names, and scripted language to sound legitimate.

3. The scammer claims your device is infected or hacked

After asking a few basic questions, the scammer may shift the conversation away from the bank account and toward your phone or computer.

They may say:

“Your device has been infected.”

“Someone has remote access to your phone.”

“Your IP address is compromised.”

“We see hackers connected to your online banking.”

“Your account is not safe until we clean the device.”

This is a common manipulation tactic. The scammer wants you to believe that your phone or computer is the problem, because that gives them an excuse to ask for remote access.

4. The victim is told to install AnyDesk or another remote access app

The scammer may tell you to install AnyDesk, TeamViewer, UltraViewer, Zoho Assist, ScreenConnect, or a similar remote access tool.

They may describe it as:

A “secure banking tool”

A “refund verification app”

A “security connection”

A “device cleaning tool”

A “Bank of America support portal”

That is not true. These are remote access tools. Once installed and connected, the scammer may be able to view your screen, control your mouse, open apps, access browser tabs, guide you into your bank account, or trick you into revealing codes.

Legitimate bank support does not need remote control of your personal device to verify fraud.

5. The scammer pretends to scan or secure the device

Once connected, the scammer may open harmless system tools and claim they prove your device is infected. They may show error logs, network windows, command prompts, or normal system warnings and falsely describe them as evidence of hacking.

This is meant to make the victim feel helpless.

The FTC warns that tech support scammers commonly pretend to scan devices, claim they found malicious software, and offer to remove it for a fee.

6. The scammer tries to access bank accounts and personal data

After gaining trust, the scammer may ask the victim to log in to online banking, email, PayPal, Cash App, Zelle, crypto wallets, or other financial accounts.

They may say they need to:

Verify a refund

Reverse a fraudulent charge

Secure the account

Check for unauthorized transfers

Confirm the balance

Move money to a “safe” account

This is where victims can lose large amounts of money. The scammer may watch login details, capture one-time passcodes, change settings, initiate transfers, or pressure the victim into moving money themselves.

7. The scammer may demand gift cards

In many cases, the fake support agent eventually asks the victim to buy gift cards.

They may claim the cards are needed to:

Reverse a fraudulent charge

Complete a refund

Verify the account

Pay a security fee

Stop hackers from stealing money

Remove malware

This is always a major red flag. Real banks do not ask customers to pay with Apple, Google Play, Target, Walmart, Steam, or Visa gift cards.

Bank of America’s scam-prevention guidance identifies unusual payment methods, including gift cards, cryptocurrency, prepaid cards, and similar options, as common scam warning signs. (Bank of America)

The FTC also warns that scammers often request gift cards because they are fast, hard to reverse, and difficult to trace once the codes are shared. (Consumer Advice)

8. The victim is told not to contact the bank

Scammers often tell victims not to call the real Bank of America, not to visit a branch, and not to speak with family members.

They may say:

“Do not tell anyone or the investigation will fail.”

“The bank branch is compromised.”

“This is a confidential fraud case.”

“If you disconnect, your account will be locked.”

These instructions are designed to isolate the victim. A real bank will not require secrecy to help you secure your account.

Red Flags of a Fake Bank of America Robocall

A call is suspicious if it includes any of these signs:

The message creates panic about fraud, hacking, or account suspension.

You are told to press a number or call back immediately.

The agent asks you to install AnyDesk, TeamViewer, UltraViewer, or another remote access app.

You are told your phone or computer is infected.

The caller asks you to log in to online banking while they watch.

You are asked for one-time passcodes, passwords, PINs, or full card details.

You are told to buy gift cards.

You are told to move money to a “safe” account.

You are warned not to contact Bank of America directly.

The caller becomes aggressive, impatient, or threatening when you hesitate.

Any one of these is enough to stop the call.

What To Do If You Receive One of These Calls

Hang up immediately. Do not press buttons, do not call the number provided in the message, and do not follow instructions from the robocall.

Contact Bank of America only through a trusted channel. Use the phone number on the back of your debit or credit card, the official Bank of America mobile app, or the official website typed manually into your browser.

Do not rely on caller ID. A scam call can appear to come from a real company, a local number, or even a number that looks familiar.

Do not install remote access software for someone who called you unexpectedly or for someone you reached through a suspicious phone number.

Do not share gift card codes, banking codes, verification texts, passwords, or PINs.

What To Do If You Already Called the Number

If you called a fake Bank of America number but did not share information or install anything, hang up and block the number. Then contact Bank of America directly to verify your account status.

If you installed remote access software, disconnect from the internet immediately. Uninstall the remote access app. Then run a security scan using trusted antivirus software.

If the scammer accessed your bank account, contact Bank of America immediately using the official number on your card. Tell them you may have been targeted by a remote access scam.

If you shared passwords, change them from a clean device. Start with your bank, email, phone account, Apple ID, Google account, PayPal, and any other financial accounts.

If you gave one-time passcodes, tell the bank. Scammers can use verification codes to approve transfers, reset access, or link accounts.

If you bought gift cards and shared the codes, contact the gift card company right away. Ask if the funds can be frozen. Recovery is not guaranteed, but speed matters.

Report the scam to the FTC at ReportFraud.ftc.gov and to the FBI’s Internet Crime Complaint Center at IC3.gov if money was stolen.

Why This Scam Works

This scam works because it combines several powerful pressure tactics.

First, it uses a trusted brand. Bank of America is a major financial institution, so many people take the call seriously.

Second, it uses fear. The victim is told their money, identity, or device is at risk.

Third, it uses urgency. The scammer pushes the victim to act immediately.

Fourth, it uses confusion. The scammer mixes banking language with fake technical explanations, making the victim feel dependent on the “support agent.”

Finally, it uses remote access. Once the scammer can see or control the device, the victim is at a major disadvantage.

The scam is not just a phone prank. It is a coordinated fraud method that can lead to bank theft, identity theft, unauthorized transfers, gift card losses, and long-term account compromise.

Is Your Device Infected? Scan for Malware

If your computer or phone is slow, showing unwanted pop-ups, or acting strangely, malware could be the cause. Running a scan with Malwarebytes Anti-Malware Free is one of the most reliable ways to detect and remove harmful software. The free version can identify and clean common infections such as adware, browser hijackers, trojans, and other unwanted programs.

Malwarebytes works on Windows, Mac, and Android devices. Choose your operating system below and follow the steps to scan your device and remove any malware that might be slowing it down.

Malwarebytes for WindowsMalwarebytes for MacMalwarebytes for Android

Run a Malware Scan with Malwarebytes for Windows

Malwarebytes stands out as one of the leading and widely-used anti-malware solutions for Windows, and for good reason. It effectively eradicates various types of malware that other programs often overlook, all at no cost to you. When it comes to disinfecting an infected device, Malwarebytes has consistently been a free and indispensable tool in the battle against malware. We highly recommend it for maintaining a clean and secure system.

  1. Download Malwarebytes

    Download the latest version of Malwarebytes for Windows using the official link below. Malwarebytes will scan your computer and remove adware, browser hijackers, and other malicious software for free.

    MALWAREBYTES FOR WINDOWS DOWNLOAD LINK

    (The above link will open a new page from where you can download Malwarebytes)
  2.  

    Install Malwarebytes

    After the download is complete, locate the MBSetup file, typically found in your Downloads folder. Double-click on the MBSetup file to begin the installation of Malwarebytes on your computer. If a User Account Control pop-up appears, click “Yes” to continue the Malwarebytes installation.

    MBAM1
  3. Follow the On-Screen Prompts to Install Malwarebytes

    When the Malwarebytes installation begins, the setup wizard will guide you through the process.

    • You’ll first be prompted to choose the type of computer you’re installing the program on—select either “Personal Computer” or “Work Computer” as appropriate, then click on Next.

      MBAM3 1
    • Malwarebytes will now begin the installation process on your device.

      MBAM4
    • When the Malwarebytes installation is complete, the program will automatically open to the “Welcome to Malwarebytes” screen.

      MBAM6 1
    • On the final screen, simply click on the Open Malwarebytes option to start the program.

      MBAM5 1
  4. Enable “Rootkit scanning”.

    Malwarebytes Anti-Malware will now start, and you will see the main screen as shown below. To maximize Malwarebytes’ ability to detect malware and unwanted programs, we need to enable rootkit scanning. Click on the “Settings” gear icon located on the left of the screen to access the general settings section.

    MBAM8

    In the settings menu, enable the “Scan for rootkits” option by clicking the toggle switch until it turns blue.

    MBAM9

    Now that you have enabled rootkit scanning, click on the “Dashboard” button in the left pane to get back to the main screen.

  5. Perform a Scan with Malwarebytes.

    To start a scan, click the Scan button. Malwarebytes will automatically update its antivirus database and begin scanning your computer for malicious programs.

    MBAM10
  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now scan your computer for browser hijackers and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check the status of the scan to see when it is finished.

    MBAM11
  7. Quarantine detected malware

    Once the Malwarebytes scan is complete, it will display a list of detected malware, adware, and potentially unwanted programs. To effectively remove these threats, click the “Quarantine” button.

    MBAM12

    Malwarebytes will now delete all of the files and registry keys and add them to the program’s quarantine.

    MBAM13

  8. Restart your computer.

    When removing files, Malwarebytes may require a reboot to fully eliminate some threats. If you see a message indicating that a reboot is needed, please allow it. Once your computer has restarted and you are logged back in, you can continue with the remaining steps.

    MBAM14

Once the scan completes, remove all detected threats. Your Windows computer should now be clean and running smoothly again, free of trojans, adware, and other malware.

If your current antivirus allowed this malicious program on your computer, you may want to consider purchasing Malwarebytes Premium to protect against these types of threats in the future.
If you are still having problems with your computer after completing these instructions, then please follow one of the steps:

Run a Malware Scan with Malwarebytes for Mac

Malwarebytes for Mac is an on-demand scanner that can destroy many types of malware that other software tends to miss without costing you absolutely anything. When it comes to cleaning up an infected device, Malwarebytes has always been free, and we recommend it as an essential tool in the fight against malware.

  1. Download Malwarebytes for Mac.

    You can download Malwarebytes for Mac by clicking the link below.

    MALWAREBYTES FOR MAC DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Mac)
  2. Double-click on the Malwarebytes setup file.

    When Malwarebytes has finished downloading, double-click on the setup file to install Malwarebytes on your computer. In most cases, downloaded files are saved to the Downloads folder.

    Double-click on setup file to install Malwarebytes

  3. Follow the on-screen prompts to install Malwarebytes.

    When the Malwarebytes installation begins, you will see the Malwarebytes for Mac Installer which will guide you through the installation process. Click “Continue“, then keep following the prompts to continue with the installation process.

    Click Continue to install Malwarebytes for Mac

    Click again on Continue to install Malwarebytes for Mac for Mac

    Click Install to install Malwarebytes on Mac

    When your Malwarebytes installation completes, the program opens to the Welcome to Malwarebytes screen. Click the “Get started” button.

  4. Select “Personal Computer” or “Work Computer”.

    The Malwarebytes Welcome screen will first ask you what type of computer are you installing this program, click either Personal Computer or Work Computer.
    Select Personal Computer or Work Computer mac

  5. Click on “Scan”.

    To scan your computer with Malwarebytes, click on the “Scan” button. Malwarebytes for Mac will automatically update the antivirus database and start scanning your computer for malware.
    Click on Scan button to start a system scan Mac

  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will scan your computer for adware, browser hijackers, and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Wait for Malwarebytes for Mac to scan for malware

  7. Click on “Quarantine”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes has detected. To remove the malware that Malwarebytes has found, click on the “Quarantine” button.
    Review the malicious programs and click on Quarantine to remove malware

  8. Restart computer.

    Malwarebytes will now remove all the malicious files that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your computer.
    Malwarebytes For Mac requesting to restart computer

After scanning, delete any detected threats. Your Mac should now be free from adware, unwanted extensions, and other potentially harmful software.

If your current antivirus allowed a malicious program on your computer, you might want to consider purchasing the full-featured version of Malwarebytes Anti-Malware to protect against these types of threats in the future.
If you are still experiencing problems while trying to remove a malicious program from your computer, please ask for help in our Mac Malware Removal Help & Support forum.

Run a Malware Scan with Malwarebytes for Android

Malwarebytes for Android automatically detects and removes dangerous threats like malware and ransomware so you don’t have to worry about your most-used device being compromised. Aggressive detection of adware and potentially unwanted programs keeps your Android phone or tablet running smooth.

  1. Download Malwarebytes for Android.

    You can download Malwarebytes for Android by clicking the link below.

    MALWAREBYTES FOR ANDROID DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Android)
  2. Install Malwarebytes for Android on your phone.

    In the Google Play Store, tap “Install” to install Malwarebytes for Android on your device.

    Tap Install to install Malwarebytes for Android

    When the installation process has finished, tap “Open” to begin using Malwarebytes for Android. You can also open Malwarebytes by tapping on its icon in your phone menu or home screen.
    Malwarebytes for Android - Open App

  3. Follow the on-screen prompts to complete the setup process

    When Malwarebytes will open, you will see the Malwarebytes Setup Wizard which will guide you through a series of permissions and other setup options.
    This is the first of two screens that explain the difference between the Premium and Free versions. Swipe this screen to continue.
    Malwarebytes Setup Screen 1
    Tap on “Got it” to proceed to the next step.
    Malwarebytes Setup Screen 2
    Malwarebytes for Android will now ask for a set of permissions that are required to scan your device and protect it from malware. Tap on “Give permission” to continue.
    Malwarebytes Setup Screen 3
    Tap on “Allow” to permit Malwarebytes to access the files on your phone.
    Malwarebytes Setup Screen 4

  4. Update database and run a scan with Malwarebytes for Android

    You will now be prompted to update the Malwarebytes database and run a full system scan.

    Malwarebytes fix issue

    Click on “Update database” to update the Malwarebytes for Android definitions to the latest version, then click on “Run full scan” to perform a system scan.

    Update database and run Malwarebytes scan on phone

  5. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now start scanning your phone for adware and other malicious apps. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Malwarebytes scanning Android for Vmalware

  6. Click on “Remove Selected”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes for Android has detected. To remove the malicious apps that Malwarebytes has found, tap on the “Remove Selected” button.
    Remove malware from your phone

  7. Restart your phone.

    Malwarebytes for Android will now remove all the malicious apps that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your device.


When the scan is finished, remove all detected threats. Your Android phone should now be free of malicious apps, adware, and unwanted browser redirects.

If your current antivirus allowed a malicious app on your phone, you may want to consider purchasing the full-featured version of Malwarebytes to protect against these types of threats in the future.
If you are still having problems with your phone after completing these instructions, then please follow one of the steps:

After cleaning your device, it’s important to protect it from future infections and annoying pop-ups. We recommend installing an ad blocker such as AdGuard. AdGuard blocks malicious ads, prevents phishing attempts, and stops dangerous redirects, helping you stay safe while browsing online.

The Bottom Line

Fake Bank of America robocalls are not just fake bank alerts. They are often gateways into fake tech support scams.

The scam starts with a frightening robocall, moves to a fake support center, then escalates into remote access, fake infection claims, bank account manipulation, and gift card payments.

Bank of America will not ask you to give remote access to your device, buy gift cards, or move money to “protect” yourself. If a call tells you to do any of those things, hang up.

Use only official Bank of America contact methods, verify everything independently, and never let an unknown caller control your phone or computer.

FAQ About Fake Bank of America Robocalls

Are these calls really from Bank of America?

No. These are impersonation calls. Scammers may spoof caller ID or use official-sounding scripts, but the calls are not from Bank of America.

Why do they ask me to install AnyDesk or TeamViewer?

They want remote access to your device. Once connected, they can view your screen, manipulate your computer, guide you into banking apps, and try to steal money or information.

Can a bank support agent ask for remote access?

You should treat any request for remote access as highly suspicious. Bank of America warns customers not to download software or give remote access to someone they do not know.

Why do scammers ask for gift cards?

Gift cards are difficult to reverse once the code is shared. Scammers ask victims to buy cards, scratch off the codes, and read the numbers over the phone.

What should I do if I gave them remote access?

Disconnect from the internet, uninstall the remote access app, scan your device, change passwords from a clean device, and contact your bank immediately.

What should I do if I gave them my Bank of America login?

Contact Bank of America immediately through the official number on your card or through the official app. Change your password, enable stronger security settings, and review all recent transactions.

What if I only answered the call but did not give information?

You are probably fine, but do not engage further. Block the number and ignore future calls. If you are worried, contact Bank of America directly.

Can I get my money back if I bought gift cards?

It depends. Contact the gift card issuer immediately and ask if the funds can be frozen. Also report the scam to the FTC and local law enforcement.

Where should I report this scam?

Report it to the FTC at ReportFraud.ftc.gov. If money was stolen or your accounts were accessed, also report it to the FBI’s Internet Crime Complaint Center at IC3.gov

10 Rules to Avoid Online Scams

Here are 10 practical safety rules to help you avoid malware, online shopping scams, crypto scams, and other online fraud. Each tip includes a quick “if you already got hit” action.

  1. Stop and verify before you click, log in, download, or pay.

    warning sign

    Most scams win by creating urgency. Verify using a trusted method: type the website address yourself, use the official app, or call a known number (not the one in the message).

    If you already clicked: close the page, do not enter passwords, and run a malware scan.

  2. Keep your operating system, browser, and apps updated.

    updates guide

    Updates patch security holes used by malware and malicious ads. Turn on automatic updates where possible.

    If you saw a scary “update now” pop-up: close it and update only through your device settings or the official app store.

  3. Use layered protection: antivirus plus an ad blocker.

    shield guide

    Antivirus helps block malware. An ad blocker reduces scam redirects, phishing pages, and malvertising.

    If your browser is acting weird: remove unknown extensions, reset the browser, then run a full scan.

  4. Install apps, software, and extensions only from official sources.

    install guide

    Avoid cracked software, “keygens,” and random downloads. During installs, choose Custom/Advanced and decline bundled offers you do not recognize.

    If you already installed something suspicious: uninstall it, restart, and scan again.

  5. Treat links and attachments as untrusted by default.

    cursor sign

    Phishing often impersonates delivery services, banks, and popular brands. If it is unexpected, do not open attachments or log in through the message.

    If you entered credentials: change the password immediately and enable 2FA.

  6. Shop safely: research the store, then pay with protection.

    trojan horse

    Be cautious with brand-new stores, “closing sale” stories, and prices that make no sense. Prefer credit cards or PayPal for dispute options. Avoid wire transfers, gift cards, and crypto payments.

    If you already paid: contact your card issuer or PayPal quickly to dispute the transaction.

  7. Crypto rule: never pay a “fee” to withdraw or recover money.

    lock sign

    Common patterns include fake profits, then “tax,” “gas,” or “verification” fees. Another is a “recovery agent” who demands upfront crypto.

    If you already sent crypto: stop paying, save evidence (wallet addresses, TXIDs, chats), and report the scam to the platform used.

  8. Secure your accounts with unique passwords and 2FA (start with email).

    lock sign

    Use a password manager and unique passwords for every account. Enable 2FA using an authenticator app when possible.

    If you suspect an account takeover: change passwords, sign out of all devices, and review recent logins and recovery settings.

  9. Back up important files and keep one backup offline.

    backup sign

    Backups protect you from ransomware and device failure. Keep at least one backup on an external drive that is not always connected.

    If you suspect infection: do not connect backup drives until the system is clean.

  10. If you think you are a victim: stop losses, document evidence, and escalate fast.

    warning sign

    Move quickly. Speed matters for disputes, account recovery, and limiting damage.

    • Stop payments and contact: do not send more money or respond to the scammer.
    • Call your bank or card issuer: block transactions, replace the card if needed, and start a dispute or chargeback.
    • Secure your email first: change the email password, enable 2FA, and remove unfamiliar recovery options.
    • Secure other accounts: change passwords, enable 2FA, and log out of all sessions.
    • Scan your device: remove suspicious apps or extensions, then run a full malware scan.
    • Save evidence: screenshots, emails, order pages, tracking pages, wallet addresses, TXIDs, and chat logs.
    • Report it: to the payment provider, marketplace, social platform, exchange, or wallet service involved.

These rules are intentionally simple. Most online losses happen when decisions are rushed. Slow down, verify independently, and use payment methods and account controls that give you recourse.

Comment on this post

Previous

(350) 205-9101 EXPOSED – Scam or Legit? Full Investigation

Next

Broadview Capital Group Loan Scam EXPOSED: Fake Pre-Approval Calls