
SCARS Institute’s Encyclopedia of Scams™ Published Continuously for 25 Years

RSN™ Guide: Online Crime Type Definitions
Online Or Cybercrimes Come In Many Different Forms
This is a short overview of each.
419/Overpayment:
“419” refers to the section in Nigerian law regarding con artistry and fraud and is associated with requests for help facilitating the transfer of money. The sender of the “419” letter or email offers the recipient a commission or share in the profits of a transfer of money, but will first request the recipient send money to pay for some of the costs associated with the transfer. The recipient may be sent a payment and instructed to keep a portion of the payment, but send the rest on to another individual or business.
Advanced Fee:
In advance fee schemes, the perpetrator informs a victim that the victim has qualified for a large financial loan or has won a large financial award, but must first pay the perpetrator taxes or fees in order to access the loan or award. The victim pays the advance fee, but never receives the promised money.
Auction:
A fraudulent transaction or exchange that occurs in the context of an online auction site.
Botnet:
A network of computers — may be one of the machines is yours — that scammers have infected with hidden software to secretly send spam.
Business Email Compromise/Email Account Compromise:
BEC is a scam targeting businesses working with foreign suppliers and/or businesses regularly performing wire transfer payments. EAC is a similar scam that targets individuals. These sophisticated scams are carried out by fraudsters compromising email accounts through social engineering or computer intrusion techniques to conduct unauthorized transfer of funds.
Charity:
Perpetrators set up false charities, usually following natural disasters, and profit from individuals who believe they are making donations to legitimate charitable organizations.
Civil Matter:
Civil lawsuits are any disputes formally submitted to a court that is not criminal.
Confidence/Romance Fraud:
A perpetrator deceives a victim into believing the perpetrator and the victim have a trust relationship, whether family, friendly or romantic. As a result of that belief, the victim is persuaded to send money, personal and financial information, or items of value to the perpetrator or to launder money on behalf of the perpetrator. Some variations of this scheme are romance/dating scams or the grandparent’s scam.
Corporate Data Breach:
A leak or spill of business data that is released from a secure location to an untrusted environment. It may also refer to a data breach within a corporation or business where sensitive, protected, or confidential data is copied, transmitted, viewed, stolen or used by an individual unauthorized to do so.
Cramming:
The illegal placement of unauthorized charges on your telephone bill for unrequested services or calls not made.
Credit Card:
Credit card fraud is a wide-ranging term for fraud committed using a credit card or any similar payment mechanism as a fraudulent source of funds in a transaction.
Crimes Against Children:
Anything related to the exploitation of children, including child abuse.
Criminal Forums:
A medium where criminals exchange ideas and protocols relating to intrusion.
Denial of Service:
An interruption of an authorized user’s access to any system or network, typically caused with malicious intent.
Employment Fraud:
An individual believes they are legitimately empoyed, and loses money or launders money/items during the course of their employment.
Extortion:
Unlawful extraction of money or property through intimidation or undue exercise of authority. It may include threats of physical harm, criminal prosecution, or public exposure.
Gambling:
Online gambling, also known as Internet gambling and iGambling, is a general term for gambling using the Internet.
Gaslighting:
A Form Of Psychological Manipulation To Destroy Your Sense Of Reality. Gaslighting manipulate (someone) by psychological means into questioning their own sanity or reality. Gaslighting is the systematic process of attempting to erode another person’s reality by consistently telling them that what they are experiencing is not true! And the gradual giving up on their reality; or by the suspension of disbelief by that person!
Government Impersonation:
A government official is impersonated in an attempt to collect money.
Hacker:
Someone who uses the Internet to illegally break into computers. They use numerous software tools to gain access to a computer or a protected account on a computer network.
Hacktivist:
A computer hacker whose activity is aimed at promoting a social or political cause.
Harassment/Threats of Violence:
Harassment occurs when a perpetrator uses false accusations or statements of fact to intimidate a victim. Threats of Violence refers to an expression of an intention to inflict pain, injury, or punishment, which does not refer to the requirement of payment.
Health Care Related:
A scheme attempting to defraud private or government health care programs, usually involving health care providers, companies, or individuals. Schemes may include offers for fake insurance cards, health insurance marketplace assistance, stolen health information, or may involve medications, supplements, weight loss products, or diversion/pill mill practices. These scams are often initiated through spam email, Internet advertisements, links in forums or social media, and fraudulent websites.
IPR/Copyright and Counterfeit:
The theft and illegal use of others’ ideas, inventions, and creative expressions, to include everything from trade secrets and proprietary products to parts to movies, music, and software.
Identity Theft/Account Takeover:
Identify theft involves a perpetrator stealing another person’s personal identifying information, such as name or Social Security number, without permission to commit fraud. Account Takeover is when a perpetrator obtains account information to perpetrate a fraud on existing accounts.
Investment:
Deceptive practice that induces investors to make purchases on the basis of false information. These scams usually offer the victims large returns with minimal risk. Variations of this scam include retirement schemes, Ponzi schemes and pyramid schemes.
Keystroke Logger:
A usually covert program that tracks (or logs) sequential strokes on your keyboard to allow remote hackers to capture your passwords and online banking and credit card information.
Lottery/Sweepstakes:
An individual is contacted about winning a lottery or sweepstakes they never entered and are asked to pay a tax or fee in order to receive their winnings.
Malware
Software intended to damage or disable computers and computer systems. Sometimes scare tactics are used by the perpetrators to solicit funds. Short for “malicious software,” this term means computer viruses and other types of programs that cybercriminals use to disrupt or access your computer, typically with the aim of gathering sensitive files and accounts.
Misrepresentation:
Merchandise or services were purchased or contracted by individuals online for which the purchasers provided payment. The goods or services received were of a measurably lesser quality or quantity than was described by the seller.
No Lead Value:
Incomplete complaints which do not allow a crime type to be determined. About 50% of all online scam reports fall into this type because of poor reporting by victims.
Non-Payment/Non-Delivery:
In non-payment situations, goods and services are shipped, but payment is never rendered. In non-delivery situations, payment is sent, but goods and services are never received.
Other:
Other types of fraud not listed.
Personal Data Breach:
A leak or spill of personal data that is released from a secure location to an untrusted environment. It may also refer to a security incident in which an individual’s sensitive, protected, or confidential data is copied, transmitted, viewed, stolen or used by an unauthorized individual.
Pharming:
When hackers use malicious programs to route you to their own sites — even though you’ve correctly typed in the address of a site you want to visit. The software stealthily diverts you to a look-alike destination, typically with the goal of gathering personal information for identity theft.
Phishing/Vishing/Smishing/Pharming:
Unsolicited email, text messages, and telephone calls purportedly from a legitimate company requesting personal, financial, and/or login credentials.
Ransomware:
A type of malicious software designed to block access to a computer system until money is paid.
Re-shipping:
Individuals (usually MULES) receive packages purchased through fraudulent means and subsequently repackage the merchandise for shipment, usually abroad.
Real Estate/Rental:
Fraud involving real estate, rental or timeshare property.
Scareware:
A type of malware that displays on-screen warnings of nonexistent computer infections or generates constant pop-ups intended to trick you into buying useless or potentially dangerous “protection” software.
Skimming:
The capturing of information from the magnetic stripe on your ATM and credit card by use of portable “skimmer” devices that are secretly installed on card-reading machines.
Smishing:
Named for the SMS (short message service) technology used to send text messages, it means phishing attempts made on cellphones.
Social Media:
A complaint alleging the use of social networking or social media (Facebook, Twitter, Instagram, chat rooms, etc.) as a vector for fraud. Social Media does not include dating sites.
Spoofing:
Any situation in which scammers masquerade as a specific person, business or agency. The term is typically used to describe the manipulation of telephone Caller ID to display a false name or number for the caller.
Spyware:
A type of malware installed on computers or cellphones to track your actions and/or collect information without your knowledge. Some spyware can change computer settings for pharming redirection.
Tech Support:
Attempts to gain access to a victim’s electronic device by falsely claiming to offer tech support, usually for a well-known company. Scammer asks for remote access to the victim’s device to clean-up viruses or malware or to facilitate a refund for prior support services.
Terrorism:
Violent acts intended to create fear that is perpetrated for a religious, political, or ideological goal and deliberately target or disregard the safety of non-combatants.
Trojan Horse:
Software that’s hidden within apparently harmless data — or masquerades as a regular program — and when activated, can deliver such blows as corrupting data on your hard drive or sending files and account information to hackers. Unlike viruses and worms, Trojans do not self-replicate and spread to other computers.
Vishing:
Short for “voice phishing,” it’s the use of recorded messages to telephones — usually claiming to be from a bank — with the goal of tricking you into revealing personal or account information for identity theft.
Virus:
Code capable of copying itself and having a detrimental effect, such as corrupting the system or destroying data.
Virtual Currency:
A complaint mentioning a form of virtual cryptocurrency, such as Bitcoin, Litecoin, or Potcoin.
Worm:
Like a virus, it can replicate itself and spread — but without any action by you.
-/ 30 /-
What do you think about this?
Please share your thoughts in a comment below!
Article Rating
Table of Contents
POPULAR ARTICLES
ARTICLE META
RATE THIS ARTICLE?
LEAVE A COMMENT?
Recent Comments
On Other Articles
on Nigeria – [EFCC] Economic & Financial Crimes Commission: “Thank you for your comment, but this is patently false. China is the source for the most scammers. Brazil has…” Jul 9, 06:20
on Nigeria – [EFCC] Economic & Financial Crimes Commission: “NIgeria has produced more scammers than the whole world produced. Seems like their law enforcement is pretty incompetent.” Jul 8, 02:51
on Self-Pity & Scam Victim Recovery: “I like how this article incorporates gratitude as an antidote to self-pity. I also like how the writer corelates that…” Jul 7, 19:48
on Victim Psychology – Managing Your Emotional 5 Saboteurs: “It is so possible to stand in our own way during our recovery. That self-doubt about what happened, even feeling…” Jul 5, 12:51
on Romance Scams – Crime Typology Overview / Victim Impact Analysis – 2025: “Excellent compendium of knowledge on romance scams . Thank you Dr. Tim” Jul 5, 07:43
on Romance Scams – Crime Typology Overview / Victim Impact Analysis – 2025: “Dr. Tim, in the couple of hours you took to pull this information together into a victim impact analysis, is…” Jul 4, 18:56
on The Normalcy Bias: Understanding the Cognitive Bias that Can Put You in Danger – 2022 [UPDATED 2025]: “The article has been reviewed and updated. Thank you.” Jul 2, 07:31
on Victims As Activists & Why Many Scam Victims Should Delay Or Not Become One: “This article is clear in the ways that survivors can put themselves off track trying to help before they are…” Jul 1, 20:05
on Victim Vulnerability After The Scam – Physical Risks: “Thank you for this article. I had no idea that after a crime we walk differently, or use smaller gestures.…” Jul 1, 19:41
on Stolen Face / Stolen Identity – Stephen Murphy: Do You Know Him?: “He contacted me on Facebook as General Henry Martinez from Dallas Texas but currently stationed in Syria. He was a…” Jul 1, 17:40
Important Information for New Scam Victims
- Please visit www.ScamVictimsSupport.org – a SCARS Website for New Scam Victims & Sextortion Victims
- Enroll in FREE SCARS Scam Survivor’s School now at www.SCARSeducation.org
- Please visit www.ScamPsychology.org – to more fully understand the psychological concepts involved in scams and scam victim recovery
If you are looking for local trauma counselors please visit counseling.AgainstScams.org or join SCARS for our counseling/therapy benefit: membership.AgainstScams.org
If you need to speak with someone now, you can dial 988 or find phone numbers for crisis hotlines all around the world here: www.opencounseling.com/suicide-hotlines
A Note About Labeling!
We often use the term ‘scam victim’ in our articles, but this is a convenience to help those searching for information in search engines like Google. It is just a convenience and has no deeper meaning. If you have come through such an experience, YOU are a Survivor! It was not your fault. You are not alone! Axios!
A Question of Trust
At the SCARS Institute, we invite you to do your own research on the topics we speak about and publish, Our team investigates the subject being discussed, especially when it comes to understanding the scam victims-survivors experience. You can do Google searches but in many cases, you will have to wade through scientific papers and studies. However, remember that biases and perspectives matter and influence the outcome. Regardless, we encourage you to explore these topics as thoroughly as you can for your own awareness.
Statement About Victim Blaming
Some of our articles discuss various aspects of victims. This is both about better understanding victims (the science of victimology) and their behaviors and psychology. This helps us to educate victims/survivors about why these crimes happened and to not blame themselves, better develop recovery programs, and to help victims avoid scams in the future. At times this may sound like blaming the victim, but it does not blame scam victims, we are simply explaining the hows and whys of the experience victims have.
These articles, about the Psychology of Scams or Victim Psychology – meaning that all humans have psychological or cognitive characteristics in common that can either be exploited or work against us – help us all to understand the unique challenges victims face before, during, and after scams, fraud, or cybercrimes. These sometimes talk about some of the vulnerabilities the scammers exploit. Victims rarely have control of them or are even aware of them, until something like a scam happens and then they can learn how their mind works and how to overcome these mechanisms.
Articles like these help victims and others understand these processes and how to help prevent them from being exploited again or to help them recover more easily by understanding their post-scam behaviors. Learn more about the Psychology of Scams at www.ScamPsychology.org
Psychology Disclaimer:
All articles about psychology and the human brain on this website are for information & education only
The information provided in this article is intended for educational and self-help purposes only and should not be construed as a substitute for professional therapy or counseling.
While any self-help techniques outlined herein may be beneficial for scam victims seeking to recover from their experience and move towards recovery, it is important to consult with a qualified mental health professional before initiating any course of action. Each individual’s experience and needs are unique, and what works for one person may not be suitable for another.
Additionally, any approach may not be appropriate for individuals with certain pre-existing mental health conditions or trauma histories. It is advisable to seek guidance from a licensed therapist or counselor who can provide personalized support, guidance, and treatment tailored to your specific needs.
If you are experiencing significant distress or emotional difficulties related to a scam or other traumatic event, please consult your doctor or mental health provider for appropriate care and support.
Also read our SCARS Institute Statement about Professional Care for Scam Victims – click here to go to our ScamsNOW.com website.
Thank you for your comment. You may receive an email to follow up. We never share your data with marketers.