The SCARS Official Definition Of The Terms & Types Of Scams
SCARS, as the leading provider of scam victim support and victim assistance services worldwide, has polled victims around the globe to develop a better taxonomy of the types of scams.
Part of the intent behind this new taxonomy is to use less abusive terms for the types of scams now being used that continue to traumatize, insult, and blame victims. SCARS will begin utilizing this new taxonomy of terms beginning in 2023.
However, please note that in our articles and publications, we will have to continue to use older terms, such as catfishing and pig butchering – even though they are triggering – because these are the terms that many (most?) victims use when looking for this type of information. We apologize for any emotional distress this may cause fraud victims.
The Three Types Of Scams
In SCARS view there are three types of cyber-enabled scams or crimes:
- Relationship Scams
- Targeted Scams
- Cyber Attack Scams
Note this excludes pure cybercrimes – where one system attacks another.
A. Types Of Scams: The Relationship Scams
Relationship Scams involve a TRUST relationship between the victim and the criminals. This type of scam can take minutes to months to develop a trust relationship.
These include:
-
- Romance Relationship Scams (Romance/Love/Dating Scams) – Romance scams are a type of online fraud where scammers create fake profiles on dating sites or social media platforms to form relationships with unsuspecting victims. They gain their trust and affection, and then ask for money or personal information under false pretenses. Victims can suffer financial and emotional harm.
- Investment Relationship Scams (Pig Butchering) – Investment scams, formerly known as pig butchering scams, are fraudulent schemes that promise high returns on investments but instead swindle victims out of their money. Scammers often use high-pressure tactics, fake credentials, and false information to gain the trust of their victims. Investors can lose significant amounts of money or their entire life savings.
- Extortion Relationship Scams (Sextortion. Grandparent, Emergency, Blackmail, Threat-based scams) – Extortion scams, such as sextortion, are a type of cybercrime where criminals threaten to expose embarrassing or sensitive information about the victim unless a ransom is paid. Scammers may use tactics such as blackmail, impersonation, or social engineering to coerce their victims into paying. This can cause significant emotional and financial harm to the victim.
- Lottery/Sweepstakes Relationship Scams – Lottery or sweepstakes scams are fraudulent schemes that trick victims into believing they have won a prize, such as a lottery or sweepstakes. Scammers may ask for money or personal information to claim the prize, but the prize does not exist. Victims can lose money or become victims of identity theft.
- Marriage Relationship Scams – International marriage scams are a type of romance scam where scammers target individuals looking for a spouse, usually through online dating sites or social media platforms. The scammer gains the victim’s trust and then requests money for travel or visa expenses, but never shows up. Victims can suffer emotional and financial harm.
- Services Relationship Scams (such as fake law enforcement, investigative services, or money recovery scams) – Services scams, such as tech support scams, are fraudulent schemes where scammers pose as legitimate service providers to gain access to victims’ computers or obtain their personal information. They may use scare tactics, like claiming the victim’s computer is infected, to extort money for unnecessary services or software.
- Government Impersonation Relationship Scams – Government impersonation scams, such as IRS scams, arrest scams, and jury duty scams, involve scammers posing as government officials to trick victims into giving money or personal information. They may use scare tactics, like threatening arrest or legal action, to pressure victims into complying. Victims can suffer significant financial and emotional harm.
B. Types Of Scams: Targeted Scams
Targeted Scams are fraud that targets individuals and businesses via a targeting mechanism (such as emails, messages, texts, phone) but where there is no real trust established between the victim and the criminals.
These include:
-
- Phishing Scams (in all of their forms) – Phishing scams are a type of cyber attack where scammers use fraudulent emails, texts, or websites to trick victims into providing personal or sensitive information, such as passwords or credit card numbers. These scams can be very convincing and often appear to be from a trusted source, such as a bank or other legitimate organization.
There are several types of phishing scams, including:
-
-
-
- Email phishing: Scammers send fraudulent emails posing as a legitimate organization, often asking the victim to click on a link or provide personal information.
- Spear phishing: A targeted phishing attack where scammers personalize their message and use information about the victim to make it more convincing.
- Smishing: Phishing scams sent through SMS or text messages.
- Vishing: Phishing scams conducted over the phone, often using fake caller ID or other methods to impersonate a trusted organization.
- Clone phishing: Scammers create a copy of a legitimate email or website and use it to steal information from victims.
- Whaling: Phishing attacks targeting high-level executives or other high-value targets.
- Social media phishing: Scammers use social media platforms to pose as a friend or acquaintance of the victim and request personal information or money.
- Search engine phishing: Scammers use search engine ads or results to lure victims to fake websites or phishing pages.
-
-
-
- Identity Theft & Synthetic Identity Fraud – Cyber-enabled identity theft is a type of fraud where criminals use stolen or fake personal information to create new identities or take over existing ones for financial gain. Synthetic identity fraud is a specific type of cyber-enabled identity theft where criminals create new, entirely fake identities by combining real and fake information. Victims of cyber-enabled identity theft can suffer significant financial and reputational harm.
- Business Email Compromise Scams (aka CEO Scams) – Business Email Compromise (BEC) scams, also known as CEO scams, are a type of phishing attack where scammers impersonate a company’s CEO or another high-ranking employee to trick employees into wiring money or providing sensitive information. These scams can cause significant financial damage to businesses and may involve sophisticated social engineering tactics.
C. Types Of Scams: Cyber-Attack Scams
Cyber Attack Scams are where there was a cyber attack on the target victim, that may have depended on a human victim but was executed by automated means.
These include:
-
- Ransomware Extortion Cyber Attack – Ransomware is a type of malicious software that encrypts a victim’s files and demands a ransom payment in exchange for the decryption key. It can be spread through phishing emails, compromised websites, or other methods, and can cause significant damage to individuals and organizations if not properly protected against.
- Spyware Cyber Attack – Spyware is a type of malware designed to collect information from a victim’s computer or device without their knowledge or consent. It can track online activity, capture keystrokes, and gather personal information, which can be used for malicious purposes such as identity theft or targeted advertising.
- Doxware Extortion Cyber Attack – Doxware is a type of malware that threatens to release sensitive information about a victim unless a ransom is paid. It typically involves the theft of personal data such as login credentials, financial information, or private messages, which is then used as leverage to extort the victim.
- Other forms of extortion cyber attacks – Extortionware is a type of malware that uses various forms of extortion tactics to extract money from its victims. It may threaten to delete or leak sensitive data, damage the victim’s computer system, or even physically harm the victim or their family. The goal is to coerce the victim into paying a ransom to avoid harm.
Types Of Scams: The Purpose
The purpose behind this is to help the professionals and victims involved to agree upon a more descriptive, less blaming or derogatory term set for these crimes.
-/ 30 /-
What do you think about this?
Please share your thoughts in a comment below!
Do You Need Support?
Get It Now!
SCARS provides the leading Support & Recovery program for relationship scam victims – completely FREE!
Our managed peer support groups allow victims to talk to other survivors and recover in the most experienced environment possible, for as long as they need. Recovery takes as long as it takes – we put no limits on our support!
SCARS is the most trusted support & education provider in the world. Our team is certified in trauma-informed care, grief counseling, and so much more!
To apply to join our groups visit support.AgainstScams.org
We also offer separate support groups for family & friends too.
Become a
SCARS STAR™ Member
SCARS offers memberships in our STAR program, which includes many benefits for a very low annual membership fee!
SCARS STAR Membership benefits include:
- FREE Counseling or Therapy Benefit from our partner BetterHelp.com
- Exclusive members-only content & publications
- Discounts on SCARS Self-Help Books Save
- And more!
To learn more about the SCARS STAR Membership visit membership.AgainstScams.org
To become a SCARS STAR Member right now visit join.AgainstScams.org
To Learn More Also Look At Our Article Catalogs
Scam & Crime Types
More SCARS
- ScamsNOW Magazine – ScamsNOW.com
- ContraEstafas.org
- ScammerPhotos.com
- AnyScam.com – reporting
- AgainstScams.org – SCARS Corporate Website
- SCARS YouTube Video Channel
Excellent way to describe the variety of scam crimes. Thank you SCARS!