NF

NumberFlag

spam defense network

Scam glossary

Scam glossary

Clear definitions for the most common scam tactics.

28 of 28 terms

Caller ID spoofing

When scammers fake the caller ID to look like a trusted organization.

Example: The call shows your bank number, but the caller asks for a code.

Bank spoofing

Impersonation of a bank line to pressure you into sharing codes or moving funds.

Example: A caller says a transfer is pending and asks for an SMS code.

Vishing

Voice phishing. A caller tricks you into sharing data or sending money.

Example: A 'support agent' asks for your login and one-time code.

Smishing

SMS phishing. Text messages that push fake links or payments.

Example: A text says a parcel fee is due and links to a payment page.

Parcel delivery scam

A fake delivery notice that asks for a small fee or card verification.

Example: The courier SMS asks for PLN 3.99 to release your parcel.

Remote access scam

Scammers ask you to install software that lets them control your device.

Example: You are told to install AnyDesk to 'fix' your account.

Impersonation scam

A caller pretends to be a bank, courier, or government agency.

Example: Someone claims to be from the tax office and demands payment.

One-time passcode (OTP) theft

Attackers ask for SMS/app codes to bypass account security.

Example: They say the code is to 'verify identity' on the call.

Callback trap

A call or missed call that pressures you to call back a premium line.

Example: A missed call from a foreign number with a 'call me back' SMS.

Payment redirection

The caller asks you to move funds to a ‘safe’ account they control.

Example: You are told to transfer money to a secure holding account.

Safe account scam

A fake security step where you are told to move money to protect it.

Example: A 'fraud team' asks you to move savings to a new account.

Refund scam

Scammers claim you are owed a refund and ask for access or codes.

Example: A caller says you will get money back after a small fee.

Account takeover

A scam that results in someone else controlling your account.

Example: Your email password is changed after you share a code.

Tech support pop-up

Fake alerts that push you to call a number for ‘support’.

Example: A browser pop-up says your PC is infected and lists a phone number.

SIM swap

A takeover where attackers move your phone number to their SIM.

Example: Your phone loses signal and your SMS codes stop arriving.

Call forwarding fraud

Attackers enable forwarding so calls and codes go to their device.

Example: Calls redirect without your knowledge after a 'settings check'.

Silent call

A call that hangs up quickly, often used to test if a number is active.

Example: You answer and no one speaks before the call ends.

Wangiri

One-ring calls that bait you to call back premium numbers.

Example: You see a missed call from an unknown country code.

Debt collection scam

Impersonation of collectors to pressure immediate payment.

Example: They threaten legal action unless you pay today.

Prize or lottery scam

You are told you won a prize and must pay a fee to receive it.

Example: A caller says you won a voucher but need to pay shipping.

Job offer scam

Fake recruiters ask for fees, data, or install a messaging app.

Example: A 'recruiter' asks for your ID and a paid training fee.

Marketplace scam

Fake buyers or sellers ask you to click shipping or payment links.

Example: A buyer sends a fake courier link to 'confirm' delivery.

Investment scam

Promises of fast returns in exchange for deposits or crypto.

Example: A caller guarantees 10% weekly returns if you deposit today.

Romance scam

A long con that builds trust and then asks for money or codes.

Example: After weeks of chats, they request emergency funds.

Subscription trap

Hidden recurring charges after a small payment or free trial.

Example: A PLN 1 trial turns into a monthly charge you did not expect.

Payment link spoofing

A link to a fake payment page that steals card details.

Example: A short link opens a branded-looking checkout page.

Credential stuffing

Attackers reuse leaked passwords across multiple services.

Example: Your account is accessed using a password from another leak.

Urgency tactics

Pressure to act immediately so you do not verify the caller.

Example: They say you have 5 minutes before your account is locked.