Below are some common types of scams reported by members of the U-M community. They often very sophisticated and require a watchful eye.
Scams may be used to infect your computer with malware:
- Ransomware
Scammers use malicious software to encrypt data on your computer or other networked devices, preventing you from accessing it and ask you to pay a ransom to get your access back. Don't pay the ransom!
Scammers may use a common hook that becomes a trend, such as:
- Job offer scams
Scammers contact someone and offer them a job, but ask for a favor or favors in return, usually involving helping to acquire things of value like gift cards, or to process a check that turns out to be fake. - Romance scams
Criminals lure people into a fake romantic relationship online, but then starts asking for money—often for a supposed medical emergency, travel expense, or other urgent need. - Tax fraud
Identity thieves try to file fraudulent tax returns in your name and steal your tax refund, or they may attempt to steal your identity through emails or phone calls. - Tech support scams
Scammers impersonate tech support staff, claim to know that something is wrong with your computer, and offer to help you fix it in order to steal your personal information. - Tutoring Overpayment Scams (Check overpayment scams)
Someone posing as a tutoring customer overpays the tutor with a fraudulent check and then asks to be refunded the "extra" payment. It's a variation on "check overpayment" scams.
Scammers may reach you through a variety of methods, such as:
- Phishing emails
Criminals use malicious email and websites to try to trick you into revealing your password or other sensitive information; or infect your computer with malware. - Phone scams and voice phishing (vishing)
Scammers use fraudulent phone calls to trick you into giving money or revealing personal information, often pretending to represent a trusted institution, company, or government agency. - Text message (SMS) scams (smishing)
Scammers send an unsolicited text message that prompts you to click a link or reply; they try to steal personal information and money, and commit fraud. - Spear Phishing (U-M video)
Criminals disguise their messages and websites to look like official U-M messages and websites. It's a more targeted version of phishing. - Shared Document Emails Can Be Traps
Scammers use emails directing you to shared documents in order to try to steal your password and compromise your computing account. - Office Doc Dangers: Macros & Enabled Content Pose Risks
Scammers use Microsoft Office Macros—small bits of programming used to automate tasks—to spread viruses and malware.
Resources
- Tax Scams/Consumer Alerts (IRS)
- Report Phishing and Online Scams (IRS)
- Taxpayer Guide to Identity Theft (IRS)
- Consumer Information: Tech Support Scams (FTC)
Stay Informed
- Phishes & Scams at U-M
- Alerts, Advisories & Notices (cybersecurity and privacy risks)