Common Scams

Learn More

If You Get Caught

Below are some common types of scams reported by members of the U-M community. They often very sophisticated and require a watchful eye.

Scams may be used to infect your computer with malware:

  • Ransomware
    Scammers use malicious software to encrypt data on your computer or other networked devices, preventing you from accessing it and ask you to pay a ransom to get your access back. Don't pay the ransom!

Scammers may use a common hook that becomes a trend, such as:

  • Job offer scams
    Scammers contact someone and offer them a job, but ask for a favor or favors in return, usually involving helping to acquire things of value like gift cards, or to process a check that turns out to be fake.
  • Romance scams
    Criminals lure people into a fake romantic relationship online, but then starts asking for money—often for a supposed medical emergency, travel expense, or other urgent need.
  • Tax fraud
    Identity thieves try to file fraudulent tax returns in your name and steal your tax refund, or they may attempt to steal your identity through emails or phone calls.
  • Tech support scams
    Scammers impersonate tech support staff, claim to know that something is wrong with your computer, and offer to help you fix it in order to steal your personal information.
  • Tutoring Overpayment Scams (Check overpayment scams)
    Someone posing as a tutoring customer overpays the tutor with a fraudulent check and then asks to be refunded the "extra" payment. It's a variation on "check overpayment" scams.

Scammers may reach you through a variety of methods, such as:

  • Phishing emails
    Criminals use malicious email and websites to try to trick you into revealing your password or other sensitive information; or infect your computer with malware.
  • Phone scams and voice phishing (vishing)
    Scammers use fraudulent phone calls to trick you into giving money or revealing personal information, often pretending to represent a trusted institution, company, or government agency.
  • Text message (SMS) scams (smishing)
    Scammers send an unsolicited text message that prompts you to click a link or reply; they try to steal personal information and money, and commit fraud.
  • Spear Phishing (U-M video)
    Criminals disguise their messages and websites to look like official U-M messages and websites. It's a more targeted version of phishing.
  • Shared Document Emails Can Be Traps
    Scammers use emails directing you to shared documents in order to try to steal your password and compromise your computing account.
  • Office Doc Dangers: Macros & Enabled Content Pose Risks
    Scammers use Microsoft Office Macros—small bits of programming used to automate tasks—to spread viruses and malware.

Resources

Stay Informed