Fraudsters’ Playbook: Common Scams Targeting Indian Users

Common Scams Targeting Indian Users

Sujatha, a 34-year-old software professional from Mumbai, received a message that seemed legitimate. It claimed to be from his bank, urgently requesting him to verify his account details to prevent suspension. In a hurry, he clicked the link, entered his credentials, and within minutes, his savings began vanishing. Ravi’s experience is not unique. Between January and April 2024, cyber frauds led to losses amounting to ₹1,760 million (₹176 crore). Investment scams accounted for ₹2,220 million (₹222 crore) across 62,687 complaints, while trading scams resulted in losses of ₹14,200 million (₹1,420 crore) over 20,043 cases during the same period.

India has witnessed a surge in online and mobile fraud, impacting millions of unsuspecting users. With the rise of digital transactions and smartphone adoption, cybercriminals have found new ways to exploit vulnerabilities. Awareness is crucial in defending against these threats, as a lack of vigilance can result in significant financial and personal losses. While technology has undoubtedly made our lives more convenient—enabling instant communication, digital banking, and seamless services—it has also brought an array of new risks. The balance between convenience and security is more delicate than ever, and understanding the evolving threats is the first step towards safeguarding ourselves.

1. Phishing Attacks

Phishing is a type of cyberattack where fraudsters attempt to trick users into revealing sensitive information such as usernames, passwords, or financial details. It typically involves disguising malicious messages to appear as if they are from trusted institutions.

Phishing can take several forms, including emails that appear to be from banks, SMS messages (also known as smishing) that warn of urgent account issues, and even social media messages that seem to come from known contacts. These messages often contain a sense of urgency or fear to prompt the victim into quick action.

A common scenario might involve receiving an email that claims suspicious activity on a bank account, urging the user to click on a link to verify their credentials. These links lead to fake websites designed to capture sensitive information. Another example is smishing, where users receive alarming text messages supposedly from their bank, requesting details to prevent account suspension.

The impact on victims can be devastating, ranging from financial losses to identity theft. Many victims only realize they’ve been scammed after their bank accounts are compromised, often too late to recover their funds.

To identify phishing attempts, be vigilant about messages that create a sense of urgency or alarm. Look out for inconsistencies, such as grammatical errors, unofficial email addresses, or suspicious links. Always verify with the institution directly if you receive unexpected communication requesting sensitive information. Remember, legitimate organizations will never ask for sensitive information through insecure channels.

2. SIM Swap Frauds

SIM swapping is a form of fraud where cybercriminals exploit weaknesses in mobile carrier processes to gain control of a victim’s phone number. By impersonating the victim, fraudsters contact the mobile service provider and convince them to activate a new SIM card in their possession. Once the SIM is swapped, the criminals receive all incoming calls and messages, including One-Time Passwords (OTPs) used for banking transactions.

With access to the victim’s phone number, criminals can use stolen information, such as leaked personal data, to gain control over bank accounts, reset passwords, and carry out unauthorized transactions. Victims often realize they have been targeted when they suddenly lose network service on their mobile device.

Warning signs of a SIM swap attack include sudden loss of network connectivity, receiving notifications of SIM-related changes, or being unable to make calls or send messages. To prevent SIM swap fraud, users should set up strong verification processes with their mobile carriers, avoid sharing personal information publicly, and use multi-factor authentication (MFA) wherever possible. Being alert to unusual activity on your phone can help detect and mitigate SIM swap attempts before significant damage occurs.

3. UPI and Mobile Payment Frauds

The use of Unified Payments Interface (UPI) and mobile wallets in India has seen exponential growth, with UPI transactions surpassing 10 billion per month as of 2024, indicating its widespread adoption. However, this surge has also attracted scammers looking to exploit unsuspecting users.

Scammers often use social engineering tactics to trick people into authorizing payments. For instance, they might pose as a legitimate vendor or customer service representative, convincing victims to share their UPI PIN or authorize a transaction. Fraudsters may also use fake payment apps that mimic real ones, tricking users into entering their credentials on these counterfeit platforms.

Another common scam involves QR codes. Scammers may send a QR code, claiming it will allow the user to receive a refund or payment, but in reality, scanning and authorizing it results in money being transferred out of the victim’s account. Fraudulent refund requests are also prevalent, where scammers pose as buyers and ask sellers to process refunds, using the opportunity to gain access to their payment details.

To stay safe, always verify the authenticity of payment requests, avoid sharing your UPI PIN, and use official payment apps. Double-check URLs and app sources, and never scan QR codes from unknown sources. Awareness and caution are key to secure mobile transactions.

4. Loan and Investment Frauds

Loan and investment frauds have become increasingly common, especially targeting vulnerable individuals looking for financial support or high returns. Fake loan offers often promise easy approval and low interest rates, luring those in financial distress. These scams typically involve collecting advance payments for processing fees or insurance, only for the loan to never materialize, leaving victims in worse financial shape.

Ponzi schemes and high-return investment scams prey on individuals looking for quick profits. Fraudsters promise unrealistically high returns with little to no risk, using funds from new investors to pay earlier participants, creating an illusion of legitimacy. Eventually, the scheme collapses, leaving many with significant financial losses.

Fraudsters frequently use social media and WhatsApp to spread these scams, taking advantage of trust within personal networks to gain credibility. By sharing enticing offers in groups or through direct messages, they create a false sense of security, making it easier to defraud people.

To avoid falling victim, always verify the legitimacy of loan offers by checking the credentials of the financial institution. Avoid any offers that promise guaranteed high returns with minimal risk, as these are often red flags. Conduct thorough research and seek professional advice before making any investment decisions.

5. Fake Customer Care Frauds

Scammers often impersonate customer service representatives to trick users into divulging sensitive information or giving them remote access to their devices. These scammers typically set up fake helpline numbers that appear prominently in search engine results, making it easy for desperate customers to fall into their trap. Posing as legitimate support agents, they claim to assist with resolving issues but instead exploit the situation for their gain.

One common tactic involves convincing victims to install remote access software, such as AnyDesk or TeamViewer, under the guise of troubleshooting. Once installed, scammers gain full access to the victim’s device, allowing them to steal banking credentials, passwords, or even initiate unauthorized transactions. They might also demand payments for bogus services or subscriptions.

Major services commonly targeted by such scams include banking, telecom companies, e-commerce platforms, and government utility services. Scammers take advantage of the brand’s reputation to deceive users.

To protect yourself, always verify the authenticity of helpline numbers from official websites or trusted sources. Never install software at the request of a support agent without confirming their legitimacy. Avoid sharing sensitive information over phone calls unless you are absolutely certain of the identity of the representative. Being cautious and verifying every detail can save you from falling victim to fake customer care frauds.

6. OTP and Account Takeover Frauds

How One-Time Password (OTP) scams are executed has become a significant concern, with cases skyrocketing across India. According to recent reports, OTP-related frauds contributed to over 30% of digital banking fraud incidents in 2023. OTP scams are executed through social engineering tactics where fraudsters trick users into sharing their OTPs under false pretenses. They might impersonate bank officials, customer service representatives, or even use scare tactics like claiming suspicious activity on the user’s account.

Once the OTP is obtained, criminals gain full access to accounts, leading to unauthorized transactions, drained bank balances, and sometimes even identity theft. Victims of OTP fraud often suffer substantial financial losses, with many left helpless as transactions are completed within seconds, making recovery challenging.

To protect yourself from OTP fraud, never share OTPs over calls, SMS, or social media, even if the request seems legitimate. Banks will never ask for such sensitive information. Be cautious of messages that create urgency or fear, as these are typical red flags. Enable two-factor authentication (2FA) and closely monitor your accounts for any suspicious activity. Vigilance and a proactive approach can help in mitigating the risks associated with OTP and account takeover frauds.

7. Online Shopping and Fake Website Scams

Fake e-commerce websites and counterfeit products have become increasingly common, particularly during festive sales and discount seasons. Fraudsters create convincing online stores that mimic well-known brands, complete with fake reviews, flashy discounts, and professional-looking websites. They often lure victims by advertising on social media, using targeted ads to reach a wider audience.

These fake stores collect payments but never deliver the promised products, leaving buyers with financial losses. Sometimes, they may send counterfeit or substandard items instead of the advertised high-quality products.

To avoid falling victim to fake online stores, look for signs such as poor website design, inconsistent branding, or deals that seem too good to be true. Always verify URLs, read genuine reviews, and avoid making purchases from unfamiliar websites. Stick to well-established platforms, and whenever possible, opt for cash-on-delivery to ensure you receive the product before making payment.

8. Job and Recruitment Scams

Fake job offers and fraudulent recruitment agencies have become a growing concern, especially with the rise of online job portals and social media advertisements. Scammers often promise lucrative job opportunities, typically requiring an upfront payment for application processing, training materials, or other bogus fees. Once the money is paid, the job offer disappears, leaving the victim financially and emotionally drained.

One common scam involves fake recruitment agencies that use convincing company logos and create job postings that appear legitimate. Victims are often lured by the promise of high salaries and minimal qualifications. Warning signs for job seekers include requests for payments, interviews conducted solely via messaging apps, or vague job descriptions that lack specific details about the role.

To avoid falling for these scams, always verify the credentials of the recruitment agency or company. Research the company online, check for official email addresses, and be cautious of unsolicited job offers. Remember, legitimate employers will never ask for payments during the hiring process.

9. Social Media Frauds

Scammers use social media platforms to gather personal information or impersonate friends and family, making it easier to manipulate their victims. They may send friend requests from fake profiles or hack into existing accounts, gaining access to contact lists to target more individuals. By posing as a trusted friend or family member, scammers can exploit emotions, request money, or obtain sensitive information.

Romance scams are a particularly insidious form of social media fraud. Scammers create fake profiles to establish emotional relationships with their victims. Once trust is built, they use emotional manipulation to extract money, often fabricating emergencies or financial crises. Victims are left heartbroken and financially drained, with little recourse.

To avoid falling victim to social media scams, avoid oversharing personal information online. Be cautious when accepting friend requests from unfamiliar profiles, even if they seem to have mutual connections. Recognize social media traps such as unsolicited messages, urgent requests for money, or profiles that seem too perfect. Always verify identities through multiple channels before engaging further.

10. Lottery and Prize Scams

Fake lottery schemes lure victims by promising big winnings, often claiming they have won a substantial prize. Victims are then asked to pay ‘processing fees’ or taxes upfront before they can receive their winnings. Once the payment is made, the scammers vanish, leaving the victims with financial losses.

Common red flags include unsolicited messages claiming lottery winnings, requests for advance payments, and unrealistic prize amounts. Scammers often use official-sounding names and documents to appear legitimate.

To avoid falling for these scams, remember that legitimate lotteries do not require upfront payments. Always verify any prize claims, and be skeptical of unsolicited winning notifications.

Conclusion

Fraud in today’s digital world can strike anyone, and the examples covered in this guide illustrate just how diverse and impactful these scams can be. From phishing attacks and SIM swap frauds to fake customer care calls and lottery scams, the tactics used by cybercriminals are evolving rapidly. Fraudsters are finding new ways of deceiving people using modern technology. These frauds can lead to severe financial loss, emotional distress, and even identity theft, affecting millions of lives every year.

Staying vigilant is the key to defending against these threats. Educating yourself and those around you about these common scams is an important step towards reducing risks. By recognizing red flags and staying informed, you can significantly reduce your vulnerability to these frauds.

Sharing information plays a critical role in combating cybercrime. Talk to your friends and family about these dangers, and stay updated on the latest scam techniques through trusted sources. Together, we can create a community that is informed, cautious, and resilient against fraud..

Call to Action

In the fight against online fraud, staying informed is your strongest defense. Subscribing to cybersecurity newsletters or following reliable sources like CERT-In, Cyber Safe India, or trusted cybersecurity blogs can help you stay up-to-date on the latest threats and preventive measures. Knowledge is power, and having timely information about emerging scams can protect you and those around you from potential fraud.

We also encourage you to share your own experiences with fraud or attempted scams. Sharing your story can help others recognize warning signs and stay safe. By talking about these incidents, we not only create awareness but also empower each other to make more informed decisions. Whether it’s sharing on social media, discussing with friends and family, or joining community groups focused on online safety, every bit helps.

Remember, vigilance starts with awareness. Let’s work together to spread the message, protect our communities, and build resilience against online fraud. Stay informed, stay cautious, and don’t hesitate to share what you learn. Together, we can reduce the impact of cybercrime and keep each other safe.

I will be launching a monthly newsletter soon with important updates and news that you should not miss . Subscribe to my blog so that you get notified when I publish a blog. You will also have access to exclusive contents and tools that will help you grow.

 —

Disclaimer: The views and opinions expressed in this blog are my own. They are articulation of my knowledge and research on the topic. The facts and opinions expressed here do not reflect the views of my current or previous employers.

© 2025 Avijit Patra.