An all-new Online Banking experience is coming soon. Click here to learn more.
Welcome to Opportunity

Fraud Protection

(570) 823–6836

Fraud Protection

Keeping your money safe, every day

Unfortunately, financial frauds and scams are a part of today’s reality. That’s why CVFCU is doing everything we can to ensure your money is safe and secure.

Here are just a few of the ways that we’re working to protect you.

  • Monitoring accounts and CVFCU credit cards for suspicious activity
  • Members’ passwords and personal info are kept safe with high-level encryption
  • Transactions flagged as suspicious require member verification
  • Identity monitoring to protect members from identity theft
  • Free education and resources for how to reduce fraud and scam risks

If you suspect you’re being targeted or have been defrauded, contact us immediately so we can help.

Contact us right away

You can always contact us 24/7 at (570) 823-6836 and you will then be directed to our after-hours fraud protection center.

We monitor for the unthinkable so you don't have to.

The International Association of Financial Crimes Investigators presents… The Protectors Podcast

From ATM Skimming to Human Trafficking, The Protectors Podcast takes you inside the minds of criminals from around the world with leading experts and the investigators who put them behind bars.

Listen now

Fraud and scam loss by the numbers

Each year, fraudsters find new ways to trick people and financial institutions out of money. While some scams involve new tricks, many have been around for decades. Of the over 2.3 million fraud reports, 26% indicated money was lost. In 2022, consumers reported losing nearly $8.8 billion to fraud.

  • Younger people lost money to fraud more often than older people.
  • 43% of victims ages 20-29 lost money to fraud
  • 23% of victims ages 70-79 lost money to fraud
  • However, people aged 70+ had a much higher median loss

You can report fraud, scams and other illegal business
practices by going to the Federal Trade Commission
website.

Report fraud now

How they get you

Fraudsters use various channels, including emails, texts and phone calls, to disguise their identity and retrieve confidential information. Their tactics prey on basic human instincts to trust and please, often catching employees or members off guard. Here are key points to watch for:

  • Fraudsters pressure people to make quick decisions using innovative schemes.
  • They use a multi-channel approach, looking for victims who find their stories convincing.
  • Common scams involve clicking on malicious links or sharing sensitive information.
  • Red flags include intimidation tactics and urgent requests.
  • As fraud schemes grow more sophisticated, it’s essential to stay vigilant and take prompt action.

We’re all human, but awareness can help prevent falling victim to these scams.

Top fraud and scam approaches

Being aware of the different types of fraud you may encounter is the first step in protecting yourself. This guide will highlight common scams and the warning signs to look out for, helping you stay alert and safeguard sensitive information.

Common types of scam
Select a common scam to find out more info:

Romance scams

Romance scammers often create fake online dating profiles using stolen photos and details from real accounts. They claim to be from the U.S. but are temporarily working or traveling overseas. Common fake occupations include oil rig workers, military personnel or doctors with international organizations.

Scammers quickly profess love and emotionally manipulate their victims, requesting money for expenses like plane tickets, travel costs or customs fees to "return home." Many victims end up wiring money or sharing sensitive information, believing they are helping a genuine partner.

Tech support scams

Someone calls claiming to be a computer technician, often from a well-known company like Microsoft, Apple, or even your internet service provider. They inform you that your computer is infected with viruses or malware and that you need to provide remote access or purchase new software to fix the issue.

In reality, these scammers are looking to sell you useless services, steal your credit card information or gain access to your computer. Once they have access, they may install malware that allows them to monitor everything on your device.

Advanced fee scams

In an advanced fee scam, the scammer informs the victim that they have won a large prize, such as a bogus lottery, or are entitled to a significant inheritance from a deceased relative. However, before receiving the money, the victim is told they must first pay taxes or fees. The victim wires the requested funds to the scammer to cover these costs but never hears from them again.

Social Security, Government & IRS scams

Scammers impersonate Social Security Administration (SSA) employees over the phone, requesting personal information or money. They often threaten arrest or legal action and may “spoof” official government numbers, including the SSA National 800 Number, local offices, or even police numbers.

Some scammers also impersonate IRS agents, claiming back taxes are owed or linking the victim to criminal activities like money laundering. They threaten lawsuits, arrest, deportation or revoking the victim’s Social Security number or license unless payment is made immediately via gift cards, wire transfers, or cash.

Secret shopper scams

Members seeking extra income are often deceived into participating in the secret shopper scam. After accepting the job, the member receives a counterfeit cashier’s check, typically ranging from $2,000 to $5,000. They are instructed to cash the check, purchase money orders and gift cards, and then send them to the scammers.

In return, they are told they can keep a percentage of the check as payment. However, the counterfeit check is later returned unpaid, and the full amount is charged back to the member’s account.

Relief scams

Scammers often exploit times of uncertainty by convincing people to donate money to fraudulent relief funds. Recent scams have included schemes related to flood and disaster relief, COVID-19, Ukrainian assistance, student loan debt forgiveness, and other fake charity efforts.

These scams prey on people’s desire to help, but the funds end up in the hands of fraudsters instead of those in need.

Common types of fraud
Don’t fall for these common fraudulent schemes:

Mail Theft & Check Fraud

Mail theft and armed robberies against U.S. Postal Service carriers have increased. Criminals steal checks from USPS blue mailboxes or personal mailboxes, altering the payee names and amounts or counterfeiting the checks to use them for fraud.

  • Fraudsters alter checks or manufacture counterfeit versions.
  • Stolen checks are used to open fraudulent accounts or apply for loans using the victim’s personal information.
  • Protect yourself by mailing checks from inside the post office and monitoring your account for unfamiliar transactions.

Person-to-Person (P2P) Payment Fraud

Scammers pose as credit union representatives, sending texts about suspicious transactions on P2P payment apps like Zelle. They follow up with a call, spoofing the credit union’s number, and request account login information under the guise of verifying your identity.

  • Fraudsters ask for online banking credentials, then reset your password to gain access to your account.
  • In another variation, they trick you into sending money to yourself, but the funds are actually transferred to the scammer’s account.
  • Always verify suspicious texts or calls with your financial institution directly.

Fraudulent Instruction Wire Scams

Fraudsters target real estate transactions, hacking into title companies or lenders’ email systems to send fake wire transfer instructions at the last minute. They pose as a legitimate title company or closing agent to reroute closing funds to their own accounts.

  • Fake emails contain fraudulent wire instructions just before real estate closings.
  • Victims follow these instructions, unknowingly wiring funds to the fraudster’s account.
  • Losses from these scams can be substantial, so always confirm wire instructions directly with your title company or lender.

Account Takeover Fraud

Fraudsters use stolen personal information to take over online banking accounts. They trick call center employees or account holders into resetting passwords, changing contact information, and intercepting two-factor authentication.

  • Social engineering tactics are used to manipulate employees or victims.
  • Phishing and SMiShing attacks also trick victims into giving up login credentials.
  • Fraudsters may take over phone numbers by activating a replacement SIM card or porting the number to another carrier.

Text Message & Spoofed Website Scams

raudsters send texts claiming to be from your credit union, warning about suspicious activity or locked accounts. These messages contain links to spoofed websites that look identical to your financial institution’s legitimate site. Victims are tricked into entering login credentials, which the scammers use to access accounts.

  • Texts often reference unusual transactions or suspicious account activity.
  • Links lead to fake websites designed to steal personal information.
  • Once logged into your account, scammers change your contact info and transfer funds using P2P or ACH.

Elder Abuse & Financial Exploitation

Scams targeting elderly members are on the rise, often involving impostors posing as a relative in distress, like a grandchild needing bail money. Scammers instruct the victim to wire funds to an account under their control, playing on the emotions of the elderly member.

  • The “grandchild” claims to need urgent financial help due to arrest or unpaid tickets.
  • Victims are instructed to wire money to an account controlled by the scammer.
  • Other elder abuse scams involve fraudsters gaining access to senior accounts through weak authentication processes or by posing as legitimate caretakers.

ATM Fraud

Criminals place hard-to-detect skimmers, keypads, and cameras on ATMs to steal card information and PINs. Once this information is collected, it can be used to make unauthorized transactions or create counterfeit cards.

  • Look for loose or damaged parts on the ATM, such as card slots or keypads.
  • Cover the pin pad when entering your PIN.
  • Avoid using ATMs in secluded or poorly lit areas to reduce the risk of tampering.

Gas Pump Fraud

Gas pumps are frequently targeted by fraudsters using skimming or shimming devices to capture credit and debit card information. These devices can be hard to detect but are often placed on out-of-sight pumps far from the station.

  • Inspect card readers for loose or misaligned parts before inserting your card.
  • Use pumps closest to the station or pay inside when possible.
  • Consider using digital wallet apps to minimize direct card exposure.

27 million American consumers were victimized by identity fraud related financial losses in 2022.

—Javelin 2022 Identity Fraud Study “The Virtual Battleground”

Protect your identity and money

ABCs of fraud awareness

Fraudsters will use several different social engineering techniques to acquire sensitive information such as usernames, passwords and account or payment card details all while trying to trick you into believing they are legit:

The key to fraud awareness is to Always Be Checking.

  • Phishing (through email)
  • Vishing (through phone calls)
  • SMiShing (though SMS/text messages)
  • Identity monitoring to protect members from identity theft
  • Malware (malicious software)

Fraudsters will also spoof the credit union’s contact
info (phone number; email, etc.) to appear to be
from the actual credit union. They often:

  • Build victim profiles
  • Change members’ contact information
  • Request wire transfers and withdraw funds
  • Request canceled checks
  • Order share drafts
  • Request password resets
  • Request credit/debit cards
  • Set up audio response or online banking
  • Compromise login credentials, including one time passcodes

Common warning signs

Regardless of the fraud type or intention, fraudsters’ first objective is to convince others that they are a real member. Here are things to be on the lookout for:

  • Don’t always trust the display name criminals will spoof the email name to appear to be a legitimate sender.
  • Check for misspelled words, bad grammar, and/or typos within the content.
  • Be cautious of clicking links and opening attachments. Don’t click unless you’re confident of the sender or expect the attachment.
  • Asking you to share a one time passcode sent to your device (when they called you).
  • Check the salutation many legitimate businesses will use a personal salutation.
  • Do not provide personal information when asked.
  • Be suspicious of urgent or immediate response needed or unauthorized login attempt of your account.
  • Don’t believe everything you see. Brand logos, names and addresses may appear legitimate.
  • The recipient group seems random or unusual (e.g., all last names begin with the same letter).
  • The email appears to be a reply to a message that you didn’t actually send.
  • Monitor the sender’s email address for suspicious URLs and domains fraudsters often using similar letters and numbers.
  • If something seems suspicious; contact that source with a new email or phone call, rather than just hitting reply.
  • Be wary of tempting “too good to be true” offers.

Protecting yourself from fraud & scams

Recognizing scams can be difficult, especially after the impact of having personal information exposed following a data breach. But you can minimize the potential impact by knowing what to look for, taking the right action steps and remaining vigilant.

  • Monitor your credit
    • Check your credit report annually. Consumers are entitled to a free credit report from each of the three major credit bureaus annually. Simply go to AnnualCreditReport.com to get started. Items to watch for are “new” or “re opened” accounts and other suspicious activity.
    • A best practice is to check your credit report three times per year by requesting the report from one credit bureau every four months.
  • Watch for scams
    • Be cautious of emails or calls claiming to be from businesses or financial institutions that were breached.
    • Common scams to watch for: romance, secret shopper, advanced fee, relief funds, elder abuse, government impersonation, and tech support.
    • Don’t open attachments or click on links from unknown email senders—these often contain malware.
    • Avoid clicking links or calling numbers from unfamiliar text messages—be aware of SMiShing (phishing via SMS).
    • File your tax returns promptly to prevent tax identity fraud. If you receive notices of multiple filings or discrepancies, complete IRS form 14039 and contact the IRS Identity Protection Unit.
    • Check with your credit union about extra account protections like security passphrases and travel alerts.
    • Be wary of offers that sound too good to be true, demand quick action or create a sense of fear or missing out.
  • Keep your SSN safe
    • Guard your Social Security Number (SSN) closely—it’s highly valuable to identity thieves. If your credit union uses it for identification, ask to use something else like a password or recent transaction.
    • Only share your SSN when necessary, such as opening accounts or applying for loans, and ensure it won’t be overheard or misused.
    • The IRS and Social Security Administration will never contact you by phone, email, text or social media.

Protecting yourself online

To protect your personal and financial information online, it’s important to follow key security practices. Here are some essential tips to help safeguard your accounts and data from cyber threats and fraud.

  • Use strong passwords: at least 11 characters, case-sensitive, including letters, numbers and symbols. Check password strength with a password checker.
  • Avoid using the same password for multiple transaction websites.
  • Protect your home computer with a firewall and regularly updated antivirus/anti-malware software (weekly updates recommended).
  • Install operating system patches as soon as they’re available.
  • Avoid public Wi-Fi and computers for online transactions; if necessary, use a VPN for added security.
  • Enable multifactor authentication (e.g., password + one-time code or biometrics) for account logins and transactions.
  • Keep social media accounts private to prevent identity theft, and be cautious about what you share publicly.
  • Be suspicious of offers that seem too good to be true, require immediate action or create fear.
  • Never share sensitive credit union account or personal information in public, unprotected forums.

Protecting yourself after a data breach

Data breaches pose a potential risk to consumers in the form of identity theft, account takeover and fraud
when personal and sensitive information is compromised.

  • Monitor your credit report
    • If any part of your Social Security Number was compromised, review your credit report closely.
    • Consider placing a security (credit) freeze with all major credit bureaus: Equifax, Experian, TransUnion and Innovis.
    • A credit freeze restricts access to your report, preventing lenders from viewing it without a PIN to lift the freeze.
    • Allow extra time for loan or credit approvals with a freeze in place.
    • Some states may charge fees to freeze, temporarily thaw or unfreeze your credit report.
  • Set up fraud alerts
    • If you’re a victim of identity theft, request a fraud alert on your credit report.
    • Financial institutions or lenders must verify your identity before approving any applications when a fraud alert is present.
    • Initial fraud alerts last for 90 days and must be renewed, while extended fraud alerts remain for seven years.
    • Contact one credit bureau to place a fraud alert, and they will notify the other bureaus.
    • Military personnel on active duty can place an active duty alert using the same process.
  • Update your online login and password information
    If any of your online login or password information was compromised, you should:
    • Log in to the member account as soon as possible and change the login and password.
    • Make changes to accounts that use the same logins and passwords for multiple sites.
    • Use strong passwords that are at least 11 characters in length that are case sensitive and include alpha numeric characters and at least one symbol.
    • Use a password checker to ensure you have implemented a strong password.
  • Update your debit or credit card information
    If your debit or credit card information was compromised:
    • Call the credit union and request the old card to be canceled and request a new one.
    • Review account activity and report any unauthorized transactions on a timely basis
  • Update your credit union account information
    If any of your credit union account information was compromised:
    • Review account activity and report any unauthorized transactions.
    • Consider closing the account and request a new one; but be mindful of potential delays and interruptions to any automatic payments or deductions.

Protecting your children and minors

Most minors under the age 18 may not have a credit report available for review. However, children are regular targets of identity theft, and parents should take care to protect their children’s financial future.

  • Warning signs
    • Collection notices or calls products or services in your child’s name.
    • Notice declaring your child owes back income tax, or that their identifying information was used on multiple tax returns.
    • Offers for pre-approved credit in your child’s name. Marketing offers arriving in your child’s name could be a sign that an account was opened at a financial institution).
    • Be careful about sharing your child’s private identifying information especially Social Security Number. If asked to share that information, ask and understand how it will be used.
  • Check your child’s credit
    • Contact each of the three nationwide credit reporting bureaus–Equifax, Experian and TransUnion–and request a credit report in your child’s name. Each has their own process, and it will take time, but it will be worth it.
    • If there is a credit report in your child’s name, request a fraud alert and consider placing a credit freeze.
    • Contact your local law enforcement or Attorney General’s Office to file to report the identity theft and request a copy of any report generated.
    • Contact any financial institution and business listed on your child’s credit report and explain the account was opened because of theft and request it be closed. You may need to produce documentation from the credit bureaus and law enforcement.
    • Keep a detailed list of any phone calls made and/or documents received as you may need to produce them later.

Additional insights and resources

For more information and details on these and other financial security questions, visit these resources.

FULL JUMBO (1800) XXXL (1620) XXL (1496) XL (1280) LG (960) MD (840) SM (600) XS (480)