Skip to main content Skip to main menu Skip to footer

Telecommunications impersonation

Telecommunications impersonation

Decrease Text Size Increase Text Size

Page Article

Fraudsters are impersonating representatives from well-known telecommunications companies. Ultimately, the goal of the fraudsters is to try to trick their victims into giving up money, personal information, or access to their accounts and devices.

Here's an example of how it works and what to look out for:
  • You receive a phone call that appears to come from a major telecom company. The caller identifies themself as a company representative and tells you that you just need to answer a few questions to confirm your identity and account information. After collecting those details, the caller tells you that they have all the information they need. In reality, you have given a fraudster the information they need to access your accounts.

Things you can do to protect yourself:

  • Say no to unsolicited calls or emails. If you’re unfamiliar with the caller or sender, proceed with caution or avoid it altogether, even if they have information to try to convince you of legitimacy. If something doesn’t feel right, hang up immediately and call the company using a trusted phone number, such as the number on a legitimate company website.
  • Never give out any personal information on unsolicited contact, especially non-publicly available information such as account numbers, passwords, PINs or credit card numbers.
  • If a deal sounds too good to be true, it probably is – be skeptical.
  • Slow down and avoid any “urgent” requests. Be mindful of responding too quickly with personal or financial information.
  • Review emails and URLs carefully. Emails and websites can look like they are from trusted companies, but if you review the email and URL carefully, you’ll notice a small difference like one extra letter, a period, or a .net instead of .com.
  • Be extremely wary of anyone requesting gift cards, money orders, or wires, as telecommunication companies don’t accept those forms of payment.
  • Never provide remote access to your computer or mobile device.

What to look out for:

  • Requests for you to provide or confirm any kind of personal or financial information.
  • Requests to complete web forms with your personal information or to provide your signature on an agreement or contract.
  • Requests that involve visiting a website, downloading an app, or providing remote access to your device.
Watch for emails/texts/phone calls:
  • With generic greetings.
  • From unfamiliar or suspicious sources with fake links (hover over them to ensure they are going to the legitimate website).
  • That contain grammar or spelling errors.



Page Footer has no content