Financial fra💯ud occurs when someone takes m💜oney or other assets from you through deception or criminal activity. Understand the various types of financial fraud and how you can protect yourself. 

Frequently Asked Questions

  • Who are the victims of financial statement fraud?

    Investors and shareholders are usually the victims of financial statement fraud. This is especially true during an initial public offering (IPO) when investor funds go directly to the company. The Association of Certified Fraud Examiners (ACFE) defines it as "deception or misrepresentation that an individual or entity makes knowing that the misrepresentation could result in some unauthorized benefit to the individual or to the entity or some other party."

  • How do I report financial fraud?

    To report financial fraud call the FBI at 202-324-3000 or visit . You can also contact the local U.S. Attorney's Office where the fraud was committed—there are 93 offices. Plus, some government agencies target particular types of financial fraud, such as the or the Internet Crime Complaint Center.

  • What are the different types of financial fraud?

    Criminals are constantly creating new types of fraud. But some common standards include embezzlement, insurance fraud, ransomware, identity theft, financial statement fraud, bribery, mortgage fraud, tax ꦕevasion, and ponzi schemes.

  • How do I avoid financial fraud?

    There are a few things you can do. Block unwanted calls and text messages. Do not give personal information without doing your research. Never pay anyone with a gift card or wire transfer. And if you were a v💮ictim, report it to the Federal Trade Commission.

  • Is financial fraud a felony?

    It depends. Both the federal government and each state have many laws that criminalize various types of fraud, and each ty💎pe of fraud comes with its own classifications and penalties. Some can be civil wrongs and others can be criminal. They can come with jail time and/or fines.

Key Terms

An older person on a phone while sitting in front of a laptop
The Alarming Rise of 401(k) Scamꩵs and What It Means for Y𒁏our Savings
An older couple sits at a dining table, using a laptop computer with paperwork on the table
Is My 401(k) Safe from Hackers?
$1 bill with half looking fake
How to Spot Fake Money
Ponzi Scheme
Ponzi Scheme: Definition, Examples, and Origins
Two people at a desk with a computer
What Are Unfair, Deceptive, or Abusive Ac🍸ts or Practices (UDAAP)?
Tax Evasion: An illegal practice where a person or entity intentionally does not pay due taxes.
Tax Evasion: Definition and Penalties
Identity Theft: Stealing personal information and credentials to commit fraud.
What Is Identity Theft? Types and Examples
Forensic Audit: An examination and evaluation of a firm's or individual's financial records to use as evidence in a court of law or legal proceeding.
What Is a🐷 Forensic Audit, How Doeܫs It Work, and What Prompts It?
Panama Papers Scandal: A massive leak of financial files that exposed how world leaders, politicians, and other well-known figures avoided paying taxes.
The Panama Papers Scandal: Who Was Exposed and Consequ﷽ences
LIBOR Scandal: A scheme by bankers to manipulate the London Interbank Offered Rate for profit.
What Was the LIBOR Scandal? What Happened and Impacted Compa𝄹nieꦦs
Online Payment and Shopping Concepts
Consumer🙈 Financial Protection Act: What It Meꦬans, How It Works
Man signing contract. Close up. Deal concept
Major Legal Pitfalls of Signatures
A USB key that says Tax Fraud on a 1040
What Is Tax𒀰 Fraud? Definition, Criteria, vs. Tax Avoidance
What Is Carding? How It Works, Prevention Methods, and Examples
♕What Is Carding🤪? How It Works, Prevention Methods, and Examples
Pandora and the Box
What Are the Pandora Papers?
4 Common Social Security Scams and How To Avoid Them
🐬4 Comm🎉on Social Security Scams and How to Avoid Them
Barings Bank: Its Collapse, Acquisition, and Lessons Lear🌌ned
A woman uses a laptop.
Watch Out for These Top Internet Scams
Someone inserting a credit card in an ATM
Credit ෴Card Dump: Definition, Examples, Protecting Against
Credit Card Cloning: Definition and Ways to Protect Youꦅrself
A customer pays with a credit card
7 Ways 𝔉to Protect Yourself Against Credit Card Hacks
PIN Cashing: Definition, How It Works, Examples
Hand entering PIN code at ATM machine.
Skimming: What It Is, How Identity Thieves Use It
Cropped Hand Of Woman Signing On Check Over Table
Altered Check: Definition, Example, Liability
Woman on couch with her head in her hands
I Think I’ve Been Scammed! What Do I Do?
Engraved portrait of Ulysses S. Grant
America's First Financial Fraudsters
U.S. Marshalls in front of apartment building
What Is a Pyramid Scheme? How Does It Work?
Phishing: What It Is and How to Protect Yourself
Void Contract: A formal agreement that is illegitimate and unenforceable from the moment it is created.
Void Contract Definition and What Happens
Mature woman sitting at cafe looking at her cell phone while working on laptop computer.
Can You Erase Your Mug Shot From the Internet?
The Most Counterfeit-Proof Currencies
Jitter
Jitter
A stressed victim of synthetic identity theft on the phone with a bank
Synthetic Identity Theft: What it is෴, How it Works
Graphic image of lines and dots on a grid
Catfishing: What it is, Examples of Financial Fꦬraud
BRITAIN-JERSEY-FINANCE-TAX-POLITICS
Paradise Papers: Overview and History
A customer pays for a purchase with a credit card.
Card-Not-Prese👍nt Fraud: What It Is and How It Works
White-Collar Crime: A nonviolent crime characterized by deceit to obtain or avoid losing money, or to gain a personal or business advantage.
What ꦿIs White-Collar Crime? Meaning, Types, and Examples
Mortgage Fraud: What it Means, How it Works
A pair of concerned forensic accountants review the deposit history of an account where there are repeated deposits of over $10,000 being made.
Structured Transaction: What it Means, ⭕How it Works
financial advisor speaking to two people whose back of heads can only be seen
Credit Freeze
Stethoscope on a table
Medical Identity Theft: What It Is, How It Works
Air Loan: What It Means And How It Works
Credꦆit Monitoring Service: What It Is, How It Works, FAQs
RAM Scraping Attack: What It is, How It Works
Tax Cheat
Tax Cheat: What It Is, How It Works, Examples
Card-Present Fraud: What♛ It Is, How It Works, Example
Mossack Fonesca: What It Is, How It Works
Abusive Tax Shelter
Abusive Tax Shelter: What It is, Identifying one
Couple working at a computer with concerned expressions on their faces
Social Secꦰurity Fraud: What I⛎s It Costing Taxpayers?
A worried woman looks at her laptop while holding a credit card.
Best Iden💦tity Theft 𝔉Protection Services for June 2025
Identity Fraud Reimbursement Program
Identity Fraud Reimbursement Program
Custom Adjustable Rate Debt Structure (CARDS)
Custom Adjustable Rate Debt Structure (CARDS)
Appraisal Fraud: What it is, How it Works
Credit Card Contactless Payment
CredIt Fraud Alert: What🌟 It Is, How It Works, Types
Affiliate Fraud: What it Means, How it Works
A waiter prints a credit card receipt using a handheld card reader for a customer seated at a cafe table.
Truncation: What It Is, How It Works, and Example
Medicare and Medicaid Fraud: Meaning, Examples
A shopper uses a laptop to enter a transaction authentication number for the credit card they are using for the online purchase.
Transactꦗion Authentication Number (TAN): What🤪 it is, How it Works
Online Shoplifting: What It is, ♑How It Works, Types
A distraught couple react after learning that they are not covered for loss after a hurricane damaged their home.
Unauthor🍎ized Ins💛urer: What It is, How It Works, Example