Skip to main content

Recognising Fraudulent Communications

Darja avatar
Written by Darja
Updated over a week ago

How do fraudsters typically try to contact me?

Fraudsters often use deceptive communication methods known as social engineering:

  • Phishing: Fraudulent emails and websites designed to steal data by masquerading as reputable entities like banks.⁴

  • Vishing (Voice Phishing): Fraudulent phone calls that trick you into revealing personal information. Attackers may spoof caller IDs or use advanced techniques like deepfake technology.⁴

  • Smishing (SMS Phishing): Fraudulent text messages intended to trick you into revealing data or downloading malicious software.⁴

What are the key indicators that a communication might be fraudulent?

Be suspicious of communications that:

  • Create Urgency or Fear: They often demand immediate action to prevent negative consequences (e.g., threatening to close bank accounts, legal action, or service cancellation).

  • Contain Errors: Frequent spelling, grammar, or logic errors can be significant red flags, as these messages may originate from non-native speakers or bad actors operating from abroad.

  • Are Unexpected: Messages from unknown senders with unexpected offers, information, or demands that seem out of place should raise immediate suspicion.

  • Have Disguised Links: In emails, hovering over links can reveal if they point to an irregular or unexpected website address that differs from the purported sender's legitimate domain. Fraudulent links may have slight variations in names, numbers, or characters.

  • Demand Personal Information: Be highly suspicious of unexpected or unknown sources demanding personal information, passwords, or payments, especially if the request seems out of context. Legitimate financial institutions will never ask for personalised security features like PINs or passwords over the phone or email.

  • Lack of Authentication Certificates: For websites, the absence of proper authentication certificates (indicated by "https://" in the URL and a padlock icon) is a red flag.

  • Contain Unusual Attachments: Email attachments may be in strange formats or have unusual titles.

Relevant sources

  1. FRAUD PREVENTION GUIDELINES, accessed on June 10, 2025, https://www.lb.lt/uploads/documents/docs/45487_33a75af37e84f861c6009f2cba304e9a.pdf

  2. 8 Types of Financial Fraud to Look Out for in 2025 - Sumsub, accessed on June 10, 2025, https://sumsub.com/blog/8-types-of-financial-fraud-to-look-out-for-in-2025/

  3. Phishing, Smishing, and Vishing..Oh My! | University Information Security Office, accessed on June 10, 2025, https://security.georgetown.edu/csam-2020/phishing-smishing-and-vishing-oh-my/

  4. Phishing Vs Smishing Vs Vishing: 6 Critical Differences - SentinelOne, accessed on June 10, 2025, https://www.sentinelone.com/cybersecurity-101/threat-intelligence/phishing-vs-smishing-vs-vishing/

  5. Information on fraud I The Bank of Lithuania, accessed on June 10, 2025 https://www.lb.lt/lt/sukciavimas

Useful links

  1. Knowledge test, educational material and general information on Fraud prevention, shared by the Bank of Lithuania: https://www.lb.lt/lt/sukciavimo-prevencija.


If you have additional questions and need our help, feel free to contact our support team via the chat in the bottom right corner.

Did this answer your question?