This guide focuses on login-related threats: fake login pages, phishing messages, and “digital scans” (QR-code and fake security-check scams). Use it to spot real-world warning signs and follow step-by-step protection workflows.
Quick Start: Safe Login Workflow
- Open the official mobile app or type the website address yourself (don’t use message links).
- Confirm the exact domain before entering credentials.
- Use MFA and treat unexpected MFA prompts as a red flag.
- If anything feels off, stop and verify via official contact channels.
On This Page
Online Login Scams
Back to topAttackers create lookalike login pages to steal credentials, MFA codes, or security questions. The page can appear after clicking a link, scanning a QR code, or searching a misspelled domain.
- A familiar logo and layout, but the address bar shows a wrong or strange domain.
- A “verify your account” step that asks for an MFA code immediately.
- Unusual errors that pressure you to retry, reset, or “confirm” details.
- Domain mismatch (extra words, hyphens, odd subdomains, or a different TLD).
- Unexpected redirects before the login page appears.
- Spelling/grammar issues, generic greetings, or mismatched branding.
- Prompts that request full SSN, PIN, or multiple MFA codes in a row.
- Stop typing credentials. Close the tab/app if the page seems suspicious.
- Open the official app or type the bank’s official domain manually.
- Log in only after verifying the exact domain and a secure connection.
- Enable MFA (authenticator app preferred when available) and add device alerts.
- If you entered details, change your password immediately and contact the institution using the number on your card.
Phishing Scams
Back to topPhishing messages impersonate customer support or fraud teams and try to get you to click a link, reveal an MFA code, or call a fake support number.
- Fraudsters send email/SMS with a “security alert” and a login link.
- The link leads to a fake site or triggers a credential/MFA capture flow.
- Some attacks push you to call a fake number (voice phishing).
- Sender address doesn’t match the organization (look beyond the display name).
- Links go to shortened URLs, misspelled domains, or odd subdomains.
- Urgency: “act in 15 minutes”, “account will be closed”, “refund expiring”.
- Requests for OTP/MFA codes, password resets you didn’t initiate, or remote access tools.
- Don’t click message links. Don’t reply with personal info or codes.
- Open the official app/site by typing the address yourself.
- Check account alerts inside the app (not inside the email).
- If the message claims fraud, call the official number from your card or statement.
- Report and delete the message; enable MFA and login alerts.
Digital Scans
Back to top“Digital scans” often appear as QR codes or fake “device/security scans” that lead to credential theft, malicious downloads, or tech-support fraud. Treat unexpected scan prompts as suspicious by default.
- QR codes that open lookalike login pages (“quishing”).
- Popups claiming “virus detected” that push downloads or a hotline number.
- Attachments or “scan results” that install remote-access tools.
- QR code from an unexpected source (flyer, message, pop-up) asking you to “log in to verify”.
- Browser or ad popups that demand immediate action and block navigation.
- Requests to install “support” apps, profiles, or certificate files.
- Warnings that don’t match your device settings or the official app store.
- Don’t scan unknown QR codes for login. Use the official app or typed address instead.
- Close suspicious popups; don’t call numbers shown in popups or install “fix” software.
- Keep your OS/browser updated and use official app stores only.
- Enable device-level protection (screen lock, biometric, auto-updates).
- If you installed something, disconnect from the internet and seek trusted support; change passwords from a known-clean device.
Printable Checklist
Back to topUse this as a quick pre-login and post-login safety checklist. Print it or download it for later.
Safe Login Checklist
If you entered credentials on a suspicious page: change your password immediately, enable MFA, review recent activity, and contact the institution via an official phone number.