Don’t allow impersonation scams to steal your assets
Learn how impersonation scams work and ways to protect your money.
Start your claim
How do impersonation scams work?
An impersonation scam occurs when someone poses as a trusted entity to convince you to give money or sensitive details. They might impersonate a government agency, bank, or delivery service. There have even been instances where scammers pretended to be close friends or family members.
How impersonation scams start
Typically, someone posing as a trusted entity, like a bank, police officer, or close friend, will contact you.
How scammers get in touch
These scams typically start with a phone call, text, message, or email. They might also reach out via social media by sending messages or posting content.
How scammers obtain your money
Scammers frequently create a sense of urgency, promote fake investments, or warn that your account is in danger. They might request that you send cryptocurrency to a ‘secure’ wallet or pay fees to confirm a bogus transaction.
Ways to recognize an impersonation scam

Requesting money or sensitive security details
Reliable organisations such as your bank or the police will never request that you send money or disclose sensitive details. If a message seems odd or unexpected, always confirm its authenticity with the organisation first.
Pressure methods
Scammers frequently pressure you to respond right away. Their messages often contain a ‘hook’ to capture your attention. For instance, they might claim your money is in danger and urge you to act fast to protect it.
Spelling mistakes
Genuine organisations typically don’t make grammar or spelling errors in their communications. Be cautious of messages that appear unusual or contain suspicious links.
FAQs
- How to identify impersonation scams
- How to respond once you detect an impersonation scam
- How can I report a website impersonation?
- Which laws must social media platforms follow regarding impersonation?
- Are catfishing and impersonation the same?
- How does online impersonation differ from identity theft?