What to Do If a Scammer Contacts You: A Step-by-Step Guide
The moment you realize a scammer has contacted you, panic can set in. Your first instinct might be to respond, ask questions, or try to report them. But in those critical first moments, taking the right steps can prevent significant financial loss and protect your personal information.
Whether you've received a suspicious text message, email, or phone call, there's a proven sequence of actions you should take. This guide walks you through exactly what to do—from the moment you suspect something is wrong to protecting yourself going forward.
Step 1: Use Scamly to Verify If It's Actually a Scam
Why this is your first step:
Your instinct might tell you something is off, but instinct alone can be wrong. Before taking further action, you need confirmation. Scamly provides instant verification, giving you a clear answer about whether you're dealing with a scammer or a legitimate contact.
How to use Scamly immediately:
For text messages or emails:
- Take a screenshot of the message
- Open Scamly and upload the screenshot
- Wait for the AI analysis (usually seconds)
- Get a clear verdict: scam or legitimate
For phone calls:
- If you're still on the call, note any details: the caller's name, what organization they claim to represent, what they're asking for, and any phone number they provide
- After ending the call, you can describe the situation to Scamly's AI chat assistant
- Ask questions like: "I received a call claiming to be from [organization]. They asked for [information]. Is this a scam?"
- The AI provides guidance based on the details you provide
For social media messages or dating app conversations:
- Screenshot the suspicious message or profile
- Upload to Scamly
- Get instant analysis of whether the interaction shows scam indicators
Why this matters:
Scamly's analysis is objective and instant. You don't have to wonder, worry, or waste time analyzing the message yourself. You get a definitive answer that guides all your subsequent actions.
Pro tip: If Scamly flags it as a scam, you're dealing with a criminal. This knowledge completely changes how you should respond. You can stop engaging, block the contact, and report them without any guilt or uncertainty.
Step 2: Stop All Communication Immediately
Once you've confirmed it's a scam through Scamly:
- Do not respond to the message, email, or call
- Do not ask questions like "Who are you really?" or "Is this a scam?"
- Do not engage in any way that acknowledges the contact was received
- Do not click any links the scammer has provided
- Do not download any attachments they've sent
- Do not call any phone numbers they've given you
Why this matters:
Scammers want engagement. Responding—even to argue or question them—tells them your contact information is active and you're paying attention. This makes you a more valuable target. It also gives them information: they learn what kinds of messages get responses, what tactics work on you, and that your account is monitored.
What happens when you stop responding:
Scammers work on statistics. They send thousands of messages and target those who respond. If you don't respond, they'll move on to someone else. Silence is your superpower.
However, there are exceptions:
If you've already provided information, sent money, or authorized transactions, don't stay silent. Move to Step 3 immediately.
Step 3: If You've Already Provided Information or Money, Act Quickly
If you've given them personal information:
- Passwords or account credentials: Change your passwords immediately. Contact the organization (your bank, email provider, etc.) using an independently verified phone number. Tell them your account may be compromised and ask them to check for unauthorized activity.
- Social Security number, date of birth, or financial information: Place a fraud alert with the three major credit bureaus (Equifax, Experian, TransUnion). This prevents scammers from opening new accounts in your name. Consider a credit freeze for additional protection.
- Credit card information: Contact your credit card company immediately and report the fraud. They may cancel your card and issue a new one.
If you've sent money:
- Wire transfer or cryptocurrency: Contact the sending service immediately. While money sent this way is often unrecoverable, act as quickly as possible. Some services can freeze accounts if contacted immediately.
- Gift card codes: Contact the gift card provider (iTunes, Amazon, Google Play, etc.) immediately with the gift card details. If the codes haven't been used, there's a chance they can be recovered.
- Check or bank transfer: Contact your bank and report the fraud. They may be able to reverse the transaction, especially if done immediately.
- File a report: Report the fraud to the FTC at ReportFraud.ftc.gov. This creates an official record and helps authorities track scam patterns.
Time is critical: The faster you act, the better your chances of recovering money or preventing further theft.
Step 4: Document Everything
Even if you're not pursuing legal action, documentation is valuable:
-
Save all communications: Don't delete the message, email, or call details. Screenshot everything. This provides evidence if you report the scam.
-
Write down details: If it was a phone call:
-
What time did they call?
-
What phone number did it show on caller ID?
-
What was the caller's name?
-
What organization did they claim to represent?
-
What exactly did they ask for?
-
What did they say would happen if you didn't comply?
-
Note your response: What did you do? Did you provide any information? Did you send money? How much?
-
Gather supporting information: Bank statements showing unusual transactions, emails confirming your contact with the bank or authorities, etc.
Why documentation matters:
If you need to dispute fraudulent charges or file an insurance claim, documentation is essential. It also helps authorities prosecute scammers and warn other potential victims.
Step 5: Block the Contact and Remove Them From Your Life
Once you've verified it's a scam and documented details:
- Block the phone number on your phone (most phones have a block feature in the phone app)
- Block the email address (most email providers have block/spam features)
- Block the social media account (dating apps, Facebook, Instagram, and other platforms have block features)
- Mark as spam (in email, marking as spam helps train filters to catch similar messages)
- Remove from your contacts if they were there
Why this matters:
Blocking prevents ongoing contact. Scammers sometimes persist if they think there's a chance you'll respond. Blocking makes it clear the conversation is over.
However, don't block before reporting:
If you're planning to report the scam to authorities, don't block immediately. Let them help you preserve the contact information. After reporting, then block.
Step 6: Report to Relevant Authorities
Reporting serves multiple purposes: it creates an official record, helps authorities identify scam patterns, and prevents the scammer from targeting others using the same tactics.
Report to the appropriate authority based on the scam type:
For any type of scam:
- Federal Trade Commission (FTC): Report at ReportFraud.ftc.gov. The FTC aggregates reports and uses them to identify scam patterns and track criminal enterprises.
For specific scam types:
- Tech support scams: Report to your device manufacturer (Apple, Microsoft, etc.) and to the FTC
- Government impersonation: Report to the specific agency being impersonated. If it's IRS impersonation, report to the IRS. If it's Social Security, report to Social Security.
- Investment fraud: Report to the SEC (Securities and Exchange Commission) at sec.gov/fraud
- Romance or dating app scams: Report to the dating platform where you met them
- Bank impersonation: Report to your bank and to the IC3 (Internet Crime Complaint Center) at ic3.gov
- Cryptocurrency fraud: Report to the crypto exchange and to the FBI's IC3
- Online retailer fraud: Report to the retailer and to the FTC
Local law enforcement:
For significant financial losses (typically $1,000 or more), file a report with your local police department. This creates an official crime report, though be aware that local police may have limited resources for cybercrimes. The report is still valuable for documentation purposes.
Why reporting matters:
Individual reports might seem insignificant, but aggregated data helps authorities identify scam rings, track criminal enterprises, and develop enforcement strategies. Your report helps protect others.
Step 7: Review Your Account Security and Online Presence
If a scammer contacted you, you want to ensure they haven't compromised your accounts or accessed your personal information:
Change your passwords:
- Change passwords for all important accounts: email, banking, social media, work accounts
- Make passwords strong: at least 12 characters with numbers, symbols, and letters
- Use unique passwords for each account (consider a password manager)
Review account activity:
- Check your bank and credit card statements for unauthorized transactions
- Review email login history and remove unrecognized devices
- Check social media login activity and remove unauthorized sessions
- Review security questions and backup email addresses
Enable two-factor authentication:
- Activate 2FA on critical accounts: email, banking, social media
- Use authenticator apps rather than text messages when possible (more secure)
Monitor your credit:
- Check your credit report for unusual activity
- Consider credit monitoring services
- Set up fraud alerts with credit bureaus
Update privacy settings:
- Review social media privacy settings to limit what information is publicly visible
- Adjust who can contact you on social platforms
- Consider limiting information you share publicly
Step 8: Stay Alert and Educate Yourself
A scammer contacting you is a warning sign that you're on their radar. Take this as an opportunity to strengthen your defenses:
Stay vigilant:
- Be more cautious about unsolicited contacts going forward
- Use Scamly proactively when you're unsure about any contact
- Remember that legitimate organizations won't create urgency or pressure you into quick decisions
Educate yourself:
- Read about common scam tactics so you recognize them faster
- Learn how to verify claims independently
- Understand which information should never be requested via unsolicited contact
Help others:
- Share your experience with family and friends (without shame—scammers are professionals)
- Warn them about the specific tactic used on you
- Help them understand why you fell for it (to reduce the judgment they might feel if they fall for it)
Use Scamly going forward:
- Make Scamly part of your routine for any suspicious contact
- Screenshot and verify when something doesn't feel quite right
- Use the chat feature for complex situations you're unsure about
Complete Step-by-Step Response Plan: Quick Reference
Here's a quick reference if you're in the moment:
Immediately upon receiving a suspicious contact:
- Don't panic. You have time to think and respond carefully.
- Take a screenshot of the message or write down details from the call
- Open Scamly and upload the screenshot or describe the contact
- Wait for verification. Scamly tells you if it's a scam.
If Scamly confirms it's a scam:
- Stop all communication. Don't respond. Don't engage.
- Block the contact. Remove them from your ability to receive further messages.
- Document everything. Save the communications and notes about the interaction.
- Report to authorities if you provided information or sent money.
If you provided information or money:
- Act immediately. Contact your bank, credit card company, or relevant service to report fraud.
- File official reports. Report to the FTC and relevant agencies.
- Monitor your accounts for unauthorized activity.
- Review security and change passwords.
Going forward:
- Stay alert to similar contacts.
- Use Scamly proactively for any suspicious contact in the future.
Real-World Examples: How This Plays Out
Scenario 1: Suspicious Email
You receive an email from "your bank" asking you to verify your account information. Something feels off. You screenshot the email and upload it to Scamly. Scamly flags it as phishing. You stop responding, block the email address, mark it as spam, and report it to the FTC. You're protected.
Scenario 2: Romance Scam
You've been chatting with someone online for weeks when they ask for money for an emergency. Before sending anything, you describe the situation to Scamly's AI chat. The assistant recognizes romance scam indicators and suggests verifying their identity through video call. When they refuse, you know it's a scam. You block them and report to the dating platform. You avoided financial loss.
Scenario 3: Tech Support Call
Someone calls claiming to be from Microsoft saying your device has a virus. Before clicking anything, you describe the call to Scamly. Scamly identifies it as a tech support scam. You hang up without providing any information. You don't download anything. No damage done.
Scenario 4: Investment Opportunity
You receive an email about a guaranteed investment opportunity. Before responding or sending money, you screenshot it and upload to Scamly. Scamly flags it as an investment scam. You report it to the SEC and block the contact. Your money stays in your account.
The Critical First Step: Verification
All of this guidance comes down to one critical point: The moment you receive a suspicious contact, verify it with Scamly before taking any other action.
This one step—taking 30 seconds to screenshot and upload—can prevent:
- Thousands of dollars in financial loss
- Identity theft and fraud
- Emotional manipulation and heartbreak (in romance scams)
- Malware installation (in tech support scams)
- Months of dealing with fraud recovery
Scamly is specifically designed for this moment. It's your first line of defense when you suspect something is wrong. Use it immediately, and let the AI analysis guide your subsequent actions.
Conclusion
If a scammer contacts you, the steps are clear:
- Verify with Scamly - Confirm it's actually a scam
- Stop communicating - Don't engage further
- Protect yourself - If you've already provided information or money, act quickly
- Document everything - Record details for reporting and evidence
- Block and report - Remove them from your life and report to authorities
- Strengthen security - Review accounts and change passwords
- Stay vigilant - Use Scamly proactively going forward
The most important step is the first one: Use Scamly immediately to verify whether you're actually dealing with a scammer. That verification guides everything that follows.
Remember: scammers are professional criminals with sophisticated tools. You don't have to match their sophistication—you just need to use Scamly to identify them and then follow these steps to protect yourself.
You've been contacted by a scammer. Now you know what to do.