FDIC-Insured - Backed by the full faith and credit of the U.S. Government

Resources

Scams

A scam is a dishonest scheme to gain money or possessions from someone fraudulently. Below are some of the most common types of scams to watch out for. Each has multiple variations, but the following information provides a general overview.

  • Charity Scam

    A charity scam is an attempt to deceive individuals into donating money to fraudulent organizations, especially during the time of disaster. Always verify the legitimacy of the organization seeking donations.

  • Employment Scam

    An employment scam happens when an individual is asked to be a secret shopper, or when they reply to a fake job opportunity online that offers great benefits and compensation while working minimal hours. Victims engage with the scammer and give out personal and financial information and pay upfront fees as part of the “application process,” while never getting an actual job.

  • Gift Card Scam

    A gift card scam is when an individual is asked to pay for something using one or more popular gift cards, such as an Amazon gift card. The scammer asks for the card numbers and PINs, which allows them instant access to the money on the gift cards, and the individual receives nothing in return.

  • Grandparent Scam (aka Family or Emergency/Person-in-Need Scam)

    The most common grandparent scam is when a grandparent receives a call that their grandchild is supposedly in a foreign country and was arrested, in an accident, or in some type of financial crisis and needs money sent to them right away. They’re often told not to tell anyone else about the situation.

  • Bank Imposter Scam

    A bank imposter scam is when a scammer impersonates a bank employee or creates a fake bank to steal an individual’s personal and financial information. They may call, text, or e-mail using spoofed contact details that look legit.

  • Government Imposter Scam

    A government imposter scam is when a scammer impersonates a trusted U.S. government agency official (Social Security Administration, Medicare and Medicaid, Department of Health and Human Services, Internal Revenue Service, Law Enforcement, etc.). The scammer threatens to arrest an individual or seize their bank accounts for crimes they’ve supposedly committed, such as tax evasion. The scammer can also claim that an individual’s Social Security number is suspended due to suspicious activity. In any case, the scammer demands payment in order to resolve the issue with the government.

  • Investment Scam (aka Cryptocurrency "Pig Butchering" Scam)

    An investment scam is a virtual currency scam. The scammer will “fatten” an individual up like a pig by contacting them through text messaging or social media; sometimes claiming it was by accident. The scammer claims to be an investor, eventually gaining trust, and introduces the individual to a lucrative investment opportunity where they invest in virtual currency. The scammer will continue to advise the individual with their investment, but eventually all communication will stop, and the scammer will have taken their funds, therefore “butchering” them by stealing their assets.

  • Lottery or Sweepstakes Scam

    A lottery or sweepstakes scam happens when an individual receives a phone call or email claiming they’ve won a lottery or sweepstakes. Typically, an individual receives messages that state in order to collect the winnings, they must pay taxes or fees beforehand. Not only are these calls and emails fake, but participating in a foreign lottery violates Kansas and federal law. The scammer will keep any money the individual sends them, and they can make unauthorized withdrawals from bank accounts or charges to credit cards if financial information is provided.

    *Someone cannot win something if they didn’t enter!

  • Romance Scam

    A romance scam occurs when an individual meets a “friend” online from another state or, most likely, another country and receives a message saying that the “friend” was arrested, in an accident, or in some type of financial crisis and needs money sent right away. Money is usually sent by a wire transfer or with cryptocurrency. The scammer usually claims that they will meet up with the individual, but something always comes up where they need more money and never end up meeting.

  • Tech and Customer Support Imposter Scam

    A tech and customer support imposter scam is when a scammer impersonates a customer support rep from a well-known virus or malware company. The scammer asks for remote access to an individual’s computer or device to diagnose or fix the problem. Once the scammer has access to an individual’s computer or device, they may install malware, steal personal and financial information, and/or transfer money from an individual’s accounts without their knowledge. After the problem is “fixed,” the scammer will claim that there was a mistake and demands that money is sent to correct the mistake.

  • Timeshare Scam

    A timeshare scam often targets individuals who are looking to buy, sell, or exit their timeshare contracts. Scammers are usually aggressive and claim to help owners exit their timeshare contracts but require upfront fees and never actually complete the sale.

  • Unpaid Toll Scam

    An unpaid toll scam occurs when an individual is sent a message claiming they have an unpaid toll balance, usually impersonating electronic toll booth operators. The victim must pay the toll balance immediately or seek consequences.

  • Utility Scam

    A utility scam is when a scammer calls claiming to be a representative from a utility company and threatens to cancel an individual’s service if personal and financial information is not provided.

  • Scam Mitigation

    Learn more by visiting the Federal Reserve Financial Services’ Scams Mitigation Toolkit.

  • Reporting Scams

    • If you are a victim of a scam, report it to the Federal Trade Commission at ReportFraud.ftc.gov
    • Internet crime victims can report complaints to ic3.gov
    • Also, contact your bank, local law enforcement and the Attorney General’s office.

  • How to Protect Yourself from Scams
    • Do not click on links or respond to e-mails, social media requests, texts, or phone calls that seem suspicious or from unknown senders.
    • Never give out personal or financial information through e-mails, social media requests, texts, or phone calls.
    • Never allow someone access to your computer or device unless you are absolutely sure you know who you are giving access.
    • Do not pay someone with gift cards.
    • Never pay money to get money.
    • If it sounds too good to be true, it is!
    • It is ok to say NO!

Check Fraud

Check fraud is the illegal use of checks to obtain money or goods, often involving alteration, forgery, or the use of counterfeit checks. Below are some of the most common types of check fraud to watch out for.

  • Altered Check

    A criminal steals a check and alters the payee and/or the amount on the check.

  • Counterfeit Check

    A criminal creates a check using stolen or fake account information.

  • Forged Check

    A criminal forges the signature on a check (an unauthorized signature).

  • Mail-Related Check Fraud

    A criminal steals multiple checks from mail receptacles, such as the blue USPS blue collection boxes or a mailbox to facilitate check fraud.

  • Check Fraud Mitigation Toolkit

    Learn more by visiting the Federal Reserve Financial Services’ Check Fraud Mitigation Toolkit.

  • Reporting Check Fraud

    If you need to report fraud on your account, contact your bank and local law enforcement. 

  • How to Protect Yourself from Check Fraud

        • Order checks with security features.

        • Don’t leave mail in your mailbox.

        • Use the mail slots inside the Post Office.

        • Sign up for automated payments.

    Identity Theft

    Identity theft occurs when someone uses your personal information (such as your name, credit card number, driver’s license number, or other personal identifying information) to commit fraud or other crimes.

    • What is phishing?

      Phishing is an email scam that attempts to trick consumers into revealing personal information through fake web sites or in a reply email. Usually the emails and websites use familiar logos to deceive consumers into thinking the sender or website owner is a company they know or a government agency.

      How does it work?

      In the typical phishing scam, you receive an email supposedly from a company or financial institution you may do business with. The email describes a reason you must “verify” or “resubmit” confidential personal information – such as bank account, credit card numbers, Social Security numbers, passwords and personal identification numbers – using a return email, a form on a linked website or a pop-up message with the name and the logo of the company. It may state that your bank account information has then been lost or stolen; that limits may be imposed on your account unless you provide additional details. If you comply, the thieves hiding behind the seemingly legitimate website or email can use the information to make unauthorized withdrawals from your bank account, pay for online purchases using your credit card, or even sell your personal information to other thieves.

    • What is spyware?

      Spyware is a computer software program that gathers information about a computer user, and in most cases, without the user’s knowledge or informed consent. Spyware applications are inadvertently installed when visiting a website or clicking a hyperlink.

      The software can gather and transmit personal information (email addresses, passwords, credit card numbers, PINs) to another organization or person and use it illegally.

      It can also cause problems with computer resources causing PCs to run slowly or erratically.

      How do I protect my PC from spyware?
      To prevent the spyware installation without your consent, remember not to download any freeware onto the computer.

      You may already be using anti-virus software, but to be effective, the software should be updated regularly with the latest virus definition files.

      Change your online banking password regularly to protect your personal data.

      Always run anti-virus and anti-spyware software before you download other programs or open e-mails.

      If you think that you have installed such software in your PC, you may wish to seek professional IT advice on steps to be taken to uninstall the software from your PC.

      A great source of information about how to protect your confidential personal information is the Federal Trade Commission’s Consumer Online Security site (https://www.consumer.ftc.gov/topics/privacy-identity-online-security)

      If you suspect or have confirmed that your personal information has been lost or stolen, the Federal Trade Commission recommends four steps to get you on the road to recovery.

      Step 1: Contact Your Financial Institution

      1. Report lost or stolen financial information to the appropriate institution. Consult with them to determine if the account needs to be closed or have security passwords incorporated to prevent unauthorized access and/or maintenance to your account.
      2. If you do not recognize a financial transaction, or suspect fraud activity, immediately call Farmers State Bank at 785.457.3316 (Westmoreland), 785.539.9002 (Manhattan), 785.889.4211 (Onaga) or the appropriate financial institution.

      Step 2: Protect Your Finances & Identity

      1. Contact the fraud victim assistance departments of each major credit reporting bureau and obtain a copy of your credit report, which is free to ID theft victims – analyze the report and identify accounts you have not established.
      2. Request that your file be flagged with a “fraud alert tag” and a “victim’s statement,” which will limit the thief’s ability to open new credit accounts.
      3. If you currently have ID Theft insurance you will be required to file a police report in order to place a fraud alert on your profile which will remain in place for seven years.
      4. If the stolen information includes your driver’s license or other government-issued identification, contact the agencies that issued the documents and follow their procedures to cancel a document and get a replacement. Ask the agency to “flag” your file to keep anyone else from getting a license or another identification document in your name.
      5. Monitor your financial statements on a monthly basis and report unauthorized activity to the appropriate financial institution immediately.
      6. Contact one of the major credit reporting companies below. Once done, the information will be shared with the remaining organizations.
      Equifax 800.525.6285
      www.equifax.com
      Experian 888.397.3742
      www.experian.com
      TransUnion 800.680.7289
      www.tuc.com

      Step 3: File a Police Report
      You may to need a file a police report in the town or jurisdiction where the theft occurred to dispute unauthorized charges and for any required claims.

      Step 4: File a Report with the FTC
      Fill out an online ID Theft complaint with the Federal Trade Commission at www.ftc.gov/idtheft or call the Federal Trade Commission’s ID Theft Clearinghouse toll-free at 1.877.ID.THEFT.

      • By sharing your theft complaint with the FTC, you will provide important information on ID theft cases that can be used by law enforcement officers to find patterns, track down, and catch criminals.
    • Reporting Identity Theft
      • If you are a victim of identity theft, report it to the Federal Trade Commission at IdentityTheft.gov. 
      • Also, contact your bank, local law enforcement, and the three major credit bureaus.
    • How to Protect Yourself from Identity Theft
      • Never email any personal information unless it is via secure email.
      • Don’t give out your Social Security or account numbers unless you initiate the call.
      • Review all your monthly financial statements.
      • Shred trash with sensitive information including convenience checks and credit card offers you get in the mail.
      • Use direct deposit to have recurring checks you receive deposited directly to your bank account.
      • Don’t leave printed receipts behind at ATMs or gas pumps.
      • Don’t put credit card or other personal information on a website that isn’t secure.

    QR code Cybersecurity & Safety

    A QR (Quick Response) code is a machine-readable barcode consisting of black and white squares, often used to store URLs, text, or data. When scanned by a smartphone camera, it acts as a digital shortcut, providing immediate access to websites, digital menus, or apps, offering more versatility and storage than traditional barcodes.

    • Is a QR code safe?

      A QR code is inherently safe, as they cannot store executable programs or apps. The files or destinations they point to, however, should always be verified for safety and authenticity.

    • Can a QR code be hacked?

      A QR code cannot be hacked directly. However, QR codes can be covered with stickers containing fake, malicious QR codes. This process is known as “Quishing.” It is important to verify both the authenticity of the QR Code, and the data it points to before opening.

    • What is “Quishing?”

      Hackers replace legitimate, public-facing QR codes (e.g., on parking meters, restaurant menus, or scooter rentals) with their own, leading you to a fake website that steals login credentials or credit card data. Always exercise caution if it appears a QR code has been tampered with.

    • How to Protect Yourself When Scanning QR codes

      You can protect yourself by following these simple steps: 

      • Always check for stickers or tampering before scanning a QR code. 
      • Use caution with QR codes on posters, flyers, or unattended kiosks, especially if they are in unexpected places.
      • Never scan a code from an unexpected email or text message.
      • Verify the URL is safe and accurate. You can use Google Safe Browsing to check suspicious URLS.
    • Will Farmers State Bank ever ask for log-in credentials, payment information, or other personally identifiable information via a QR code?

      No, FSB will never ask you for log-in credentials, payment information, or other personally identifiable information via a QR code Portal.