Financial fraud occurs when someone takes money or other assets from you through deception or criminal activity. Understand the various types of financial fraud and how you can protect yourself. 

Frequently Asked Questions
  • Who are the victims of financial statement fraud?

    Investors and shareholders are usually the victims of financial statement fraud. This is especially true during an initial public offering (IPO) when investor funds go directly to the company. The Association of Certified Fraud Examiners (ACFE) defines it as "deception or misrepresentation that an individual or entity makes knowing that the misrepresentation could result in some unauthorized benefit to the individual or to the entity or some other party."

  • How do I report financial fraud?

    To report financial fraud call the FBI at 202-324-3000 or visit You can also contact the local U.S. Attorney's Office where the fraud was committed—there are 93 offices. Plus, some government agencies target particular types of financial fraud, such as the U.S. Securities and Exchance Commission or the Internet Crime Complaint Center.

  • What are the different types of financial fraud?

    Criminals are constantly creating new types of fraud. But some common standards include embezzlement, insurance fraud, ransomware, identity theft, financial statement fraud, bribery, mortgage fraud, tax evasion, and ponzi schemes.

  • How do I avoid financial fraud?

    There are a few things you can do. Block unwanted calls and text messages. Do not give personal information without doing your research. Never pay anyone with a gift card or wire transfer. And if you were a victim, report it to the Federal Trade Commission.

  • Is financial fraud a felony?

    It depends. Both the federal government and each state have many laws that criminalize various types of fraud, and each type of fraud comes with its own classifications and penalties. Some can be civil wrongs and others can be criminal. They can come with jail time and/or fines.

Key Terms

Explore Financial Fraud

What Is Unfair, Deceptive, or Abusive Acts or Practices (UDAAP)?
handcuffs sitting on top of US paper currency
Tax Evasion: Meaning, Definition, and Penalties
Computer keys showing "Identity," "Theft," "Fraud," and a masked robber
What Is Identity Theft? Definition, Types, and Examples
Using a forensic audit to determine fraud
What Is a Forensic Audit, How Does It Work, and What Prompts It?
The Panama Papers Scandal: Who Was Exposed & Consequences
Business Woman Thinking Account
What Was the LIBOR Scandal? What Happened and Impacted Companies
Online Payment and Shopping Concepts
Consumer Financial Protection Act
Man signing contract. Close up. Deal concept
Major Legal Pitfalls of Signatures
Hands of anonymous hacker holding credit card in front of a laptop
The Most Common Types of Consumer Fraud
A USB key that says Tax Fraud on a 1040
What Is Tax Fraud? Definition, Criteria, Vs. Tax Avoidance
How To Report A Tax Cheat
Senior woman using mobile phone while holding credit card
What Is Carding? How It Works, Prevention Methods, and Examples
Pandora and the Box
What Are the Pandora Papers? What They Revealed and Importance
4 Common Social Security Scams and How To Avoid Them
4 Common Social Security Scams and How To Avoid Them
Barings Bank: Its Collapse, Acquisition, Lessons Learned
Vector concept of phishing scam, hacker attack and web security
Watch Out for These Top Internet Scams
Cropped Hand Inserting Credit Card in ATM Machine
Credit Card Dump: Definition, Examples, Protecting Against
Credit Card Cloning: Definition and Ways To Protect Yourself
7 Ways to Protect Against Credit Card Hacks
PIN Cashing: Definition, How It Works, Examples
Skimming: What It Is, How Identity Thieves Use It
Cropped Hand Of Woman Signing On Check Over Table
Altered Check: Definition, Example, Liability
Woman holding phone to ear and looking skeptical and suspicious.
I Think I’ve Been Scammed! What Do I Do?
The Pioneers of Financial Fraud
Businessman Building Financial Pyramid From Euro Money
What Is a Pyramid Scheme? How Does It Work?
Phishing: What it is And How to Protect Yourself
Void Contract: A formal agreement that is illegitimate and unenforceable from the moment it is created.
Void Contract Definition and What Happens
Seated man in shirt sleeves, chin in hand, holds and stares at mobile phone
Can You Erase Your Mug Shot from the Internet?
The Most Counterfeit-Proof Currencies
Synthetic Identity Theft
Graphic image of lines and dots on a grid
Paradise Papers Definition
A customer pays for a purchase with a credit card.
What Is Card-Not-Present Fraud?
Insider Trading
What Is White-Collar Crime? Meaning, Types, and Examples
Mortgage Fraud
Structured Transaction
Form 211: Application for Award for Original Information Definition
financial advisor speaking to two people whose back of heads can only be seen
Credit Freeze
Stethoscope on a table
Medical Identity Theft
Air Loan Definition
Credit Monitoring Service Definition
RAM Scraping Attack
Now You Can Freeze Your Credit File for Free
Tax Cheat
Tax Cheat
Card-Present Fraud
Mossack Fonseca
Abusive Tax Shelter
Abusive Tax Shelter
A gloved hand reaches for a Social Security card and ID card.
Social Security Fraud: What Is It Costing Taxpayers?
Identity Fraud Reimbursement Program
Identity Fraud Reimbursement Program
Custom Adjustable Rate Debt Structure (CARDS)
Custom Adjustable Rate Debt Structure (CARDS)
Appraisal Fraud
Credit Card Contactless Payment
Credit Fraud Alert
Affiliate Fraud
Opt Out Right
Medicare and Medicaid Fraud
Transaction Authentication Number (TAN)
Online Shoplifting
Unauthorized Insurer