eSafety 101
Published on
Start hereDigital safety basics · Part 3

The Three Things Scammers Usually Want

Quick read

For everyone

Main point

Main point: most scammers want one or more of three things.

  • Your money
  • Your personal information
  • Access to your accounts

Scams can look very different, but the goal is often the same.

If an unexpected message, call, website, or person asks you to pay, share private details, sign in, install something, or provide a security code, slow down and check carefully.

Understanding what scammers want makes it easier to spot what is really happening.

A little deeper

For curious readers

Context

Scams can arrive in many forms: emails, text messages, phone calls, social media messages, fake websites, online ads, marketplace listings, invoices, job offers, investment opportunities, or romance conversations.

The story changes, but the goal is often the same.

1. They may want your money

This could be a fake bill, fake investment, fake online purchase, fake emergency, fake charity, or payment redirection scam.

2. They may want your personal information

This could include your full name, date of birth, address, identity documents, bank details, tax details, medical details, or answers to security questions.

Even small pieces of information can be useful when combined with other details.

3. They may want access to your accounts

This could mean stealing your password, asking for a login code, tricking you into approving a sign-in, or convincing you to install remote access software.

A useful question to ask is:

“What is this person or message trying to get me to do?”

If the answer involves money, personal information, passwords, security codes, or account access, treat the situation carefully.

Technical notes

For confident users

Technical

Scam activity often maps to three broad objectives: financial theft, identity data collection, and account compromise.

Financial theft includes direct payments, card fraud, bank transfer fraud, invoice redirection, investment fraud, cryptocurrency transfers, gift card payments, and mule account recruitment.

Personal information can be used for identity theft, impersonation, targeted phishing, account recovery abuse, credit applications, SIM swap attempts, or future scams. Information that seems harmless in isolation may become valuable when combined with breached data or public social media activity.

Account access can be obtained through credential phishing, password reuse, malware, session theft, OAuth consent abuse, remote access tools, or multi-factor authentication fatigue and code theft.

These categories often overlap. For example, a phishing email may first steal login credentials, then use the account to collect personal information, impersonate the victim, and redirect payments.

A useful risk check is to identify the asset being requested: money, identity data, credentials, device access, or authorisation.

If the request involves one of these assets and was unexpected, it should be verified before continuing.

Disclaimer: All content on this website is general in nature and is not in any way advice. While we strive to ensure the accuracy and relevance of the content, we make no representations or warranties of any kind, express or implied, about the completeness, accuracy, reliability, suitability, or availability with respect to this website or the information, products, services, or related graphics contained on the website for any purpose. Therefore, any reliance on such information is strictly at your own risk.

In no event will we be liable for any loss or damage, including, without limitation, indirect or consequential loss or damage, or any loss or damage arising from loss of data or profits arising out of, or in connection with, the use of this website. Through this website, you can link to other websites that are not controlled by this website. We have no control over the nature, content, and availability of those sites. The inclusion of any links does not necessarily imply a recommendation or endorse the views expressed within them.