locate an office

offices near you

office near you

Cybersecurity

How to spot impersonations, scams and deepfakes

As cyber threats and fraud scams become more sophisticated, it is increasingly difficult for individuals to determine if a request coming via an email, text, phone call or even video call is authentic. Is that caller on the other line who they say they are? Is the request real? Deepfake video content is proliferating across the internet. No matter what form of communication, these well-crafted social engineering scams are designed not only to gain access to personal information, but to reap potential financial gain. 

Cyber threats and fraud scams annually drive record monetary losses due to their sophisticated nature—in 2023, they amounted to over $12.5 billion in losses, a 22% increase over 2022.1

  • Fraudsters are leveraging artificial intelligence (AI) to create audio and video clips, as well as images that appear to be real, usually of a trusted person. These are known as “deepfakes.” In recent news, an individual who believed he was speaking to senior leaders within his organization via a video call was deceived into sending a fraudulent payment, later discovering these were deepfakes that fraudsters constructed to impersonate the employees.
  • Impersonations of bank employees or government officials are increasing, and can often sound very convincing. These scammers demand immediate payment or action to avoid further impacts, which can dupe individuals into inadvertently sending money to a fraudulent account.
  • Extortion scams, often in the form of phone calls that sound like family members under duress, exploit an individual’s emotional state to get a payment or sensitive information.

As these deepfakes and other impersonation scams may be difficult to detect, it’s important to pause before taking action that involves making payments. Contact a trusted person to talk it through before reacting. Establish a protocol of checking into matters by validating requests and individuals when conducting business, both personally and professionally. Leverage some of the best practices below to help you protect yourself and your accounts:

  • Do not assume a phone call, email, text message or video clip is genuine, as phone numbers can be spoofed to appear legitimate, especially if the individual is requesting sensitive information or making high-pressure demands.  
  • Validate a caller’s identity. If you receive a call from someone claiming to represent a certain organization and you are unsure, hang up and call an official number, such as on the company’s official website, the back of your credit/debit card or your latest bank statement to confirm the call’s legitimacy.
    • If a caller states they are from J.P. Morgan, it is okay to hang up and contact your J.P. Morgan team member directly. Note: J.P. Morgan will never ask you to provide a one-time passcode. 
    • If someone asserts they are a government official on a call or in an email, avoid being intimidated, and validate via another means of communication, such as calling the phone number on their official website. 
    • Even if it sounds like a family member is in trouble, call a trusted individual before being pressured into making a payment. Consider creating a predetermined family “safe word” to ensure it really is the family member who is in trouble. 
  • Avoid clicking on links or opening attachments in emails, texts and social media, particularly if it’s not from a trusted source. If anything appears to be too good to be true, it probably is. Be skeptical about unsolicited messages that promise easy money, great rewards or interesting prospects. 
    • Hover over the link or email sender address to see if the URL is plausible. Refrain from clicking links from unknown senders. Instead, navigate to the website by directly entering the web address in a web browser. Scams, supported by AI or otherwise, attempt to lead you to malicious websites aimed to steal your personal information or infect your devices. This includes social media links and ads.
  • Sharing too much information via social media platforms also allows scammers to gather information about you, your friends, family and contacts, and can be used to social engineer you. Be less of a target by limiting the personal information you post.
  • Protect your digital identity and accounts by enabling additional controls, such as robust security settings, two-factor authentication, and strong and unique login credentials. 
    • Ensure your devices are protected by keeping anti-virus, operating software and applications up-to-date. 

We can help 

J.P. Morgan takes security very seriously, and continues to invest in the latest technology to help thwart attacks in the ever-evolving threat landscape by using multi-layered approaches to authenticate our clients’ identities, which include, but are not limited to, voice biometrics, mobile device in-app verification and security questions. We will never authenticate a client via one method alone.

To learn more about how you can protect yourself and your accounts, reach out to your J.P. Morgan Banker and team. They can help you become more secure.

1 https://www.ic3.gov/Media/PDF/AnnualReport/2023_IC3Report.pdf

As cyber threats emerge and scammers enhance their impersonation efforts—leveraging AI in many cases—cybersecurity specialists at J.P. Morgan are also evolving with them.

EXPERIENCE THE FULL POSSIBILITY OF YOUR WEALTH

We can help you navigate a complex financial landscape. Reach out today to learn how.

Contact us

Important Information

This is provided for educational and informational purposes only and is not intended, nor should it be relied upon, to address every aspect of the subject discussed herein. The information provided is intended to help clients protect themselves from cyber fraud. It does not provide a comprehensive listing of all types of cyber fraud activities and it does not identify all types of cybersecurity best practices. You, your company or organization is responsible for determining how to best protect itself against cyber fraud activities and for selecting the cybersecurity best practices that are most appropriate to your needs.

This material is for informational purposes only, and may inform you of certain products and services offered by private banking businesses, part of JPMorgan Chase & Co. (“JPM”). Products and services described, as well as associated fees, charges and interest rates, are subject to change in accordance with the applicable account agreements and may differ among geographic locations. Not all products and services are offered at all locations. Please read all Important Information.

General Risks & Considerations

Any views, strategies or products discussed in this material may not be appropriate for all individuals and are subject to risks. Investors may get back less than they invested, and past performance is not a reliable indicator of future results. Asset allocation/diversification does not guarantee a profit or protect against loss. Nothing in this material should be relied upon in isolation for the purpose of making an investment decision. You are urged to consider carefully whether the services, products, asset classes (e.g., equities, fixed income, alternative investments, commodities, etc.) or strategies discussed are suitable to your needs. You must also consider the objectives, risks, charges, and expenses associated with an investment service, product or strategy prior to making an investment decision. For this and more complete information, including discussion of your goals/situation, contact your J.P. Morgan team.

Non-Reliance

Certain information contained in this material is believed to be reliable; however, JPM does not represent or warrant its accuracy, reliability or completeness, or accept any liability for any loss or damage (whether direct or indirect) arising out of the use of all or any part of this material. No representation or warranty should be made with regard to any computations, graphs, tables, diagrams or commentary in this material, which are provided for illustration/ reference purposes only. The views, opinions, estimates and strategies expressed in this material constitute our judgment based on current market conditions and are subject to change without notice. JPM assumes no duty to update any information in this material in the event that such information changes. Views, opinions, estimates and strategies expressed herein may differ from those expressed by other areas of JPM, views expressed for other purposes or in other contexts, and this material should not be regarded as a research report. Any projected results and risks are based solely on hypothetical examples cited, and actual results and risks will vary depending on specific circumstances. Forward-looking statements should not be considered as guarantees or predictions of future events.

Nothing in this document shall be construed as giving rise to any duty of care owed to, or advisory relationship with, you or any third party. Nothing in this document shall be regarded as an offer, solicitation, recommendation or advice (whether financial, accounting, legal, tax or other) given by J.P. Morgan and/or its officers or employees, irrespective of whether or not such communication was given at your request. J.P. Morgan and its affiliates and employees do not provide tax, legal or accounting advice. You should consult your own tax, legal and accounting advisors before engaging in any financial transactions.

LEARN MORE About Our Firm and Investment Professionals Through FINRA BrokerCheck

 

To learn more about J.P. Morgan’s investment business, including our accounts, products and services, as well as our relationship with you, please review our J.P. Morgan Securities LLC Form CRS and Guide to Investment Services and Brokerage Products

 

JPMorgan Chase Bank, N.A. and its affiliates (collectively "JPMCB") offer investment products, which may include bank-managed accounts and custody, as part of its trust and fiduciary services. Other investment products and services, such as brokerage and advisory accounts, are offered through J.P. Morgan Securities LLC ("JPMS"), a member of FINRA and SIPC. Insurance products are made available through Chase Insurance Agency, Inc. (CIA), a licensed insurance agency, doing business as Chase Insurance Agency Services, Inc. in Florida. JPMCB, JPMS and CIA are affiliated companies under the common control of JPMorgan Chase & Co. Products not available in all states.

 

Please read the Legal Disclaimer for J.P. Morgan Private Bank regional affiliates and other important information in conjunction with these pages.

INVESTMENT AND INSURANCE PRODUCTS ARE: • NOT FDIC INSURED • NOT INSURED BY ANY FEDERAL GOVERNMENT AGENCY • NOT A DEPOSIT OR OTHER OBLIGATION OF, OR GUARANTEED BY, JPMORGAN CHASE BANK, N.A. OR ANY OF ITS AFFILIATES • SUBJECT TO INVESTMENT RISKS, INCLUDING POSSIBLE LOSS OF THE PRINCIPAL AMOUNT INVESTED

Bank deposit products, such as checking, savings and bank lending and related services are offered by JPMorgan Chase Bank, N.A. Member FDIC.

Not a commitment to lend. All extensions of credit are subject to credit approval.

Equal Housing Lender Icon