How to Report a Bank Scam in the Philippines

A practical legal guide for consumers, counsel, and compliance teams


1) What counts as a “bank scam”?

In Philippine practice, common schemes include:

  • Account takeovers (phishing, smishing, vishing, SIM swap, malware/remote access tools)
  • Unauthorized electronic fund transfers (PESONet, InstaPay, wire/Swift, internal bank transfers)
  • Card-present and card-not-present fraud (ATM/POS skimming, online transactions)
  • Check fraud (forged endorsements, altered checks)
  • Loan/credit line fraud (identity theft to open facilities)
  • Impersonation of bank staff (social engineering)
  • Investment or “bank-affiliated” scams (fake term deposits, bogus relationship managers)

These conduct types often violate: Revised Penal Code (Estafa/Swindling, Theft/Qualified Theft), Cybercrime Prevention Act (RA 10175) (computer-related fraud/identity theft), Access Devices Regulation Act (RA 8484) (credit/debit card fraud), Financial Consumer Protection Act 2022—FCPA (RA 11765) (unfair practices; consumer redress), Data Privacy Act (RA 10173) (personal data misuse), Electronic Commerce Act (RA 8792) (electronic evidence), and Anti-Money Laundering Act (RA 9160, as amended) (proceeds tracing/STRs). The SIM Registration Act (RA 11934) is relevant where mobile numbers are used in scams.


2) Your immediate “first hour” checklist (triage)

  1. Lock down access

    • Call your bank’s fraud hotline; request temporary block of accounts/cards/online banking and password resets.
    • Ask the bank to flag the transaction(s) and place preventive holds on recipient accounts within the same bank, if any.
    • If a SIM swap or phone compromise is suspected, contact your telco to suspend or reissue the SIM.
  2. Preserve evidence

    • Take screenshots of SMS, emails, caller IDs, chat logs, phishing pages, and online banking logs.
    • Download electronic statements, OTP logs (if available), and transaction reference numbers.
    • Keep device identifiers (IMEI), dates/times with time zone, and IP/device alerts from the bank.
  3. Report quickly (parallel tracks)

    • Bank: file a formal dispute via the bank’s Consumer Assistance/Dispute form; obtain a case/reference number.
    • Law enforcement: report to PNP Anti-Cybercrime Group or NBI Cybercrime Division; secure a blotter/acknowledgment.
    • Regulators: prepare to escalate to the Bangko Sentral ng Pilipinas (BSP) if bank handling is deficient (see Section 4).
    • Data Privacy: if personal data leaked, lodge a complaint/incident report with the National Privacy Commission (NPC).
    • AMLC tip (optional): submit information that may assist tracing of proceeds.
  4. Secure your environment

    • Run AV/malware scans; revoke unknown app permissions, uninstall remote-control apps; rotate passwords and enable MFA.
    • Change email and cloud passwords first (bank resets often depend on email access).

Timing matters. The sooner you notify the bank, the stronger your position under internal dispute rules, card network chargeback windows, and the FCPA’s “fair treatment” standards.


3) Where—and how—to report

A. Your Bank (Internal Dispute Resolution)

  • Who: Any Bangko Sentral–supervised financial institution (BSFI): banks, e-money issuers, and their subsidiaries.

  • What to file:

    • A written dispute/complaint describing the unauthorized transactions (amount, date/time, channel, reference number), your lack of consent, and steps taken.
    • Attach evidence (screenshots, statements, chat/email headers, police/NBI blotter).
  • Ask for:

    • Receipt/Case ID, investigation timeline, provisional credit assessment (where applicable), and transaction logs (to the extent shareable).
  • Keep track: Note every call, date/time, and the name/ID of bank personnel.

Expected process. Banks must run a Consumer Assistance Mechanism (CAM) and an Internal Dispute Resolution (IDR) flow. You should receive an acknowledgment and, after investigation, a reasoned resolution (approval/denial/partial credit). Complex cases may take longer, but banks should give status updates and a final response within a reasonable period stated in their policies.

B. Bangko Sentral ng Pilipinas (Regulatory Escalation)

If you receive no timely or fair resolution, escalate to BSP as the sector regulator for BSFIs. Prepare:

  • Your bank case number, copies of your complaint and the bank’s responses, and supporting evidence.
  • A concise narrative explaining why the bank’s handling is inadequate (e.g., delays, refusal to investigate, denial without basis).

BSP can require banks to address consumer issues, enforce FCPA standards, and—where warranted—impose supervisory actions. BSP is not a court and typically does not award damages, but its directives often lead to corrective action or restitution by the bank.

C. Law Enforcement (Criminal Complaint)

  • PNP-ACG or NBI Cybercrime: File a report/complaint with evidence. They can conduct forensic work, coordinate with banks, and apply for cybercrime warrants (under the Supreme Court’s Rules on Cybercrime Warrants) to preserve or obtain data.
  • Venue/Jurisdiction: Under RA 10175, venue may lie where any element occurred or where any computer system used is located; practical filing is usually where the victim resides or where the report is made.
  • From blotter to prosecution: After fact-finding, cases proceed to the Office of the City/Provincial Prosecutor for inquest or preliminary investigation, then to trial courts if probable cause is found.

Typical charges may include Estafa (Art. 315), Computer-Related Fraud/Identity Theft (RA 10175), Access Devices fraud (RA 8484), Qualified Theft, and related offenses.

D. National Privacy Commission

File if personal data was compromised (phishing, account takeover). The NPC can evaluate bank and third-party data security practices and direct remedial measures.

E. AMLC (Anti-Money Laundering Council)

You may submit a public tip/complaint providing transaction flows, recipient accounts, dates/amounts, and narrative. AMLC independently receives STRs from banks and may coordinate with law enforcement for asset tracing. (Freeze orders require legal thresholds and are not victim-initiated; banks may place internal holds during investigation, but victims cannot “order” a freeze.)

F. Telcos & Platforms

  • SIM issues: Ask telcos to disable/reissue SIM and provide account activity records (per their policies and lawful requests).
  • Platform scams (marketplaces, messaging apps): Use in-app reporting to preserve content and flag fraud.

4) Your rights as a financial consumer (RA 11765, policy practice)

  • Right to fair treatment and timely redress. BSFIs must maintain accessible CAM/IDR and resolve complaints within stated timeframes.
  • Right to information. Clear disclosure of investigation results and basis for decisions.
  • Right to data protection and cybersecurity. Institutions must implement adequate controls, risk-based authentication, and monitoring.
  • Right to restitution/compensation where warranted (e.g., proven bank control failure). Note: Not every loss is automatically reimbursable; findings hinge on consent, negligence, and control failures.

5) Evidence: what to gather and how to preserve it

Core set:

  • Bank statements, online banking logs, reference numbers, and timestamps
  • SMS/email headers (full headers show routing/IPs), OTP messages
  • Screenshots/recordings of calls and phishing pages (include URL and timestamp)
  • Device forensics: list of installed apps, permission logs, recent downloads, and antivirus reports
  • Identity docs used in fraudulent onboarding (if any)
  • Blotters, acknowledgment receipts, regulator correspondence

Chain of custody & integrity:

  • Export files in original formats (e.g., .eml/.msg for emails).
  • Save a read-only copy to immutable storage; keep a hash (e.g., SHA-256) if possible.
  • Maintain an evidence log (date, description, where stored, who handled it).

6) Disputing transactions: channels and expectations

  • Electronic transfers (InstaPay/PESONet): Request recall or credit pushback through your bank. Success depends on timing (funds still with receiving bank), consent, and KYC posture of the recipient.
  • Card transactions (Visa/Mastercard/JCB): Initiate chargeback via your issuer. Typical windows are 30–120 days from posting, depending on reason code; file as early as possible.
  • ATM/POS skimming: The presence of EMV chip and transaction metadata (PIN tries, location, CCTV) affect liability assessment.
  • Check fraud: Banks review signature cards, clearing images, and alteration markers; request copy of the paid item.

Tip: Ask the bank for a written final position. This becomes the basis for regulatory escalation or civil/criminal action.


7) Civil, criminal, and administrative routes—how they differ

Route What you can get Who you file with Key notes
Bank IDR Reversal, credit, goodwill, process fixes Your bank Fastest path; hinges on bank’s control environment and facts.
BSP regulatory escalation Supervisory directives; sometimes restitution BSP Not a court; focuses on compliance and consumer protection.
Criminal case Penalties (imprisonment/fines), possible restitution PNP/NBI → Prosecutor → Court Burden of proof is beyond reasonable doubt; longer timeline.
Civil case Damages (actual, moral, exemplary), injunction Trial courts Burden is preponderance of evidence; may use expert/forensic proof.
Data Privacy/NPC Compliance orders, sanctions on controllers/processors NPC Useful where a data breach enabled the scam.

8) Templates you can reuse

A. One-page Incident Report (for bank & regulators)

Subject: Dispute of Unauthorized Transactions — [Account/Last 4 digits] Complainant: [Name, Address, Contact No., Email] Timeline: • [YYYY-MM-DD HH:MM] Received [SMS/Call] claiming to be from [Bank]; link/caller ID: [details]. • [YYYY-MM-DD HH:MM] Unauthorized transaction(s): [amount, channel, reference no.]. • [YYYY-MM-DD HH:MM] Reported to bank via [hotline/branch/app]; Case No.: [XXXX]. Facts: I did not authorize these transactions. I did not share my [PIN/CVV/OTP], nor did I install any remote control software. Relief Sought: (1) Immediate reversal or provisional credit; (2) Transaction logs, including device/IP and authentication factors used; (3) Preventive holds/recall of funds; (4) Written final position. Attachments: Statements, screenshots, blotter, ID, and other evidence. Declaration: I attest the above is true and correct. Signature/Date

B. Police/NBI Sworn Statement (key clauses)

  • Identity of complainant; authority to execute statement
  • Narration of how the scam occurred (include URLs/phone numbers/handles)
  • Specific transactions (amounts, references, timestamps, channels)
  • Non-consent and steps taken to mitigate
  • Prayer for investigation and prosecution; willingness to testify
  • List of attachments and device custody status

(Consult counsel for notarization and formatting consistent with local prosecutor office practice.)


9) Practical tips that improve outcomes

  • Speed & documentation beat everything. Early reporting boosts recall odds and strengthens chargebacks.
  • Never share OTPs or install screen-sharing apps at a caller’s request. Banks do not ask for OTPs or to install remote tools.
  • Use strong MFA: app-based authenticators or physical keys where supported.
  • Segment accounts (separate “spending” vs “savings” banks) and enable transaction alerts with low thresholds.
  • Keep device hygiene: updated OS, app-store-only installs, minimal permissions.
  • For businesses: implement maker-checker controls, payee allow-lists, and callback verification for payee/amount changes.

10) FAQs

Q: Will the bank automatically refund me? A: No. Reversals depend on whether the bank’s controls failed, whether you consented (including via social engineering), and network rules. FCPA ensures fair process, not automatic reimbursement.

Q: Can I force a freeze of the recipient’s account? A: You can request a hold/recall via your bank. AMLC freeze orders follow statutory standards; victims don’t directly obtain them, but law enforcement/regulators can act.

Q: Is a screenshot enough evidence? A: Helpful but not sufficient. Keep native files (email .eml/.msg, original images), full headers/metadata, and formal bank records.

Q: Where do I file if the scammer is abroad? A: File locally (PNP/NBI) and pursue via mutual legal assistance channels handled by authorities; your timely, well-documented complaint is the trigger.


11) Suggested timeline (working plan)

Day 0–1: Lock accounts, file bank dispute, law enforcement blotter, telco action, evidence preservation. Day 2–7: Provide additional docs to bank; follow up; request written status; initiate chargeback/recall. Week 2–4: If unresolved or unfair, escalate to BSP; file NPC complaint if data breach suspected. Month 2+: Pursue criminal/civil remedies as advised by counsel; maintain engagement with investigators.


12) Document checklist (printable)

  • Government ID(s)
  • Bank case/reference number & hotline call logs
  • Statements and transaction history (CSV/PDF)
  • Screenshots and original email/SMS files (with headers)
  • Police/NBI blotter or acknowledgment
  • Device/app inventory and antivirus report
  • Copies of regulatory filings (BSP/NPC/AMLC)
  • Timeline of events (with exact timestamps)

13) Final notes

  • This guide outlines practical, Philippine-specific steps anchored in key laws and regulator expectations.
  • For significant losses or complex schemes (e.g., mule networks, corporate BEC, SIM-swap rings), engage counsel and consider forensic support early.
  • Keep communications professional and concise—decision-makers (bank investigators, prosecutors, regulators) move faster when your file is complete, chronological, and easy to verify.

Stay fast, precise, and papered. That’s how you win these cases.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.