How to Report Online Scams and Recover Money

Online scams have become one of the most common forms of financial fraud in the Philippines. They appear in many forms: fake online stores, phishing messages, investment scams, romance scams, fake job offers, e-wallet fraud, bank account takeovers, cryptocurrency scams, identity theft, parcel delivery scams, and impersonation schemes involving government agencies, banks, celebrities, or well-known companies.

For victims, the two most urgent concerns are usually: how to report the scam and how to recover the money. The Philippine legal system provides several possible remedies, but recovery depends heavily on speed, available evidence, the payment channel used, and whether the scammer or recipient account can still be traced.

This article explains the Philippine legal framework, the agencies involved, the evidence to preserve, the reporting process, and the practical routes for attempting recovery.


II. Common Types of Online Scams in the Philippines

Online scams often fall into one or more of the following categories:

1. Online Selling Scams

These involve sellers who receive payment but do not deliver the goods, deliver fake or defective items, or disappear after payment. Common platforms include Facebook Marketplace, Instagram, TikTok shops, messaging apps, classified ads, and informal buy-and-sell groups.

2. Phishing and Account Takeover

A victim is tricked into giving passwords, one-time passwords, card details, e-wallet PINs, or banking credentials through fake links, fake websites, or impersonated customer support accounts.

3. Investment Scams

These promise unusually high returns, guaranteed profits, fast payouts, “double your money” schemes, crypto trading profits, forex returns, or commission-based recruitment bonuses.

4. Romance Scams

A scammer builds an emotional relationship with the victim and later asks for money for emergencies, travel, medical needs, business problems, customs fees, or supposed inheritance claims.

5. Job and Task Scams

Victims are offered online work, part-time jobs, or “task-based earning” opportunities. They may initially receive small payouts, then be asked to deposit larger amounts to unlock commissions or complete tasks.

6. Fake Loan or Lending App Scams

Victims may be charged advance fees for loans that are never released. In some cases, illegal lending apps also harvest contacts and threaten public shaming.

7. E-Wallet and Bank Transfer Scams

Scammers induce victims to send money through GCash, Maya, bank transfer, remittance centers, QR payments, or cryptocurrency wallets.

8. Impersonation Scams

The scammer pretends to be a relative, friend, bank employee, police officer, customs officer, court employee, delivery rider, government worker, or company representative.

9. Cryptocurrency Scams

These include fake exchanges, fake mining platforms, bogus wallet recovery services, pump-and-dump groups, romance-investment hybrids, and fake trading dashboards.


III. Relevant Philippine Laws

Several Philippine laws may apply to online scams, depending on the facts.

1. Revised Penal Code: Estafa

The most common criminal charge is estafa, punishable under Article 315 of the Revised Penal Code. Estafa generally involves deceit or abuse of confidence that causes damage to another person.

In online scams, estafa may apply when the scammer misrepresents facts to induce the victim to send money. Examples include pretending to sell goods, pretending to offer a legitimate investment, or falsely claiming authority to collect payments.

Basic elements usually include:

  1. The offender used deceit, false pretenses, fraudulent acts, or abuse of confidence.
  2. The victim relied on the deceit.
  3. The victim suffered damage or loss.
  4. The deceit caused the victim to part with money, property, or rights.

2. Cybercrime Prevention Act of 2012

Republic Act No. 10175, the Cybercrime Prevention Act of 2012, may apply when the fraud is committed through information and communications technology.

A traditional offense such as estafa may be prosecuted as a cybercrime when committed through the internet, social media, email, messaging apps, digital platforms, or electronic systems. This can result in a higher penalty than ordinary estafa.

Cyber-related offenses may include:

  • Computer-related fraud
  • Computer-related identity theft
  • Illegal access
  • Misuse of devices
  • Cyber-squatting, in appropriate cases
  • Other offenses committed through ICT

3. Access Devices Regulation Act

Republic Act No. 8484, as amended, may apply to fraudulent use of credit cards, debit cards, account numbers, access devices, or related payment credentials.

This may be relevant when a scam involves:

  • Unauthorized card transactions
  • Stolen card information
  • Use of another person’s payment credentials
  • Fake payment devices
  • Fraudulent use of access devices

4. E-Commerce Act

Republic Act No. 8792, the Electronic Commerce Act, recognizes the legal effect of electronic documents, electronic signatures, and electronic evidence. This matters because screenshots, emails, digital receipts, transaction confirmations, and chat records may be used as evidence, subject to rules on admissibility and authentication.

5. Data Privacy Act

Republic Act No. 10173, the Data Privacy Act of 2012, may apply when a scam involves unauthorized collection, use, disclosure, or sale of personal information.

Victims may consider data privacy issues where scammers misuse:

  • IDs
  • Selfies
  • Bank information
  • Contact lists
  • Private photos
  • Personal documents
  • Account credentials

6. Consumer Protection Laws

Consumer protection rules may apply when the scam involves defective products, misleading advertisements, unfair sales practices, or fraudulent online sellers. Depending on the nature of the transaction, the Department of Trade and Industry may be involved.

7. Securities Regulation Code

Investment scams may fall under the jurisdiction of the Securities and Exchange Commission when they involve unauthorized solicitation of investments, unregistered securities, Ponzi schemes, or illegal investment-taking activities.

Investment offers promising profits, passive income, guaranteed returns, or recruitment commissions may require SEC registration or authority, depending on structure.

8. Anti-Money Laundering Laws

Scam proceeds may pass through bank accounts, e-wallets, remittance channels, crypto platforms, or mule accounts. The Anti-Money Laundering Council may become relevant when fraud proceeds are laundered through financial channels.

Victims usually do not directly recover funds through AMLC complaint mechanisms, but reports may help financial intelligence and law enforcement tracing.


IV. First Things to Do After Discovering the Scam

Speed is critical. Many scams involve rapid movement of funds from one account to another. Victims should act immediately.

1. Stop Communicating Recklessly With the Scammer

Do not threaten the scammer in a way that may alert them to destroy evidence, transfer funds, or delete accounts. Preserve communications first.

Do not send more money, even if the scammer claims that payment is needed for “release,” “tax,” “verification,” “withdrawal,” “refund processing,” “account unlocking,” or “lawyer fees.”

2. Take Screenshots and Preserve Evidence

Save everything before accounts, posts, chats, or listings disappear.

Important evidence includes:

  • Full name or alias used by the scammer
  • Social media profile links
  • Profile photos
  • Usernames and handles
  • Mobile numbers
  • Email addresses
  • Bank account names and numbers
  • E-wallet numbers
  • QR codes
  • Cryptocurrency wallet addresses
  • Transaction receipts
  • Reference numbers
  • Chat history
  • Voice messages
  • Emails
  • Product listings
  • Advertisements
  • Proof of payment
  • Delivery tracking records
  • IDs or documents sent by the scammer
  • Links to websites or landing pages
  • Screenshots of promises, representations, and demands for payment

Where possible, export the conversation rather than relying only on screenshots. Keep original files, metadata, receipts, and emails.

3. Contact the Bank, E-Wallet, or Payment Provider Immediately

Report the transaction as fraudulent. Ask for:

  • Freezing or holding of the recipient account, if possible
  • Investigation or dispute process
  • Transaction tracing
  • Reversal or chargeback, if available
  • Written acknowledgment of your report
  • Case or ticket number

For bank transfers, immediately contact both your own bank and, if known, the receiving bank. For e-wallet transfers, contact the e-wallet provider. For credit card payments, contact the card issuer and ask about chargeback rights.

4. Change Passwords and Secure Accounts

If the scam involved phishing or unauthorized access:

  • Change passwords immediately.
  • Enable two-factor authentication.
  • Log out of all devices.
  • Revoke unknown app permissions.
  • Freeze or replace compromised cards.
  • Notify your bank.
  • Check for unauthorized transactions.
  • Report SIM-related concerns to your telco if applicable.

5. Prepare a Written Timeline

Write a clear chronology while the facts are fresh. Include dates, times, amounts, platforms used, names, account details, and what the scammer said that caused you to send money.


V. Where to Report Online Scams in the Philippines

1. Philippine National Police Anti-Cybercrime Group

The PNP Anti-Cybercrime Group handles cybercrime complaints, including online scams, phishing, identity theft, and other internet-based fraud.

Victims may report to the nearest cybercrime unit or police station. Bring printed and digital copies of evidence.

2. National Bureau of Investigation Cybercrime Division

The NBI Cybercrime Division also investigates cyber-related offenses. Victims may file a complaint and submit evidence for evaluation.

3. Local Police Station

A victim may also report to the nearest police station. The local police may prepare an incident report or refer the matter to a cybercrime unit depending on the facts.

4. Prosecutor’s Office

For criminal prosecution, a complaint-affidavit may be filed with the Office of the City or Provincial Prosecutor. The prosecutor determines whether probable cause exists to charge the respondent in court.

5. Bank, E-Wallet, or Financial Institution

This is essential for possible recovery. Reports to law enforcement are important, but banks and e-wallets control the account systems where funds may still be located.

6. Securities and Exchange Commission

If the scam involves investment solicitation, pooled funds, profit-sharing, guaranteed returns, crypto investment groups, forex trading schemes, or Ponzi-like recruitment, a report may be made to the SEC.

7. Department of Trade and Industry

For consumer complaints involving online sellers, defective goods, misleading sales practices, or failure to deliver products, DTI may be relevant, especially if the seller is identifiable and operating as a business.

8. National Privacy Commission

If personal data was misused, leaked, processed without consent, or used for harassment or identity theft, a complaint or report may be made to the NPC.

9. Platform Reports

Report the scammer’s account, page, shop, listing, or advertisement to the platform used, such as Facebook, Instagram, TikTok, Shopee, Lazada, Telegram, Viber, WhatsApp, or the website host.

Platform reporting may help preserve records, remove scam pages, or prevent further victimization. However, platform reports alone usually do not replace formal law enforcement complaints.


VI. How to Report: Practical Step-by-Step Guide

Step 1: Preserve Evidence

Before sending reports, collect and organize all proof. Make a folder containing:

  • Screenshots
  • Receipts
  • IDs, if any
  • Chat exports
  • Links
  • Transaction records
  • Timeline
  • Names and numbers
  • Bank or e-wallet details

Use filenames that show dates and descriptions.

Step 2: Contact Your Bank or E-Wallet Provider

Do this immediately. Provide:

  • Your account name
  • Your transaction reference number
  • Date and time of transfer
  • Amount sent
  • Recipient account number or wallet number
  • Recipient name, if shown
  • Description of the fraud
  • Police blotter or complaint, if already available

Ask for a written report number.

Step 3: File a Police or Cybercrime Report

Prepare:

  • Valid government ID
  • Complaint narrative
  • Evidence printouts
  • Digital copies in USB or device
  • Transaction receipts
  • Bank or e-wallet report number

The complaint should clearly explain how the scammer deceived you and how the payment was made.

Step 4: Execute a Complaint-Affidavit

For prosecution, you may need a complaint-affidavit. This is a sworn statement narrating facts based on personal knowledge.

A complaint-affidavit usually includes:

  • Personal details of the complainant
  • Identity or known details of the respondent
  • Chronology of events
  • Amount lost
  • Misrepresentations made by the scammer
  • Proof of payment
  • Screenshots and records as annexes
  • Statement that the allegations are true based on personal knowledge and authentic records

Step 5: Submit the Complaint to the Prosecutor

The prosecutor may require the respondent to submit a counter-affidavit if the respondent is identifiable. If probable cause is found, the case may be filed in court.

Step 6: Coordinate With Financial Institutions

Continue following up with banks, e-wallets, or payment providers. Law enforcement may issue requests, preservation letters, subpoenas, or other legal processes to obtain account information.

Step 7: Consider Civil Action

A criminal case may punish the offender, but recovery of money may require civil remedies. Depending on the case, the victim may pursue civil liability within the criminal case or file a separate civil action.


VII. Can You Recover the Money?

Recovery is possible in some cases, but it is not guaranteed. The chances depend on several factors:

  1. How quickly the victim reports the scam.
  2. Whether the funds remain in the recipient account.
  3. Whether the account is under a real or fake identity.
  4. Whether the bank or e-wallet can freeze the funds.
  5. Whether the payment method allows reversal or chargeback.
  6. Whether the scammer is identified.
  7. Whether law enforcement can trace the transaction.
  8. Whether the recipient account holder is a mule, accomplice, or innocent third party.
  9. Whether the scam proceeds were transferred to cash, crypto, or foreign accounts.

1. Bank Transfer Recovery

Bank transfers are often difficult to reverse once completed. However, immediate reporting may allow the bank to flag, freeze, or investigate the receiving account.

Banks generally will not simply return funds without proper basis, especially if the money is already credited to another person’s account. They may require investigation, consent of the receiving account holder, court order, law enforcement request, or other legal process.

2. E-Wallet Recovery

E-wallet providers may temporarily restrict accounts involved in fraud reports. Recovery depends on whether the funds are still there and whether the provider’s process allows reversal.

Victims should report immediately through official channels and provide complete documentation.

3. Credit Card Chargeback

If the scam involved a credit card payment, chargeback may be possible depending on the transaction type, merchant, card network rules, and timing. Report promptly to the issuing bank.

4. Debit Card or Online Banking Transactions

Debit and online banking transactions are more difficult to reverse than credit card transactions, but unauthorized transactions should still be reported immediately.

5. Remittance Center Transfers

If the money has not yet been claimed, cancellation may be possible. Once claimed, recovery becomes harder and usually requires investigation.

6. Cryptocurrency Transactions

Cryptocurrency transfers are generally irreversible. Recovery is difficult unless the scammer used a regulated exchange that can identify and freeze assets. Victims should preserve wallet addresses, transaction hashes, exchange details, and chat records.

7. Marketplace or Platform Buyer Protection

If the transaction occurred through an official marketplace with escrow, buyer protection, or dispute resolution, recovery may be possible through platform mechanisms. Informal off-platform payments are much riskier.


VIII. Criminal Case vs. Civil Recovery

Victims often assume that filing a criminal complaint automatically results in reimbursement. This is not always true.

1. Criminal Case

A criminal case seeks to punish the offender. In estafa or cybercrime cases, the court may also award restitution or civil liability if the accused is convicted.

2. Civil Action

A civil case seeks recovery of money, damages, or other relief. It may be filed separately in appropriate cases.

3. Small Claims

If the amount is within the jurisdictional threshold and the dispute is essentially for payment or reimbursement, small claims may be considered. However, small claims require an identifiable defendant and a claim that fits the rules. It is less useful if the scammer’s identity or address is unknown.

4. Restitution

Restitution may be ordered if the offender is convicted or if a settlement occurs. However, actual collection depends on whether the offender has assets or money that can be reached.


IX. Evidence Needed for an Online Scam Complaint

Good evidence is crucial. The victim should collect both digital and documentary proof.

1. Identity Evidence

  • Name used by the scammer
  • Social media profile
  • Contact numbers
  • Email addresses
  • Bank or e-wallet account details
  • Account holder name
  • Photos or IDs sent by the scammer
  • Links to profiles or pages

2. Deceit or Misrepresentation Evidence

  • Messages promising delivery, returns, profits, refunds, or services
  • Product posts or advertisements
  • Fake permits or certificates
  • False claims of authority
  • Fake receipts
  • Fake investment dashboards
  • Fake testimonials
  • Threats or demands for additional money

3. Payment Evidence

  • Bank deposit slips
  • Online transfer receipts
  • E-wallet receipts
  • QR payment confirmation
  • Credit card statements
  • Remittance receipts
  • Crypto transaction hashes

4. Damage Evidence

  • Amount lost
  • Related fees
  • Additional payments made
  • Consequential losses, if provable
  • Emotional distress or reputational harm, where relevant

5. Authentication of Electronic Evidence

Electronic evidence may need to be authenticated. Keep originals where possible. Do not alter screenshots. Save files in original format. Record URLs, timestamps, and device information where available.


X. Drafting a Complaint Narrative

A clear complaint narrative should answer:

  1. Who contacted you?
  2. When did the communication start?
  3. What did the scammer offer or represent?
  4. Why did you believe the representation?
  5. What amount did you send?
  6. How was payment made?
  7. What happened after payment?
  8. What promises were broken?
  9. What account received the funds?
  10. What evidence supports each statement?

A simple structure:

I am filing this complaint for online scam/estafa committed through [platform]. On [date], I saw/received [message/post/offer]. The person using the name [name] represented that [false statement]. Relying on this representation, I sent [amount] through [bank/e-wallet/remittance] to [recipient details] on [date/time]. After payment, the respondent failed to deliver/refund/perform and later blocked me/stopped replying/demanded more money. Attached are screenshots, transaction receipts, and other evidence.


XI. What to Ask From Banks or E-Wallets

When reporting to a financial institution, the victim should ask for specific actions:

  • A fraud case number
  • Confirmation that the recipient account has been reported
  • Whether a hold or freeze can be placed
  • Whether a reversal is possible
  • Whether additional documents are needed
  • Whether a police report is required
  • Whether the receiving institution will be notified
  • Whether the transaction can be traced
  • Whether the account is still active
  • Whether the institution can preserve records

Financial institutions may refuse to disclose the recipient’s full information because of banking secrecy, data privacy, and internal policies. Law enforcement or court processes may be needed.


XII. The Role of Account Mules

Many online scams use “mule accounts.” These are bank or e-wallet accounts used to receive scam proceeds. Some mule account holders knowingly participate. Others may have rented, sold, or allowed use of their accounts. Some may claim they were also deceived.

A victim may still report the recipient account holder. Investigators can determine whether the account holder acted as principal, accomplice, accessory, mule, or innocent party.

Victims should avoid personally harassing or publicly accusing account holders without sufficient proof. Public accusations may create risks of defamation, privacy violations, or counterclaims.


XIII. Public Posting: Should You Expose the Scammer Online?

Victims often want to post the scammer’s name, photo, phone number, or account details online. While warnings may help others, public posting carries legal risk if the information is inaccurate, excessive, or defamatory.

Possible risks include:

  • Cyber libel
  • Violation of privacy rights
  • Doxxing concerns
  • Harassment allegations
  • Misidentification of innocent persons
  • Platform takedowns

A safer approach is to report to authorities, platforms, banks, and consumer protection agencies. If posting publicly, stick to verifiable facts, avoid insults, avoid threats, and avoid publishing sensitive personal data beyond what is necessary.


XIV. Settlement With the Scammer

Some scammers or account holders may offer to return the money after a complaint is filed. Settlement may be possible, but victims should be careful.

Important points:

  • Put settlement terms in writing.
  • Do not withdraw complaints before receiving full payment unless advised by counsel.
  • Use traceable payment channels.
  • Confirm cleared funds.
  • Avoid signing broad waivers without understanding them.
  • Remember that some criminal offenses may proceed depending on public interest and prosecutorial discretion.

For serious fraud, organized scams, multiple victims, identity theft, or large amounts, legal advice is strongly recommended before settlement.


XV. What If the Scammer Is Unknown?

Many online scams involve fake names, fake photos, prepaid SIMs, dummy accounts, or mule accounts. A case may still be reported even if the scammer’s real identity is unknown.

Reports can be based on:

  • Account usernames
  • Mobile numbers
  • Bank or e-wallet accounts
  • IP-related data, where legally obtainable
  • Platform records
  • Transaction trails
  • Device or login information
  • Merchant or exchange records

Law enforcement may need preservation requests, subpoenas, warrants, or coordination with service providers.


XVI. What If the Scammer Is Abroad?

Cross-border scams are harder to pursue, but victims should still report. The Philippine authorities may coordinate with foreign counterparts in appropriate cases. Recovery becomes more difficult when money is moved overseas, converted to crypto, or withdrawn in another country.

Victims should preserve evidence showing foreign accounts, foreign numbers, websites, exchange accounts, domain registrations, or international remittance records.


XVII. Special Issues in Investment Scams

Investment scams are common in the Philippines. Red flags include:

  • Guaranteed profits
  • No risk claims
  • Very high returns
  • Referral commissions
  • Pressure to recruit
  • Lack of SEC registration
  • Fake certificates
  • Fake celebrity endorsements
  • Withdrawal restrictions
  • “Tax” or “unlocking fee” demands before payout
  • Changing company names
  • Use of crypto to avoid tracing

Victims should report investment scams to law enforcement and the SEC. If many victims are involved, coordinated complaints may strengthen the case.


XVIII. Special Issues in Online Shopping Scams

For online shopping scams, identify whether the seller is:

  1. A registered business,
  2. An individual seller,
  3. A marketplace merchant,
  4. A fake page or impersonator.

If the purchase was made through an official platform, use the platform’s dispute mechanism immediately. Avoid moving payment outside the platform because it may remove buyer protection.

For direct social media purchases, evidence of the seller’s promise, payment, and failure to deliver is crucial.


XIX. Special Issues in Phishing and Unauthorized Transactions

Where the victim did not voluntarily send money but instead suffered unauthorized transactions, the report should emphasize:

  • No consent was given.
  • Credentials may have been compromised.
  • The transaction was unauthorized.
  • The victim reported promptly.
  • The victim did not benefit from the transaction.
  • The account should be secured and investigated.

Immediately request account blocking, card replacement, password reset, device logout, and transaction investigation.


XX. Deadlines and Urgency

The law may allow criminal prosecution within prescriptive periods depending on the offense and penalty. However, for practical recovery, the most important deadline is immediate action.

The first few hours are often critical because scam proceeds may be quickly withdrawn, transferred, split, converted to crypto, or moved through mule accounts.

As a practical rule:

  • Report to the bank or e-wallet immediately.
  • File with law enforcement as soon as possible.
  • Preserve evidence before it disappears.
  • Do not delay because the scammer promises a refund.

XXI. Possible Outcomes After Reporting

After a report is filed, possible outcomes include:

  1. The bank or e-wallet freezes remaining funds.
  2. The account is restricted pending investigation.
  3. The victim receives a refund or partial refund.
  4. Law enforcement identifies the account holder.
  5. A criminal complaint is filed.
  6. The prosecutor dismisses the complaint for insufficient evidence.
  7. The case proceeds to court.
  8. The scammer settles.
  9. The funds are not recovered because they were already withdrawn.
  10. The complaint becomes part of a larger investigation involving multiple victims.

XXII. Why Recovery Often Fails

Victims should understand the practical obstacles:

  • Scammers use fake identities.
  • Funds are withdrawn quickly.
  • Mule accounts are used.
  • Prepaid SIMs are discarded.
  • Social media accounts are deleted.
  • Crypto transfers are irreversible.
  • Banks require legal process before disclosing details.
  • Victims delay reporting.
  • Evidence is incomplete.
  • Transactions were voluntary transfers, making reversal harder.
  • Scammers operate across borders.

This does not mean reporting is useless. Reporting helps establish a record, may support account freezing, may assist law enforcement, and may prevent further victimization.


XXIII. Preventive Measures

To avoid online scams:

  • Verify sellers before paying.
  • Avoid deals that are too good to be true.
  • Use platform escrow or buyer protection.
  • Do not send OTPs, PINs, passwords, or card details.
  • Check SEC registration for investment offers.
  • Do not rely solely on screenshots of IDs or permits.
  • Be suspicious of guaranteed returns.
  • Avoid paying “fees” to withdraw supposed earnings.
  • Confirm requests for money through a separate communication channel.
  • Do not click suspicious links.
  • Use strong passwords and two-factor authentication.
  • Keep bank and e-wallet notifications active.
  • Avoid public Wi-Fi for banking.
  • Do not rent, sell, or lend bank or e-wallet accounts.

XXIV. Sample Checklist for Victims

Before filing a complaint, prepare:

  • Valid ID
  • Written timeline
  • Full name or alias of scammer
  • Profile links and screenshots
  • Chat logs
  • Transaction receipts
  • Bank or e-wallet account details
  • Amount lost
  • Proof of demand for refund, if any
  • Proof that the scammer failed to deliver, blocked you, or demanded more money
  • Bank/e-wallet case number
  • Police blotter or incident report, if already obtained
  • Complaint-affidavit and annexes, if filing with prosecutor

XXV. Sample Evidence Annex List

A complaint may organize evidence as follows:

  • Annex “A” – Screenshot of scammer’s profile
  • Annex “B” – Screenshot of product or investment offer
  • Annex “C” – Chat conversation showing representations
  • Annex “D” – Payment instructions sent by scammer
  • Annex “E” – Proof of payment
  • Annex “F” – Receipt or transaction confirmation
  • Annex “G” – Follow-up messages demanding delivery or refund
  • Annex “H” – Screenshot showing the scammer blocked the complainant
  • Annex “I” – Bank or e-wallet complaint acknowledgment
  • Annex “J” – Police blotter or cybercrime report

XXVI. Sample Complaint-Affidavit Outline

Republic of the Philippines City/Province of ________

Complaint-Affidavit

I, [Name], Filipino, of legal age, residing at [address], after being sworn, state:

  1. I am the complainant in this case.
  2. On [date], I saw/received an online offer from a person using the name/account [name/account].
  3. The said person represented that [state false representation].
  4. Because of this representation, I agreed to send money.
  5. On [date/time], I sent the amount of PHP [amount] through [bank/e-wallet/remittance] to [recipient name/account/number].
  6. After receiving the money, the said person failed to deliver/refund/perform as promised.
  7. I repeatedly followed up, but the person [ignored me/blocked me/gave excuses/demanded more money].
  8. I later discovered that the representation was false and that I had been deceived.
  9. Attached are screenshots of our conversation, proof of payment, account details, and other supporting documents.
  10. I am executing this affidavit to charge the responsible person or persons with estafa, cybercrime-related offenses, and other applicable violations of law.

[Signature] Complainant

Subscribed and sworn before me this ___ day of ________.


XXVII. Practical Legal Strategy

A victim should usually pursue several tracks at the same time:

  1. Financial track – Report to bank, e-wallet, card issuer, or remittance provider.
  2. Criminal track – Report to PNP ACG, NBI Cybercrime, police, or prosecutor.
  3. Platform track – Report the account, page, shop, listing, or advertisement.
  4. Regulatory track – Report to SEC, DTI, NPC, or other agency depending on the scam.
  5. Civil recovery track – Consider small claims, civil action, restitution, or settlement if the wrongdoer is identifiable.

The most effective approach depends on the facts. A phishing case is handled differently from an investment scam, and a credit card chargeback is different from a voluntary bank transfer.


XXVIII. Key Takeaways

Online scam victims in the Philippines should act quickly, preserve evidence, report to the payment provider, and file complaints with the proper authorities. The primary criminal remedy is often estafa, possibly charged in relation to cybercrime laws when committed online. Other laws may apply depending on whether the scam involves access devices, personal data, unauthorized investment solicitation, consumer fraud, or money laundering.

Money recovery is possible but not guaranteed. The best chance of recovery usually comes from immediate reporting before the funds are withdrawn or transferred. A strong complaint should include a clear timeline, proof of deceit, proof of payment, account details, and complete digital evidence.

Victims should avoid sending additional money, avoid destroying or altering evidence, and avoid reckless public accusations. Reporting promptly through banks, e-wallets, law enforcement, regulators, and platforms gives the victim the best chance of tracing the scammer, freezing funds, and pursuing criminal or civil remedies.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.