Introduction
Online lending has become common in the Philippines because many borrowers need quick cash, have limited access to banks, or prefer mobile transactions. Legitimate online lenders may operate through mobile apps, websites, e-wallet integrations, or digital loan platforms. However, scammers also use the appearance of online lending to steal money from applicants.
One of the most common scams is the deposit-to-withdraw scheme. The victim is told that a loan has been approved, but before the proceeds can be released, the borrower must first pay a “deposit,” “activation fee,” “verification fee,” “processing fee,” “wallet unlocking fee,” “tax,” “insurance,” “anti-fraud fee,” “credit score repair fee,” “document correction fee,” “bank code fee,” or similar charge. After the victim pays, the scammer demands another fee. The cycle continues until the victim realizes that no loan will be released.
In the Philippine context, this may involve fraud, cybercrime, data privacy violations, harassment, illegal lending, unauthorized collection, identity theft, estafa, deceptive practices, and possible violations of financial regulations. Recovery is possible in some cases, but it is not automatic. The victim must act quickly, preserve evidence, report to the e-wallet or bank, file complaints with proper agencies, and avoid paying additional amounts.
This article explains what deposit-to-withdraw online lending scams are, why they are illegal, what victims should do immediately, where to report, what evidence to preserve, how to seek recovery, and how to protect personal data after dealing with a fake lending app.
I. What Is a Deposit-to-Withdraw Online Lending Scam?
A deposit-to-withdraw scam is a fraud scheme where a supposed lending app or online loan agent tells a borrower that loan proceeds are ready for release, but the borrower must first deposit money before withdrawal.
The scammer may say the money is needed for:
Account activation.
Loan release fee.
Processing charge.
Insurance fee.
Verification fee.
Anti-money laundering clearance.
Credit score correction.
Bank account correction.
Tax clearance.
Collateral deposit.
Security deposit.
Wallet unlocking.
System upgrade.
Document authentication.
Penalty for incorrect information.
The key warning sign is this: the borrower is being asked to pay money in order to receive money.
Legitimate lenders may charge lawful fees, but a loan applicant should be cautious when the lender refuses to release proceeds unless the borrower repeatedly pays advance charges through personal accounts, e-wallets, crypto wallets, or unofficial channels.
II. Why the Scheme Is Suspicious
A legitimate lender generally evaluates the borrower, discloses loan terms, and releases proceeds under a written loan agreement. Fees, if lawful, should be transparent and properly documented. A scammer, on the other hand, creates artificial barriers to loan release and repeatedly demands payment.
Common suspicious statements include:
“Your loan is approved, but you must deposit first.”
“Your bank account number is wrong, so you must pay a correction fee.”
“Your account is frozen.”
“You need to pay tax before withdrawal.”
“You must pay anti-fraud clearance.”
“The system requires wallet activation.”
“The loan is already in your app wallet, but you cannot withdraw until you pay.”
“You will be sued if you do not pay the release fee.”
“You must pay within ten minutes or your loan will be cancelled.”
“Do not tell anyone because this is a confidential loan process.”
These are pressure tactics meant to make the victim pay quickly.
III. Legitimate Loan Fees Versus Scam Fees
Not every loan-related fee is automatically illegal. Some legitimate lenders may charge processing fees, documentary stamp tax, service charges, interest, penalties, or other charges allowed by law and disclosed in the loan agreement. However, legitimate charges should be transparent, reasonable, documented, and compliant with lending regulations.
Scam fees usually have these features:
They are demanded before actual loan release.
They are paid to personal accounts or unrelated e-wallet numbers.
They are repeatedly demanded in increasing amounts.
They are not stated in a valid written loan agreement.
They are described vaguely.
They are accompanied by threats.
They are justified by fake “system errors.”
They are not supported by official receipts.
The lender refuses to cancel and refund.
The supposed loan proceeds never arrive.
A lawful lender does not normally require a borrower to keep paying new fees to unlock a loan that supposedly already exists.
IV. Common Forms of the Scam
Deposit-to-withdraw scams appear in several forms.
1. Fake Loan App Wallet
The app shows that the borrower has been approved for ₱50,000, ₱100,000, or another amount. The money appears in an in-app wallet. But when the borrower tries to withdraw, the app says a fee must be paid first.
The displayed wallet balance is fake. It is used to convince the borrower that the money exists.
2. Bank Account Correction Scam
The scammer claims that the borrower entered the wrong bank account number. The borrower is told that the loan is frozen and a correction fee must be paid.
Even if the borrower entered the correct account number, the scammer may alter the displayed number to create fear.
3. Credit Score Scam
The borrower is told that their credit score is too low and must be “repaired” by paying a deposit. After payment, another issue appears.
4. Tax or AML Clearance Scam
The scammer claims that the borrower must pay tax, AML clearance, or anti-fraud fee before funds can be released. This is often used to sound official.
5. Insurance or Guarantee Scam
The scammer says the borrower must pay loan insurance or guarantee deposit. After payment, another fee is demanded.
6. Threat-Based Scam
The scammer says the borrower must pay or face criminal charges, blacklisting, public posting, or harassment of contacts.
7. Identity Theft Scam
The app collects IDs, selfies, contacts, bank details, and personal data. Even if the victim does not receive a loan, the scammers may use the data for harassment or further fraud.
V. The “Wrong Bank Account” Trap
One of the most common deposit-to-withdraw scams involves an alleged wrong bank account number.
The scammer tells the borrower:
The loan was approved.
The proceeds were sent to the borrower’s in-app wallet.
Withdrawal failed because the bank account number is incorrect.
The account is frozen.
The borrower must pay a correction fee.
If not paid, the borrower will be liable for the loan.
This is usually false. If no money was actually released to the borrower’s bank or e-wallet, the borrower should not be treated as having received the loan. A fake in-app balance does not mean actual loan proceeds were delivered.
The victim should preserve screenshots showing the correct account number submitted, the app’s error message, the demand for correction fee, and proof that no funds were received.
VI. Is the Borrower Liable for a Loan Never Received?
Generally, a borrower should not be made to pay a loan that was never actually released. A loan requires delivery or release of money or credit under agreed terms. If the supposed lender never disbursed actual funds to the borrower, demanding repayment may be fraudulent or abusive.
A fake app balance is not the same as actual disbursement.
If the app claims the borrower owes money despite no release, the victim should gather evidence:
Bank statement showing no receipt.
E-wallet transaction history.
App screenshots.
Messages demanding fees.
Loan agreement, if any.
Proof of payments made to scammers.
This evidence will help contest any claim that the borrower received a loan.
VII. Legal Characterization: Estafa and Fraud
A deposit-to-withdraw scam may amount to estafa if the scammer used deceit to obtain money and caused damage to the victim. The false promise of a loan, fake approval, fake wallet balance, fake account freeze, or fake clearance fee may constitute fraudulent representation.
Elements commonly relevant in this type of complaint include:
The scammer made false representations.
The victim relied on those representations.
The victim paid money.
The promised loan was never released.
The victim suffered damage.
The scammer had intent to defraud.
A complaint for estafa may be filed with law enforcement or the prosecutor’s office if the evidence supports it.
VIII. Cybercrime Aspect
If the scam was committed through a mobile app, website, social media page, messaging app, email, SMS, or online payment channel, cybercrime laws may be relevant. Fraud committed through information and communications technology may carry cybercrime implications.
Evidence of online activity is important:
App name.
Website URL.
APK download link.
Google Play or App Store link, if any.
Facebook page.
Messenger account.
Telegram account.
Viber number.
WhatsApp number.
Email address.
SMS number.
IP-related data, if available.
Payment account details.
Screenshots of conversations.
The online nature of the scam should be documented.
IX. Illegal or Unauthorized Lending
Some online lending operators may not be properly registered, licensed, or authorized. Others may be legitimate companies whose names are being impersonated by scammers.
A victim should distinguish between:
A licensed lending company committing abusive practices.
An unlicensed lending app.
A fake app pretending to be a real lending company.
A scammer using a personal account and fake loan documents.
A foreign-based scam platform targeting Filipinos.
If the lender is fake or unauthorized, complaints may involve fraud and regulatory reporting. If the lender is legitimate but abusive, complaints may involve lending regulation, unfair collection practices, data privacy, and consumer protection.
X. Data Privacy Concerns
Many fake loan apps request excessive phone permissions, such as access to contacts, photos, messages, call logs, camera, microphone, and storage. After the victim refuses to pay more fees, scammers may threaten to contact relatives, employers, friends, or colleagues.
Possible data privacy violations include:
Unauthorized access to contacts.
Use of personal data for harassment.
Public shaming.
Sending defamatory messages to contacts.
Threatening disclosure of personal information.
Using ID photos for fraud.
Collecting unnecessary personal data.
Refusing to delete personal data.
Sharing borrower information without consent or lawful basis.
Victims should immediately revoke app permissions, uninstall the app, change passwords, and warn contacts if necessary.
XI. Harassment and Abusive Collection
Even when a person has a real loan, collection must be lawful. In scam cases, harassment is even more abusive because the supposed lender may not have released any loan at all.
Harassment may include:
Threats of arrest.
Threats of public posting.
Threats to message all contacts.
Calling employers.
Sending insulting messages.
Sending fake legal notices.
Creating group chats to shame the victim.
Threatening physical harm.
Claiming police or court action without basis.
Using obscene or degrading language.
Victims should preserve all harassment messages and report them.
XII. Immediate Rule: Do Not Pay More
The most important immediate step is to stop paying. Deposit-to-withdraw scams are designed to extract repeated payments. Paying one fee rarely solves the problem. It usually triggers another fee.
The victim may be told:
“Pay this final fee.”
“Your previous payment was too late.”
“You entered the wrong reference number.”
“You must pay again to refresh the system.”
“You must pay a higher fee because of penalty.”
“You are almost done.”
These are common escalation tactics.
Once fraud is suspected, stop sending money and focus on evidence preservation and reporting.
XIII. Immediate Step 1: Preserve Evidence
Evidence must be preserved before the app, account, or website disappears.
Save:
Screenshots of the app dashboard.
Screenshots of the approved loan amount.
Screenshots of withdrawal error.
Screenshots of fee demands.
All chat messages.
SMS messages.
Emails.
Voice notes.
Call logs.
Payment receipts.
E-wallet transaction records.
Bank transfer records.
Account names and numbers.
App download link.
App permissions.
Terms and conditions.
Loan agreement, if any.
Fake legal notices.
Threat messages.
Social media profiles.
Customer service numbers.
Take screenshots that show date, time, sender, recipient, and full message context.
XIV. Immediate Step 2: Record Payment Details
Make a table of every payment made.
Include:
Date.
Time.
Amount.
Payment platform.
Recipient name.
Recipient number or account.
Reference number.
Purpose stated by scammer.
Screenshot or receipt file name.
Example:
March 1, 2026 — ₱2,000 — GCash — Juan Santos — 09xxxxxxxxx — “activation fee” — Ref. No. 123456.
March 2, 2026 — ₱5,000 — Maya — Maria Cruz — 09xxxxxxxxx — “withdrawal unlock fee” — Ref. No. 789101.
This table will help banks, e-wallet providers, police, and prosecutors understand the case.
XV. Immediate Step 3: Contact the E-Wallet or Bank
If payment was made through GCash, Maya, bank transfer, InstaPay, PESONet, remittance, or another channel, report the transaction immediately.
Ask the provider to:
Record the fraud report.
Freeze or flag the recipient account if possible.
Investigate the transaction.
Provide a case or ticket number.
Advise on dispute process.
Preserve transaction records.
Time matters. If the recipient has already withdrawn or transferred the funds, recovery becomes harder.
Do not wait for the scammer to promise a refund.
XVI. Can the Bank or E-Wallet Reverse the Payment?
Recovery through reversal is not guaranteed. If the victim voluntarily sent the money, the provider may need investigation, recipient account freeze, or law enforcement request before funds can be returned.
Factors affecting recovery include:
How quickly the fraud was reported.
Whether funds remain in the recipient account.
Provider policies.
Completeness of evidence.
Whether the recipient account is verified.
Whether law enforcement becomes involved.
Whether there are multiple victims.
Whether the transfer was final.
Even if reversal is uncertain, reporting immediately is still important because it may help freeze remaining funds and identify the recipient.
XVII. Immediate Step 4: Secure Your Accounts
Victims should assume that personal information may be compromised.
Take these steps:
Change passwords for email, banking apps, and e-wallets.
Enable two-factor authentication.
Remove unknown devices from accounts.
Revoke permissions granted to the loan app.
Uninstall the app.
Scan the phone for malware.
Update the phone operating system.
Do not click links sent by the scammer.
Do not install APK files from unknown sources.
Monitor bank and e-wallet activity.
If IDs were submitted, monitor for identity misuse.
XVIII. Immediate Step 5: Revoke App Permissions
Before uninstalling, check permissions if possible. The app may have accessed:
Contacts.
Photos.
Files.
SMS.
Call logs.
Camera.
Microphone.
Location.
Revoke all permissions. Then uninstall. If the app was installed through an APK outside official stores, consider a full device security check or factory reset after backing up important files.
If the app accessed contacts, warn close contacts that scammers may message them.
XIX. Immediate Step 6: Warn Contacts if Harassment Is Likely
If the app accessed your contacts, send a short warning to family, employer, and close contacts.
Example:
“My phone data may have been accessed by a fake online loan app. Please ignore any messages claiming I owe money or asking you to pay. Do not engage or send money. Please send me screenshots if you receive anything.”
This helps prevent further scams and preserves evidence.
XX. Immediate Step 7: Report to Authorities
A victim may report to:
Cybercrime authorities.
Police or NBI cybercrime units.
Prosecutor’s office.
Financial regulators.
Consumer protection offices.
Data privacy regulator, if personal data was misused.
The proper forum depends on whether the complaint is criminal, regulatory, financial, or data privacy-related.
For urgent fund recovery, report first to the payment provider. For investigation and prosecution, report to law enforcement or prosecutor. For abusive data use, report to the data privacy regulator. For lending app regulation, report to the appropriate financial regulator.
XXI. Reporting to Law Enforcement
A criminal complaint or report should be factual and organized.
Bring or prepare:
Government ID.
Written complaint narrative.
Payment table.
Screenshots.
Receipts.
App details.
Recipient account details.
Chat records.
Bank or e-wallet ticket number.
Proof no loan was received.
Threat messages.
Witnesses, if any.
Ask for a complaint reference number or blotter/report copy.
XXII. Reporting to the E-Wallet Provider
When reporting to an e-wallet provider, include:
Your account name and number.
Transaction reference number.
Recipient account name and number.
Date and time.
Amount.
Screenshots of scam demand.
Statement that the payment was induced by fraud.
Request to freeze or investigate recipient account.
Police report, if already available.
Follow up using the ticket number.
XXIII. Reporting to the Bank
If payment was made by bank transfer, report to your bank immediately. If possible, also identify the receiving bank and ask your bank about the interbank fraud reporting process.
Provide:
Transaction confirmation.
Recipient account details.
Time of transfer.
Amount.
Narrative of scam.
Screenshots.
Request for recall or fraud report.
Banks may not guarantee recovery, but early reporting improves chances.
XXIV. Reporting to the Platform or App Store
If the app is on an official app store, report it to the platform. If it is a Facebook page, Telegram channel, website, or ad, report the page or account.
This may help prevent others from being victimized.
Preserve the page link before reporting because the page may disappear.
XXV. Complaint-Affidavit for Estafa or Cyber-Fraud
A formal complaint-affidavit should state:
Your full name and personal details.
How you found the lending app.
Name of app or agent.
Date you applied.
Loan amount promised.
Fees demanded.
Payments made.
Recipient accounts.
Statements made by the scammer.
Proof that no loan was released.
Threats or harassment received.
Damage suffered.
Request for investigation and prosecution.
Attach evidence as annexes.
Use clear dates and exact amounts.
XXVI. Sample Complaint Narrative
A complaint may be written like this:
“On March 1, 2026, I applied for a loan through an online lending app called [name]. The app stated that I was approved for ₱50,000. When I attempted to withdraw, the app required me to pay ₱2,000 as an activation fee. I paid through GCash to [name/number], as shown in Annex A. After payment, the agent demanded another ₱5,000 for account correction, claiming my bank account was frozen. I paid again, as shown in Annex B. No loan proceeds were ever received in my bank or e-wallet account. Instead, the agent demanded more money and threatened to contact my relatives. I believe I was deceived into paying money through a fake loan release scheme.”
This format is factual and useful.
XXVII. Annex List for Evidence
Organize attachments as:
Annex A — Screenshot of loan approval.
Annex B — Screenshot of withdrawal failure.
Annex C — Chat demanding activation fee.
Annex D — GCash receipt for ₱2,000.
Annex E — Chat demanding correction fee.
Annex F — Bank transfer receipt for ₱5,000.
Annex G — Bank statement showing no loan release.
Annex H — Threat messages.
Annex I — App profile or website screenshot.
Annex J — Report ticket from e-wallet provider.
This makes the complaint easier to evaluate.
XXVIII. Proof That No Loan Was Received
To prove scam, show that no loan proceeds were actually released.
Evidence includes:
Bank statement.
E-wallet transaction history.
Screenshots of account balance.
Certification from bank, if available.
Transaction history covering the relevant dates.
App withdrawal failure screenshot.
Messages admitting funds were not released.
If the app claims money was released to an internal wallet, emphasize that no actual withdrawal to your bank or e-wallet occurred.
XXIX. If the Scammer Says You Owe the Loan
A scammer may claim that you owe the approved amount even though it was never released. Do not panic.
Respond carefully, if at all:
“I did not receive any loan proceeds. Your demand for payment after refusing release is disputed. I have reported the matter to my payment provider and authorities.”
Do not admit debt. Do not sign settlement. Do not pay more.
Preserve all threats and demands.
XXX. If the Scammer Threatens Arrest
Nonpayment of an ordinary loan is generally not a basis for immediate arrest. Scammers use arrest threats to scare victims into paying.
If no loan was released and the transaction is fraudulent, the victim should report the threat.
However, avoid responding with threats. Preserve evidence and use official complaint channels.
XXXI. If the Scammer Threatens to Sue
Anyone can threaten to sue, but a scammer who never released money will have difficulty proving a valid debt. The victim should preserve evidence that:
No loan was released.
The payments were demanded as advance fees.
The app kept requiring more deposits.
The supposed debt is disputed.
If a real legal notice or summons is received, respond properly. Fake legal notices are common.
XXXII. If the Scammer Threatens to Contact Your Employer
This may be harassment and possible misuse of personal data. Preserve the threat. Warn your employer or HR if necessary.
A short message to HR may help:
“I may be targeted by a fake online lending app. Please disregard any messages from unknown persons claiming debt or asking for information. I am handling the matter through proper channels.”
This protects reputation and prevents panic.
XXXIII. If the Scammer Contacts Your Contacts
Ask contacts to send screenshots. Tell them not to engage.
Save:
Sender number.
Message content.
Date and time.
Recipients.
Any defamatory statements.
This may support data privacy and harassment complaints.
XXXIV. If Your ID Was Used for Another Scam
If you submitted ID and selfie, scammers may use them to open accounts, borrow money, or deceive others.
Steps:
File a police or cybercrime report.
Notify your bank and e-wallet providers.
Monitor accounts.
Consider replacing compromised IDs where appropriate.
Keep a record that your ID was submitted to a scam app.
If someone contacts you about a transaction you did not make, preserve evidence and deny unauthorized use in writing.
XXXV. If the App Was Installed Outside Official App Stores
Apps installed through APK files are risky. They may contain malware or excessive permissions.
Steps:
Uninstall the app.
Revoke permissions.
Change passwords.
Scan device.
Consider factory reset.
Avoid logging into banking apps until device is secure.
Do not install “loan verification” apps from links sent by agents.
XXXVI. If the App Is Impersonating a Real Company
Scammers may use the name, logo, or certificate of a legitimate lender.
Check whether:
The app’s payment account belongs to the company.
The website domain is official.
The customer service number matches official channels.
The app is listed in official stores.
The lender confirms the transaction.
If impersonation is suspected, report to the real company and attach screenshots. The real company may issue a denial or help report the fake page.
XXXVII. If the Lender Is Registered but the Agent Is Fake
Sometimes a real lending company’s name is used by fake agents. The victim may be communicating with a scammer who is not connected to the company.
Evidence:
Personal e-wallet payment instructions.
Unofficial Telegram or Messenger account.
Fake employee ID.
Wrong website.
Unofficial email.
The victim should report to the company and ask whether the agent or transaction is legitimate.
XXXVIII. If the Lender Is Real but Practices Are Abusive
If the lender is real and actually released a loan, but demands unlawful fees, harasses contacts, or misuses personal data, complaints may involve:
Regulatory complaint.
Data privacy complaint.
Consumer protection complaint.
Civil complaint.
Criminal complaint if threats or fraud exist.
The borrower should separate legitimate debt from abusive or illegal conduct. A real loan does not authorize harassment or privacy violations.
XXXIX. Recovery of Money: Possible but Not Guaranteed
Victims often ask: “Can I recover the deposit?”
Possible recovery routes include:
Bank or e-wallet freeze and reversal.
Voluntary refund by recipient.
Criminal restitution.
Civil action for recovery of sum.
Small claims, if proper.
Settlement after complaint.
Recovery from a known scammer.
However, recovery is difficult if funds were quickly withdrawn, transferred through mule accounts, converted to crypto, or sent abroad.
The faster the victim reports, the better the chance.
XL. Mule Accounts
Scammers often use “mule accounts,” meaning bank or e-wallet accounts under other people’s names used to receive scam proceeds. The account holder may be:
A willing participant.
A person paid to lend an account.
A victim whose account was compromised.
A fake identity account.
A person who sold a SIM or wallet.
The named recipient may still be important for investigation. Preserve account names and numbers.
XLI. Can the Recipient Account Holder Be Liable?
If the recipient knowingly allowed their account to be used for fraud, they may face liability. Even if they claim they did not know, they may be investigated.
Victims should include recipient account details in complaints. Authorities and providers can trace movement of funds.
XLII. Small Claims as a Recovery Option
If the recipient is identified and the claim is for a sum of money, small claims may be considered. However, small claims may not be effective if:
The recipient is fake.
The address is unknown.
The account holder is only a mule.
The case requires complex fraud investigation.
The amount is large or involves criminal issues.
The scammer cannot be located.
Small claims can recover money in some situations, but it does not replace criminal investigation for organized scams.
XLIII. Civil Case for Sum of Money or Damages
A civil case may seek refund and damages if the scammer is known. But civil litigation may cost more than the amount lost, unless the amount is substantial.
Civil remedies are more practical when:
The scammer is identified.
The amount is significant.
There are assets to recover from.
There are multiple victims.
There is clear documentary evidence.
XLIV. Criminal Restitution
In a criminal case, the court may order restitution or civil liability if the accused is convicted. This can help recover losses, but criminal cases may take time and depend on locating and prosecuting the offender.
XLV. Group Complaints
If several victims were scammed by the same app, group complaints can be stronger.
Advantages:
Shows pattern.
Supports fraudulent scheme.
Helps identify total damage.
Encourages law enforcement attention.
Connects recipient accounts.
Helps regulators act against app.
Each victim should still provide individual evidence and payment proof.
XLVI. Avoid “Recovery Scams”
After being scammed, victims may be targeted again by people claiming they can recover the money for a fee.
Warning signs:
“Pay recovery fee first.”
“I know someone inside GCash/bank.”
“Pay legal processing fee.”
“Guaranteed refund in 24 hours.”
“Send your OTP.”
“Give remote access to your phone.”
“Install this recovery app.”
These are often secondary scams. Legitimate recovery through banks, law enforcement, or courts does not require giving OTPs or paying strangers.
XLVII. Never Share OTP
No legitimate bank, e-wallet, police officer, lawyer, or regulator should ask for your OTP. Sharing OTP can lead to account takeover.
If someone asks for OTP, password, PIN, or screen sharing, treat it as a scam.
XLVIII. SIM Registration and Scam Tracing
Scammers may use registered SIMs, but SIM registration does not guarantee easy recovery. Fake documents, stolen identities, mule accounts, and foreign numbers may still be involved.
Still, phone numbers should be reported. They may help trace patterns.
XLIX. If the Scammer Used Cryptocurrency
Some scams require payment through crypto. Recovery is more difficult.
Preserve:
Wallet address.
Transaction hash.
Exchange account used.
Screenshots.
Chat instructions.
Date and amount.
Report to the exchange if known and to law enforcement. Crypto transfers can sometimes be traced, but recovery is difficult once moved.
L. If the Scammer Used Remittance Centers
If payment was made through remittance, preserve:
Receipt.
Recipient name.
Claim reference number.
Branch.
Date and time.
Amount.
ID requirements.
Report immediately to the remittance company and law enforcement. If the money has not yet been claimed, cancellation may be possible. If already claimed, records may help identify the recipient.
LI. If the Scammer Used Cash-In or Cash-Out Agents
Some scammers ask victims to send money to cash-in agents or merchants. Preserve the merchant details and transaction reference.
Report to the payment provider. Agents may have records or CCTV.
LII. If the App Demands More Money After Complaint
Do not pay. Tell them the matter has been reported. Preserve messages.
Scammers may threaten higher penalties after learning of a complaint. This can strengthen evidence of coercion and fraud.
LIII. If the Scam App Shows Your “Loan” as Overdue
Take screenshots. If no loan was received, the overdue balance is not proof of debt. It may be part of the scam.
Do not pay to “clear” a fake balance. Instead, document it for complaint.
LIV. If the App Sends Fake Demand Letters
Fake demand letters may contain:
Fake law office name.
Fake police seal.
Fake court seal.
Threat of arrest.
Threat of barangay blotter.
Threat of NBI record.
Immediate payment demand.
No real case number.
No address or verifiable lawyer.
Preserve the letter. Do not panic. Verify independently if it names a real law office or agency.
LV. If the Scammer Uses Government Logos
Using government logos to make a fake loan demand look official may support fraud. Preserve screenshots and report.
Government agencies do not usually demand loan unlocking fees through personal e-wallet accounts.
LVI. If the Scammer Claims to Be From a Court
Courts do not collect private loan unlocking fees through mobile wallets. If a message claims to be from a court, ask for official case details and verify independently. Do not click links.
LVII. If the Scammer Claims to Be Police or NBI
Police and NBI do not collect private loan release fees. If someone claims to be law enforcement and demands payment, preserve evidence and report impersonation.
LVIII. If the Scammer Threatens Barangay Action
A barangay may mediate certain disputes, but it cannot imprison someone for a fake loan fee. A threat to shame or report the victim to the barangay may be harassment.
If a real barangay notice is received, attend or respond properly, but bring evidence that no loan was received.
LIX. If the Victim Actually Received a Loan From Another App
Many victims are dealing with multiple apps. Separate each transaction.
For each app, determine:
Was money actually released?
How much was released?
What fees were paid?
What repayment was agreed?
Was there harassment?
Was data misused?
Do not confuse a real loan with a scam deposit. A real debt should be handled separately from fraudulent advance-fee demands.
LX. If the Victim Borrowed From a Legitimate Online Lender and Was Also Scammed
A person may have legitimate online loans and also fall victim to a fake loan app. The existence of legitimate debts does not make the scam valid. Document each separately.
LXI. If the Victim Is Afraid of Public Shame
Scammers rely on shame. Victims should remember that being scammed is not a crime. Paying a deposit under deception does not make the victim a criminal.
The better response is to preserve evidence, warn contacts, and report.
LXII. If the Victim Is a Minor
If a minor was targeted, parents or guardians should act immediately. The collection of a minor’s data, threats, and demands may create additional issues.
Report to authorities and secure the minor’s phone and accounts.
LXIII. If the Victim Is an Employee
If the scammer threatens the workplace, the victim may inform HR or a supervisor in advance. Keep the explanation short and factual.
Employers should not discipline employees merely because scammers send harassment messages. The victim should provide proof of scam if needed.
LXIV. If the Victim Is a Public Employee
Public employees may fear reputational harm. They should document the scam and report. If contacts in the office receive messages, preserve them.
Do not use government resources or authority for personal retaliation. Use proper complaint channels.
LXV. If the Victim Is an OFW
OFWs may be targeted through online apps while abroad or while family members in the Philippines transact for them.
Steps:
Preserve evidence.
Report to payment providers.
Authorize a representative in the Philippines if filing complaints.
Use consular assistance if identity documents are misused abroad.
Monitor Philippine accounts and e-wallets.
LXVI. If Family Members Paid on the Victim’s Behalf
If a family member sent the deposit, that person should provide:
Payment receipt.
Affidavit or statement.
Screenshots of instructions.
Proof of relation to victim.
The complaint should include both the victim and the person who paid.
LXVII. If the Victim Used Borrowed Money to Pay the Scam
The victim may still owe the person or lender from whom they borrowed money. That separate obligation does not make the scam valid.
If claiming damages, proof of borrowed funds may show financial harm.
LXVIII. Psychological Pressure and Coercion
Scammers use panic, urgency, shame, and fear. They may say the victim will lose the loan, face charges, or be publicly humiliated.
Victims should slow down. A legitimate financial transaction allows verification. A scam demands immediate payment and secrecy.
LXIX. The “Final Payment” Lie
A common scam pattern is repeated “final payments.”
Sequence:
Activation fee.
Correction fee.
Tax fee.
Insurance fee.
Anti-fraud fee.
Unlocking fee.
Penalty fee.
Refund processing fee.
Every fee is said to be the last. It is not. Once the victim pays, a new obstacle appears.
LXX. Refund Processing Fee Scam
After the victim asks for a refund, the scammer may demand a refund processing fee. This is another scam.
Do not pay money to recover money from the same scammer.
LXXI. Loan Cancellation Fee Scam
The scammer may say the victim must pay to cancel the loan. If no loan was released, a cancellation fee is suspicious.
Do not pay. Preserve the demand as evidence.
LXXII. Account Freeze Fee Scam
The scammer may claim the account is frozen and needs a fee. Banks and e-wallets do not usually require payment to scammers to unfreeze loan proceeds.
Verify directly with your bank, not through the app agent.
LXXIII. Wrong Name Fee Scam
The scammer may say your name, bank number, or ID has an error and payment is needed to correct it. Legitimate correction processes do not usually require sending money to personal accounts under threat.
LXXIV. Anti-Money Laundering Fee Scam
Scammers misuse AML language. They may say funds are blocked by AML and require payment. This is suspicious. Real AML compliance does not work by paying random fees to release personal loan proceeds.
LXXV. Tax Clearance Fee Scam
Taxes are not normally paid by sending money to a personal e-wallet account of a loan agent. If tax is claimed, demand official documentation and verify independently.
LXXVI. Insurance Fee Scam
Loan insurance, if legitimate, should be disclosed in loan terms and supported by official documentation. Repeated insurance fees before release are suspicious.
LXXVII. Security Deposit Scam
A loan that requires a borrower to deposit a large amount to prove ability to repay may be a scam, especially if paid through unofficial channels.
LXXVIII. App Wallet Illusion
The app may show:
“Approved: ₱80,000.”
“Wallet balance: ₱80,000.”
“Withdraw now.”
“Withdrawal failed.”
This is only a display. It does not prove actual funds. Scammers use app interfaces to create false trust.
LXXIX. Fake Customer Service
Fake apps often have customer service agents who communicate through Messenger, Telegram, WhatsApp, Viber, or in-app chat. They may use scripted responses and official-looking names.
Preserve all agent names and numbers.
LXXX. Fake Loan Agreement
The app may show a loan agreement even before release. Read it carefully.
Issues may include:
Borrower shown as owing money not received.
Hidden fees.
Fake company details.
Wrong address.
No license details.
Unreasonable penalties.
Automatic access to contacts.
Consent to harassment.
Even if the victim clicked “agree,” fraud and non-release of funds may still be raised.
LXXXI. Clicking “Agree” Does Not Validate Fraud
A scammer cannot rely on a clickwrap agreement to justify fraud. If the app deceived the victim and never released money, the victim can challenge the supposed obligation.
However, preserve screenshots of the terms before uninstalling if possible.
LXXXII. If the App Has Access to Contacts
Data exposure can be more damaging than the cash loss. Victims should:
Warn contacts.
Save harassment messages.
File data privacy complaint if contacts are misused.
Avoid paying to stop harassment because payment may not stop it.
Document all contact misuse.
LXXXIII. If the App Posts on Social Media
If the scammer posts defamatory or humiliating content:
Screenshot the post.
Save URL.
Record date and time.
Report to platform.
Ask witnesses to screenshot.
File complaint if necessary.
Do not engage in public arguments that may worsen the situation.
LXXXIV. If the App Creates Group Chats
Some abusive lenders create group chats with the victim’s contacts. Preserve:
Group name.
Participants.
Messages.
Sender numbers.
Screenshots showing defamatory claims.
This supports harassment and privacy complaints.
LXXXV. If the App Sends Edited Photos
Some scammers edit borrower photos with defamatory text. Preserve the image and sender details. This may support cyber-related complaints and data privacy claims.
LXXXVI. If the App Threatens Physical Harm
Threats of physical harm should be reported to law enforcement immediately. Preserve messages and avoid meeting the scammer.
LXXXVII. If the Scammer Knows Your Address
If the scammer has your address, stay alert but do not panic. Most online scammers rely on remote threats. If actual persons appear at your home, do not engage violently. Call authorities and document.
LXXXVIII. If Collectors Visit
If collectors visit claiming to represent the app:
Ask for company ID.
Ask for written authority.
Do not surrender cash without official receipt.
Do not allow entry into your home.
Record details if safe.
Call authorities if threatened.
If no loan was received, state that the claim is disputed.
LXXXIX. If the App Is a “Loan Shark” Rather Than Pure Scam
Some apps release small amounts but charge abusive fees and harass borrowers. This is different from a pure deposit-to-withdraw scam. Still, the borrower may have remedies for unfair practices, harassment, and privacy violations.
Document:
Amount actually received.
Fees deducted.
Repayment demanded.
Interest rate.
Threats.
Contact misuse.
A borrower may owe the principal legally received, but may challenge illegal charges and abusive collection.
XC. If the App Deducts Fees From Loan Proceeds
Legitimate lenders may deduct disclosed fees from proceeds, but excessive or hidden deductions may be abusive. If no funds are released and the borrower is still asked to deposit more, it is more likely a scam.
XCI. If the Loan Proceeds Were Released but Less Than Promised
If the borrower received a smaller amount than promised because fees were deducted, examine:
Loan agreement.
Disclosure statement.
Interest.
Fees.
Net proceeds.
Repayment amount.
Payment schedule.
If the terms are abusive or undisclosed, file regulatory complaints.
XCII. If the App Claims You Consented to Contact Access
Consent must be valid, specific, informed, and limited to lawful purposes. Consent to access contacts does not necessarily allow harassment, public shaming, or unlawful disclosure.
XCIII. If the App Refuses Data Deletion
The victim may request deletion or cessation of processing, but scam apps may ignore requests. Preserve the request and file privacy complaint if data misuse occurs.
XCIV. If the App Is Already Removed
Even if the app disappears, victims can still report using screenshots, payment records, phone numbers, account names, and links.
App removal does not erase the crime.
XCV. If the App Changes Name
Scam apps often change names. Preserve old and new names, logos, contact numbers, and payment accounts. Group complaints may reveal patterns.
XCVI. If the Scammer Uses Multiple Accounts
List all accounts used. Scammers often rotate recipient accounts to avoid detection.
Your payment table should include every account.
XCVII. If the Recipient Name Is Different From the App
This is a red flag. A legitimate lending company should not normally require payment to random personal accounts.
Include this in the complaint.
XCVIII. If the Scammer Sends a QR Code
Save the QR code screenshot. It may contain merchant or account information useful for tracing.
XCIX. If the Scammer Deletes Messages
Use backups if available. Ask contacts for screenshots. Payment records remain useful even if chats disappear.
Some messaging apps allow message export. Export before deleting.
C. If the Victim Deleted the App
If the app was deleted before screenshots were taken, gather what remains:
Payment receipts.
SMS.
Emails.
Download history.
Browser history.
App store history.
Messages from agents.
Bank statements.
Contact harassment screenshots.
File a complaint with available evidence.
CI. If the Victim Changed Phone
Back up old messages if possible. Keep the old device if it contains evidence. Do not factory reset until evidence is preserved.
CII. If the Victim Paid Through Someone Else’s Account
If a friend or relative sent payment, include that person’s statement and receipt. The scam still affected the victim, but payment proof is under another name.
CIII. If the Victim Paid Cash to a Person
If cash was paid:
Identify the person.
Location.
Date and time.
Witnesses.
Receipt, if any.
CCTV location.
Messages arranging meetup.
Cash payments are harder to trace but still reportable.
CIV. If the Victim Met an Agent
Preserve:
Agent’s name.
Phone number.
Photos, if lawfully taken.
Meeting place.
CCTV availability.
Receipts.
Witnesses.
Transportation records.
Fake agents may be traceable.
CV. If the App Uses a Real Office Address
Verify independently. Some scammers use fake addresses or addresses of unrelated companies. If the office exists, do not confront alone. Use legal reporting channels.
CVI. If the App Uses a Fake SEC Certificate
Fake registration certificates are common. Preserve the certificate image and report. A certificate alone does not prove legitimacy.
CVII. If the App Uses a Business Permit
Business permits can be faked or unrelated. A local business permit is not the same as authority to operate as a lending company.
CVIII. If the App Uses Celebrity Endorsements
Scammers may use fake endorsements. Do not rely on ads or edited videos. Preserve the ad and report.
CIX. If the App Uses Fake Reviews
Fake reviews are common. Look for repeated wording, new accounts, and unrealistic claims. But for legal purposes, focus on your payment and communication evidence.
CX. If the Scam Came From Facebook Ads
Preserve:
Ad screenshot.
Page name.
Page URL.
Ad library details, if available.
Messenger conversation.
Payment instructions.
Report to the platform and authorities.
CXI. If the Scam Came From SMS
Preserve:
Sender number or name.
Message content.
Link.
Date and time.
Do not click further links. Report spam and include in complaint.
CXII. If the Scam Came From Telegram
Telegram scammers may delete chats. Screenshot and export quickly. Preserve usernames, group names, invite links, and payment instructions.
CXIII. If the Scam Came From Viber or WhatsApp
Preserve phone numbers, profile photos, group details, messages, and call logs.
CXIV. If the Scam Came From a Website
Preserve:
URL.
Screenshots.
Domain details if available.
Terms and conditions.
Contact information.
Payment page.
Fake certificates.
Do not enter more personal data.
CXV. If the Scam Came From an APK Link
Preserve the link and sender. Do not share the APK with others except authorities or cybersecurity professionals. It may contain malware.
CXVI. If the Victim Gave Bank Login Details
If login details were shared, act immediately:
Change password.
Call bank.
Freeze account if needed.
Check transactions.
Replace compromised cards.
Report unauthorized transactions.
Enable 2FA.
Do not wait.
CXVII. If the Victim Gave Card Details
If card details were shared:
Call bank.
Block or replace card.
Monitor transactions.
Dispute unauthorized charges.
Change online banking credentials.
Scammers may charge later.
CXVIII. If the Victim Gave Selfie With ID
This may be used for account opening or identity verification. File a report and keep a copy. If identity misuse later occurs, the report helps show prior compromise.
CXIX. If the Victim Gave Signature
A signature may be misused. Monitor for unauthorized documents or loans. If forged documents appear, file complaint immediately.
CXX. If the Victim Gave Contacts
Warn contacts and document misuse. Contacts should not pay anything on the victim’s behalf without verification.
CXXI. If the Victim Gave Employer Details
Warn HR or supervisor if threats are likely. Ask them to preserve any messages received.
CXXII. If the Victim Gave Address and Family Details
Warn household members not to accept visitors or pay anyone claiming to collect. Keep calm and document.
CXXIII. If the Victim Gave Bank Account Number Only
A bank account number alone does not usually allow withdrawal, but it may be used for scam claims. Monitor the account and beware of phishing.
CXXIV. If the Victim Gave OTP
If OTP was given, assume compromise. Immediately call the bank or e-wallet and secure the account.
CXXV. If the Victim Allowed Screen Sharing
Screen sharing can expose passwords and OTPs. Change passwords immediately and check account activity.
CXXVI. If the Victim Installed Remote Access App
Uninstall remote access apps, change passwords using a clean device, and contact banks/e-wallets. Consider factory reset.
CXXVII. If the Victim’s E-Wallet Was Taken Over
Report to provider immediately. Provide:
Account number.
Unauthorized transactions.
Time of account takeover.
Screenshots.
Device details.
Police report, if available.
Ask for account freeze and investigation.
CXXVIII. If Unauthorized Loans Were Taken in Victim’s Name
If identity was used to obtain loans:
Request loan documents from lender.
Deny unauthorized transaction in writing.
File police/cybercrime report.
Submit identity compromise evidence.
Ask lender to suspend collection pending investigation.
File regulatory and privacy complaints if needed.
CXXIX. If the Victim Is Listed in a Credit Database
If a fake loan affects credit reporting, dispute the entry with the lender and credit information entity if applicable. Provide proof that no loan was received or that identity was misused.
CXXX. If the Victim Receives Demand From a Collection Agency
Ask for:
Name of lender.
Loan agreement.
Proof of disbursement.
Statement of account.
Authority of collector.
Do not pay unless the debt is verified. If no loan was received, dispute in writing.
CXXXI. If the Collection Agency Is Legitimate but Debt Is Fake
A legitimate collector may have been given false data. Send a dispute letter and evidence. Ask them to cease collection until verification.
CXXXII. If the Collection Agency Harasses Contacts
Preserve messages and file complaints. Even legitimate collection must follow lawful and fair practices.
CXXXIII. If the Victim Wants to Negotiate
Negotiation with scammers is usually not useful. They may use negotiation to demand more payments.
Negotiate only through verifiable official channels if dealing with a legitimate lender or known account holder.
CXXXIV. If the Victim Wants to Recover Through the Recipient Directly
Do not threaten or harass the recipient account holder. A direct message may alert them to withdraw funds or disappear. It is often better to report to the provider and authorities first.
CXXXV. If the Victim Knows the Recipient
If the recipient is known, preserve evidence and consider demand letter, barangay conciliation if applicable, civil action, or criminal complaint. Do not rely only on verbal promises to refund.
CXXXVI. Demand Letter for Refund
A demand letter may be useful if the recipient or operator is identifiable.
It should state:
Amount paid.
Date and mode of payment.
Fraudulent representation.
Demand for refund.
Deadline.
Reservation of rights.
Demand letters should be factual and not defamatory.
CXXXVII. Sample Demand Letter Language
“You represented that I had to pay ₱[amount] as a condition for withdrawal of an approved loan. I paid the amount on [date] through [payment channel]. No loan proceeds were released, and additional payments were demanded. I demand refund of ₱[amount] within [number] days. I reserve all rights to file civil, criminal, regulatory, and data privacy complaints.”
CXXXVIII. Barangay Complaint
A barangay complaint may be useful if the recipient is known and lives in the same city or municipality, and the dispute is suitable for barangay conciliation. However, barangay conciliation cannot replace cybercrime investigation when the scam is online or organized.
If the scammer is unknown, abroad, or using fake identity, barangay process is usually not useful.
CXXXIX. Police Blotter
A police blotter records the incident but is not the same as a full criminal complaint. It may help document the date of report.
For investigation and prosecution, a complaint-affidavit and evidence may still be needed.
CXL. Prosecutor’s Complaint
A complaint before the prosecutor is more formal. The victim must submit sworn statements and evidence. The prosecutor determines whether criminal charges should be filed in court.
Legal assistance is useful for substantial losses.
CXLI. Regulatory Complaint
If a lending company is identifiable, file a regulatory complaint. Include:
Company name.
App name.
Loan agreement.
Payment demands.
Proof of release or non-release.
Harassment evidence.
Data privacy evidence.
Screenshots.
Regulatory agencies may suspend, penalize, or investigate covered entities, but they may not always recover money directly for the victim.
CXLII. Data Privacy Complaint
If the app misused contacts, photos, IDs, or personal information, file a data privacy complaint.
Evidence should show:
Data collected.
Permissions requested.
Messages to contacts.
Public shaming.
Unauthorized disclosure.
Threats.
Requests for deletion ignored.
The complaint should explain how personal data was used unlawfully.
CXLIII. Consumer Protection Complaint
If the app or lender used deceptive, unfair, or abusive practices, a consumer complaint may be appropriate. Include all transaction and communication evidence.
CXLIV. What a Victim Should Not Do
Do not:
Pay more fees.
Share OTPs.
Install recovery apps.
Send more IDs.
Threaten the scammer.
Post private data publicly.
Delete evidence.
Factory reset before preserving evidence.
Ignore real summons or official notices.
Believe promises of guaranteed refund.
Borrow more money to pay scam fees.
CXLV. How to Communicate With Scammers After Discovery
The safest approach is minimal communication.
Possible message:
“I dispute this transaction. No loan proceeds were released to me. I will not pay further fees. I have preserved the records and reported the matter to the payment provider and proper authorities.”
After that, stop engaging unless needed for evidence. Do not argue emotionally.
CXLVI. If the Scammer Offers Refund
Be careful. They may ask for another fee or OTP.
A real refund should not require:
OTP.
Password.
Remote access.
Processing fee.
New deposit.
Bank login.
If they claim they will refund, ask them to send money back through the original channel. Do not provide sensitive information.
CXLVII. If the Scammer Offers Partial Refund
Partial refund may be a tactic to prevent reporting. If accepted, document it. Do not waive rights unless fully compensated and advised.
CXLVIII. If the Scammer Apologizes
An apology may be useful evidence if it admits no loan was released or that fees were wrongly demanded. Screenshot it.
CXLIX. If the Scammer Blocks You
Being blocked after payment supports the fraud narrative. Screenshot the blocked status if possible and preserve payment records.
CL. If the App Stops Working
Take screenshots of error messages. Save app name and download source. The disappearance of the app may support scam allegations.
CLI. If the Website Goes Offline
Use saved screenshots and payment records. Do not assume the case is lost. Websites can disappear quickly.
CLII. If You Have No Screenshots
You may still file a report with:
Payment receipts.
Bank records.
Phone numbers.
App name.
Memory of events.
Witnesses.
Contact harassment screenshots.
Provider records.
But screenshots strengthen the complaint, so preserve whatever remains.
CLIII. If Only Cash Loss Is Small
Even small losses should be reported, especially if the app targets many victims. A small individual amount can be part of a large fraud scheme.
CLIV. If Loss Is Large
If the amount is large, consult a lawyer, file formal complaints quickly, and coordinate with banks or e-wallets for urgent freezing of recipient accounts.
CLV. If Multiple Payments Were Made Over Several Days
Report all payments. Scammers may use different accounts. Include the full timeline.
CLVI. If Payment Was Made to Different Names
This suggests a network. Include every name and account in the complaint.
CLVII. If the Scammer Used a “Company Account”
Even if the recipient appears to be a company or merchant, verify. It may be a fake merchant, compromised account, or unrelated business.
CLVIII. If the App Claims It Is Overseas-Based
Foreign-based scammers can still be reported in the Philippines if the victim is in the Philippines or the fraud targeted Filipino users. Recovery may be harder, but local payment recipients may still be traceable.
CLIX. If the Victim Is Outside the Philippines but Payment Was Philippine-Based
The victim may authorize someone in the Philippines to report or may file online where available. Payment provider complaints should still be made immediately.
CLX. If the Scam Uses English, Filipino, or Other Languages
Language does not matter. Preserve exact wording. Do not translate in screenshots; provide translation separately if needed.
CLXI. If Voice Calls Were Used
Write a call summary immediately after the call:
Date.
Time.
Number.
Person claimed identity.
What was said.
Fees demanded.
Threats made.
If call recording exists and was lawfully made, preserve it.
CLXII. Recording Calls
Recording laws can be sensitive. Do not publish recordings. If you have recordings, consult authorities or counsel on proper use.
Written summaries and call logs are still useful.
CLXIII. If the Victim Was Pressured Into Paying
Pressure supports the fraud narrative. Describe the threats and deadlines. Preserve messages showing urgency.
CLXIV. If the Victim Signed a Promissory Note
If the promissory note relates to a loan never released, dispute it. A signed document may complicate matters, so legal advice is recommended.
Preserve proof of non-release and fee demands.
CLXV. If the App Shows a Contract But No Disbursement
A contract without disbursement may not prove debt. Keep bank statements and app withdrawal screenshots.
CLXVI. If the App Claims Disbursement to Wrong Account
Ask for proof of actual disbursement, including transaction reference, receiving bank, account name, and date. If they cannot provide verifiable proof and only demand correction fees, it is suspicious.
CLXVII. If the Borrower Entered Wrong Account Number
Even if the borrower made a genuine mistake, a legitimate lender should have a verifiable correction process. Repeated payment demands through personal accounts remain suspicious.
The borrower should ask for cancellation if funds were not disbursed. Do not pay endless correction fees.
CLXVIII. If Funds Were Actually Sent to a Wrong Account
This is different from a scam display. If real funds were sent to a wrong account, the lender and bank must address mistaken transfer issues. The borrower should request proof and legal documentation.
Do not rely on app messages alone.
CLXIX. If the App Says the Loan Is “Frozen”
A frozen in-app balance is not proof of debt. If funds never reached the borrower, do not pay to unfreeze without verification.
CLXX. If the App Says “System Detected Money Laundering”
This is a fear tactic. Do not pay. Ask for official documentation and report the app.
CLXXI. If the App Says “You Will Be Blacklisted”
Scammers use blacklisting threats. If no loan was received, dispute the debt. If your data is reported falsely, seek correction and file complaints.
CLXXII. If the App Says “Your Contacts Will Be Called”
This is harassment and possible data misuse. Preserve the threat and warn contacts.
CLXXIII. If the App Says “We Have Access to Your Gallery”
This is serious. Revoke permissions, uninstall, secure device, and report. If photos are shared, document and file privacy/cyber complaints.
CLXXIV. If the App Says “Pay or We Will Edit Your Photo”
Preserve the threat. Do not pay. Paying may not stop them. Report to authorities and platform if images are posted.
CLXXV. If the App Sends Obscene Messages
Preserve and report. Obscene harassment may support additional complaints.
CLXXVI. If the Victim Feels Unsafe
If threats are serious or physical, contact local police. Keep family informed. Avoid meeting scammers.
CLXXVII. If the Victim Feels Suicidal or Overwhelmed
Scam harassment can be emotionally severe. The victim should seek immediate help from trusted family, friends, mental health hotlines, or emergency services. No fake debt is worth self-harm.
CLXXVIII. Preventive Checklist Before Using an Online Lender
Before applying:
Check if the lender is legitimate.
Do not download apps from unknown links.
Read app permissions.
Avoid apps requiring contacts access.
Verify official website and app store listing.
Do not pay advance fees to personal accounts.
Check reviews but do not rely solely on them.
Read loan agreement.
Ask for disclosure of fees.
Avoid lenders using threats.
Do not share OTP or passwords.
Use official customer service channels only.
CLXXIX. Warning Signs of a Fake Lending App
Red flags include:
Advance deposit before withdrawal.
Payment to personal e-wallet.
No verifiable company address.
No official receipt.
No clear loan agreement.
App not in official store.
APK link from chat.
Excessive phone permissions.
Fake government logos.
Poor grammar and pressure tactics.
Repeated fees.
Threats of arrest.
Fake customer service.
No actual loan release.
CLXXX. Warning Signs of an Abusive Lending App
Even if real, a lending app may be abusive if it:
Accesses contacts unnecessarily.
Harasses contacts.
Uses public shaming.
Charges undisclosed fees.
Uses threats.
Misrepresents interest.
Refuses to provide loan statement.
Uses hidden charges.
Collects beyond lawful terms.
Such conduct should be documented and reported.
CLXXXI. How to Verify a Lender
A borrower should check:
Company name.
Registration details.
Official website.
Official app store listing.
Physical address.
Customer service numbers.
Loan agreement.
Disclosure statement.
Payment channels.
Whether account names match the company.
If the lender cannot be verified, do not proceed.
CLXXXII. Why Scammers Ask for E-Wallet Payments
E-wallet payments are fast and easy to move. Scammers use them because:
Victims can pay instantly.
Funds can be transferred quickly.
Mule accounts are easy to rotate.
Victims may not know dispute procedures.
Small payments feel manageable.
Repeated small payments accumulate.
Report immediately after realizing fraud.
CLXXXIII. Why Scammers Ask for Multiple Small Fees
Small fees reduce resistance. The victim thinks, “I already paid ₱2,000; I should pay ₱3,000 more to get ₱50,000.” This is a sunk-cost trap.
The correct response is to stop.
CLXXXIV. Why Scammers Use Urgency
Urgency prevents verification. They may impose short deadlines, countdowns, penalties, or account freeze threats.
A legitimate lender should allow the borrower to verify terms and payment channels.
CLXXXV. Why Scammers Use Shame
Borrowing money can feel embarrassing. Scammers exploit shame to isolate victims. They say not to tell family or friends. Victims should talk to someone trusted before paying more.
CLXXXVI. Why Scammers Use Official Language
Terms like “AML,” “tax,” “legal department,” “NBI,” “court,” “credit bureau,” and “blacklist” are used to sound credible. Verify independently.
CLXXXVII. If the Victim Already Paid Many Times
Do not pay again. Make a complete table of all payments. Report to payment providers and authorities. The amount already paid is evidence of fraud, not a reason to keep paying.
CLXXXVIII. If the Victim Is Embarrassed to Report
Report anyway. Authorities and providers need reports to identify patterns. Silence helps scammers.
CLXXXIX. If the Victim Wants to Delete Everything
Do not delete evidence. Back it up first. Store copies in cloud storage or another device.
CXC. If the Victim Is Afraid Contacts Will Judge Them
Many people fall victim to online scams. A brief warning to contacts is better than allowing scammers to control the narrative.
CXCI. If Contacts Paid the Scammer
Contacts who paid should also file reports and provide receipts. This may expand the complaint.
CXCII. If the Scammer Uses the Victim’s Contacts to Scam Others
Warn contacts not to send money. If someone is scammed using your identity, document that your data was compromised.
CXCIII. If the Victim Receives More Loan Offers After the Scam
Scammers may sell victim data. Be suspicious of new offers, especially those promising guaranteed approval.
CXCIV. If the Victim Wants to Change Phone Number
Changing number may reduce harassment but does not erase evidence or data exposure. Back up messages first.
CXCV. If the Victim Wants to Close E-Wallet
Coordinate with provider first, especially if there is a pending fraud report. Closing too early may complicate investigation.
CXCVI. If the Victim Wants to Replace IDs
For heavily compromised IDs, consider replacement where feasible. At minimum, keep a police/cybercrime report documenting compromise.
CXCVII. If the Victim Wants to Sue the App Store
App stores may remove apps but are not automatically liable for every scam app. Focus first on the scammer, payment recipient, lender identity, and regulatory reports.
CXCVIII. If the Victim Wants Immediate Refund From Provider
Payment providers may investigate but may not guarantee refund. The victim should cooperate, submit complete evidence, and follow up. If the provider mishandles the report, consider escalation through complaint channels.
CXCIX. If the Payment Provider Refuses to Act
Ask for written explanation and case number. Submit complete documents. If unresolved, consider filing complaints with relevant financial consumer protection channels.
CC. If the Receiving Account Is Still Active
Provide updated scam evidence to the provider. Continued use may indicate ongoing fraud.
CCI. If the App Still Advertises
Report the ad and include evidence in law enforcement complaint. Continued advertising may show ongoing scheme.
CCII. If the App Targets Many Filipinos
Group evidence can support enforcement. Victims may coordinate, but each should avoid spreading unverified accusations and should preserve individual proof.
CCIII. If a Victim Publicly Posts the Scammer’s Details
Public warnings may help others but carry risks if inaccurate or if private data is exposed. It is safer to file official complaints and share general warnings without doxxing private individuals unless legally advised.
CCIV. If the Victim Names a Real Company Incorrectly
If the app impersonated a real company, accusing the real company without proof may create legal risk. State facts carefully: “The scammer used the name/logo of ___” rather than asserting the company itself scammed you unless verified.
CCV. If the Victim Wants Media Help
Media exposure may help in large scams, but legal complaints and provider reports should come first. Avoid sharing sensitive personal data publicly.
CCVI. If the Victim Wants Lawyer Assistance
A lawyer can help:
Draft complaint-affidavit.
Prepare demand letter.
Coordinate with banks.
File civil case.
Advise on data privacy complaint.
Respond to fake debt claims.
Protect against defamation risk.
Represent multiple victims.
Legal help is especially useful for large losses or identity misuse.
CCVII. Free or Low-Cost Legal Help
Victims who cannot afford private counsel may seek legal aid from appropriate public or private legal aid offices, law school legal aid clinics, or public assistance desks. Availability depends on eligibility and location.
CCVIII. Practical Recovery Strategy
A practical strategy is:
Stop paying.
Preserve evidence.
Report to payment provider immediately.
Secure accounts and device.
Warn contacts.
File cybercrime or police report.
File regulatory and privacy complaints if applicable.
Send demand only if recipient is identifiable.
Consider civil or small claims recovery if practical.
Follow up using case numbers.
Avoid recovery scams.
CCIX. Timeline of Recovery Efforts
Possible timeline:
Day 1: Stop paying, preserve evidence, report to bank/e-wallet.
Day 1 to 3: Secure accounts, uninstall app, warn contacts.
Week 1: File police/cybercrime report and regulatory complaints.
Week 1 to 2: Follow up with provider for transaction investigation.
Month 1 onward: Consider prosecutor complaint, small claims, or civil case if scammer is identified.
Recovery may take time and is not guaranteed.
CCX. What Evidence Is Most Important?
The strongest evidence usually includes:
Payment receipts.
Recipient account details.
Chat demanding payment.
App screenshot showing loan not released.
Bank or e-wallet statement showing no loan proceeds.
Threat messages.
App identity and download source.
These establish deception, payment, and damage.
CCXI. What If the Victim Has Only Payment Receipt?
A payment receipt alone proves payment but not necessarily fraud. Add context through:
Your written affidavit.
Any remaining messages.
App name.
Phone number.
Witness statements.
Provider records.
Contacts who received harassment.
The complaint may still proceed, but more evidence is better.
CCXII. What If the Victim Only Has Chat but No Payment Receipt?
If payment proof is missing, request transaction history from the bank or e-wallet. The provider’s transaction record is important.
CCXIII. What If the Victim Paid Through QR Without Name?
The payment provider may still have transaction metadata. Report the transaction reference number.
CCXIV. What If the Victim Paid Through Bank Deposit Machine?
Keep deposit slip. The receiving account can be traced through bank records if authorities request.
CCXV. What If the Victim Paid Through Over-the-Counter Cash-In?
Keep the receipt. It may show reference number, outlet, and recipient account.
CCXVI. What If the Scammer Used a Fake Name?
Fake names are common. Account details, phone numbers, and transaction records still matter.
CCXVII. What If the Scammer Is Abroad?
Local recipients, mule accounts, websites, and phone numbers may still provide leads. Report anyway.
CCXVIII. What If the Victim Paid the Same App Before and Got a Loan?
Some apps may first release small loans to build trust, then scam larger deposits. Document each transaction separately.
CCXIX. What If the Victim Was Told the Deposit Is Refundable?
A false promise of refund is still fraud if used to induce payment and no refund is made. Preserve messages saying refundable.
CCXX. What If the Victim Signed That Fees Are Non-Refundable?
A non-refundable clause may not protect fraud. If the entire scheme was deceptive and no legitimate loan was released, the victim can still complain.
CCXXI. What If the Victim Voluntarily Paid?
Scammers often argue payment was voluntary. A payment induced by deceit, false promises, or threats may still be fraudulent.
The complaint should explain why the victim paid: because the scammer represented that payment was required to release the loan.
CCXXII. What If the Victim Was Greedy or Desperate?
Victim blaming is common but legally irrelevant if fraud occurred. A person seeking a loan can still be defrauded.
CCXXIII. What If the Victim Lied on the Loan Application?
If the victim submitted false information, that may complicate matters. However, it does not automatically authorize the scammer to steal deposits. Legal advice may be needed.
CCXXIV. What If the Victim Used Another Person’s ID?
Using another person’s ID is risky and may create liability. The victim should consult counsel before filing if they submitted false identity documents. Still, fraud by the app may be reported.
CCXXV. What If the Victim Is Also in Default on Other Loans?
Other debts do not excuse the scam. Keep issues separate.
CCXXVI. What If the Victim Wants to Stop Harassment More Than Recover Money?
Focus on:
Revoking app permissions.
Warning contacts.
Blocking numbers after preserving evidence.
Reporting data misuse.
Filing complaints.
Changing number if necessary.
Do not pay more just to stop harassment. It may continue.
CCXXVII. What If Harassment Stops After Payment?
It may resume later. Preserve all proof and avoid further payments.
CCXXVIII. What If Harassment Continues Despite Payment?
This confirms why paying is unsafe. Document and report.
CCXXIX. What If the Scammer Sends a “Settlement Agreement”?
Do not sign without legal advice. It may contain false admission of debt or waiver of rights.
CCXXX. What If the Scammer Offers to Convert Deposit Into Loan Payment?
If no loan was released, do not accept a false framing that the deposit was loan payment. Preserve communications.
CCXXXI. What If the Scammer Claims “System Already Released the Loan”?
Ask for verifiable proof from bank or e-wallet transaction records. If none, dispute.
CCXXXII. What If the Victim Receives Random Small Deposit?
Scammers may send a small amount to claim a loan was released. Document the amount and compare with promised loan. Do not accept false debt terms. Seek advice if money was deposited unexpectedly.
CCXXXIII. What If the App Sends Money After Complaints?
If funds are finally released, review whether the transaction is legitimate and whether illegal fees were collected. Do not withdraw or spend if suspicious without understanding obligations. Document all terms.
CCXXXIV. What If the App Actually Releases Loan After Fees?
Even if a loan is eventually released, undisclosed or coercive advance fees may still be questionable. Review net proceeds, interest, fees, and repayment terms.
CCXXXV. What If the Loan Was Released but the Victim Wants Refund of Fees?
If fees were illegal, undisclosed, excessive, or fraudulently demanded, the borrower may complain. Evidence of disclosure and agreement will matter.
CCXXXVI. What If the App Is Listed as Legitimate but Agents Demand Personal Payments?
Report the agents to the company and regulators. Payments outside official channels are suspicious.
CCXXXVII. What If the Victim Paid Through an Official Merchant Account?
Still report. A merchant account may be misused. Provider investigation is needed.
CCXXXVIII. What If the App Requires “Maintaining Balance”?
A requirement to keep or send a maintaining balance before loan release is suspicious when demanded through unofficial channels. Verify directly with a legitimate lender.
CCXXXIX. What If the App Requires “Proof of Funds”?
A lender asking a borrower to prove funds by transferring money to them is a red flag. Proof of income or bank statements may be legitimate; deposit to withdraw is suspicious.
CCXL. What If the App Requires “Collateral Deposit”?
A collateral deposit for an unsecured online loan is suspicious, especially if paid to a personal account and not documented.
CCXLI. What If the App Requires “VIP Upgrade”?
Scam apps may say the borrower must upgrade membership to withdraw. This is a red flag.
CCXLII. What If the App Requires “Channel Fee”?
Vague channel fees are suspicious. Ask for official disclosure and verify. Do not pay personal accounts.
CCXLIII. What If the App Requires “Manual Review Fee”?
A manual review fee before release is suspicious if not disclosed and official.
CCXLIV. What If the App Requires “Penalty for Delay” Before Release?
A penalty before receiving funds is suspicious. It is often used to keep victims paying.
CCXLV. What If the App Requires “Verification Deposit Returned Later”?
A refundable verification deposit is a common scam. Do not pay unless the lender is verified and the requirement is lawful and official.
CCXLVI. What If the App Requires “Bank Code”
Some scammers invent bank codes or channel codes. Verify with your bank directly.
CCXLVII. What If the App Requires “Loan Certificate Fee”
Fake certificates are common. A loan certificate fee before release is suspicious.
CCXLVIII. What If the App Requires “Court Clearance Fee”
Courts do not issue loan withdrawal clearances through app agents. This is likely fraudulent.
CCXLIX. What If the App Requires “NBI Clearance Fee”
NBI clearance fees are not paid to loan app agents for loan withdrawal. This is suspicious.
CCL. What If the App Requires “Police Clearance Fee”
Police clearance is not a normal loan withdrawal requirement through a lending app. Treat as suspicious.
CCLI. What If the App Requires “Barangay Clearance Fee”
Barangay clearance fees, if any, are paid through barangay processes, not loan app agents. Treat as suspicious.
CCLII. What If the App Requires “Attorney Fee”
A lender’s attorney fee before loan release, paid to a personal e-wallet, is suspicious.
CCLIII. What If the App Requires “Documentary Stamp Tax”
Some legitimate loans may involve documentary stamp tax, but a demand to pay alleged DST to a personal account before release should be verified. Official tax-related charges should be transparent and documented.
CCLIV. What If the App Requires “Insurance Premium”
Verify the insurer, policy, coverage, official receipt, and whether the premium is lawful and disclosed. If the insurer is fake or payment is to personal account, it is suspicious.
CCLV. What If the App Requires “Notarial Fee”
A notarial fee for an online loan release is suspicious unless there is an actual notarized document and official notarial process.
CCLVI. What If the App Requires “Activation Through Crypto”
Crypto payment before loan release is a major red flag. Recovery is difficult.
CCLVII. What If the App Requires Payment Through Gift Cards
Gift card payments are almost always a scam in loan contexts.
CCLVIII. What If the App Requires Payment Through Online Game Credits
This is a red flag.
CCLIX. What If the App Requires Payment to a “Finance Officer”
Verify the officer through official company channels. Do not pay personal accounts.
CCLX. What If the App Requires Payment to “System Account”
A vague system account is suspicious. Legitimate companies use official corporate payment channels.
CCLXI. What If the App Has No Physical Address
Lack of a verifiable address is a red flag, especially if money is being demanded.
CCLXII. What If the App Has No Customer Service Hotline
A lender that only communicates through personal chat accounts is suspicious.
CCLXIII. What If the App Has No Written Loan Terms
Do not proceed. Loan terms should be clear before any obligation.
CCLXIV. What If the App Gives Loan Terms Only After Deposit
This is suspicious. Terms should be disclosed before payment or acceptance.
CCLXV. What If the App Refuses Cancellation
If no loan was released, refusal to cancel while demanding fees is a red flag. Preserve evidence.
CCLXVI. What If the App Says Cancellation Requires Full Repayment
If no funds were received, demanding repayment or cancellation fee may be fraudulent.
CCLXVII. What If the App Says the Deposit Is Required by Law
Ask for the specific law and verify independently. Scammers often invent legal requirements.
CCLXVIII. What If the App Claims Government Partnership
Verify with the government agency. Fake partnerships are common.
CCLXIX. What If the App Claims Bank Partnership
Call the bank’s official hotline, not the number provided by the app.
CCLXX. What If the App Claims Pag-IBIG, SSS, or Government Loan Connection
Verify directly with the official agency. Do not pay app agents.
CCLXXI. What If the App Claims It Can Approve Loans Without Requirements
Guaranteed approval is a red flag. Legitimate lenders assess ability to pay and disclose terms.
CCLXXII. What If the App Approves an Unusually High Amount
An unusually high approval amount for a borrower with no verification may be bait.
CCLXXIII. What If the App Uses Countdown Timer
Pressure timers are scam tactics. Do not pay under panic.
CCLXXIV. What If the App Says “Confidential, Do Not Tell Anyone”
This is a red flag. Scammers isolate victims.
CCLXXV. What If the App Says “Borrow From Friends to Pay Fee”
This is manipulative. Stop.
CCLXXVI. What If the Victim Already Borrowed From Friends to Pay
Inform friends honestly and preserve evidence. They may need to know they were indirectly affected by fraud.
CCLXXVII. What If the App Is Still Calling
After preserving evidence, block numbers if needed. Use phone settings to silence unknown callers. Keep records of new numbers.
CCLXXVIII. What If New Numbers Keep Calling
This suggests a call center or scam network. Document the pattern and report.
CCLXXIX. What If the Scammer Uses Robocalls
Preserve call logs. Report numbers.
CCLXXX. What If the Scammer Uses Email
Preserve full email headers if possible. Do not click links or download attachments.
CCLXXXI. What If the Scammer Sends Attachments
Do not open suspicious files. They may contain malware. Preserve the email or message safely.
CCLXXXII. What If the Scammer Sends QR Links
Do not scan unknown QR codes. They may lead to phishing or payment pages.
CCLXXXIII. What If the App Requests Face Verification Again
Do not provide more biometric data after fraud is suspected.
CCLXXXIV. What If the App Requests Bank Statement
Do not send more financial records. Scammers may use them for identity theft.
CCLXXXV. What If the App Requests Payslip or Company ID
Do not send more documents. If already sent, warn employer if harassment is likely.
CCLXXXVI. What If the App Requests Family Contact
Do not provide. If already provided, warn family.
CCLXXXVII. What If the App Requests Social Media Login
Never provide social media credentials.
CCLXXXVIII. What If the App Requests Email Password
Never provide email password. Email access can compromise all accounts.
CCLXXXIX. What If the App Requests Screen Recording
Refuse. It may capture passwords, OTPs, and private data.
CCXC. What If the App Requests Location Permission
Revoke. Location data can be used for intimidation.
CCXCI. What If the App Requests Accessibility Permission
Accessibility permission can be dangerous because it may allow the app to read screens or control actions. Revoke immediately and secure the device.
CCXCII. What If the App Requests Notification Access
Notification access may expose OTPs. Revoke immediately.
CCXCIII. What If the App Requests SMS Access
SMS access may expose OTPs and private messages. Revoke immediately.
CCXCIV. What If the App Requests Contact Access
Contact access is often used for harassment. Revoke and warn contacts.
CCXCV. What If the App Requests Storage Access
Storage access may expose photos, IDs, and documents. Revoke and monitor for misuse.
CCXCVI. What If the App Requests Camera and Microphone
Revoke unless necessary and trusted. In scam apps, these permissions may be abused.
CCXCVII. What If the App Uses Device Administrator Permission
Disable device administrator access before uninstalling. If you cannot remove it, seek technical help.
CCXCVIII. What If the App Cannot Be Uninstalled
This may indicate malicious software. Use safe mode, security tools, or professional help. Consider factory reset after preserving evidence.
CCXCIX. What If the Victim’s Phone Is Compromised
Use another trusted device to change passwords and contact banks. Do not use the compromised phone for sensitive transactions until secured.
CCC. Core Legal Rule
The core rule is this: an online lending app or agent that demands deposits or repeated advance fees before allowing withdrawal of supposed loan proceeds may be engaging in fraud, especially if no loan is actually released. A borrower who never received the loan should preserve evidence, stop paying, report immediately to the payment provider and authorities, secure personal data, and contest any false debt demand. Recovery depends on speed, traceability of funds, identification of recipients, and available legal remedies.
Conclusion
A deposit-to-withdraw online lending app scam is a serious fraud pattern in the Philippines. The victim is promised a loan but is required to pay one fee after another before withdrawal. The app may show a fake wallet balance, claim account errors, demand correction fees, threaten legal action, or misuse personal data. The most important response is to stop paying immediately.
Victims should preserve screenshots, payment receipts, app details, messages, and proof that no loan was received. They should report quickly to the bank or e-wallet provider to attempt account freezing or reversal, then file appropriate complaints with law enforcement, financial regulators, and data privacy authorities where applicable. If personal data or contacts were accessed, the victim should revoke permissions, uninstall the app, secure accounts, warn contacts, and document harassment.
Recovery is possible but not guaranteed. It is more likely when reports are made quickly and recipient accounts can be traced before funds disappear. Victims should avoid recovery scams, never share OTPs, and never pay new fees to recover old payments.
The safest rule is simple: a borrower should be extremely cautious of any lender that requires money to release money. A legitimate loan should be transparent, documented, and processed through official channels. A loan that exists only inside an app wallet and requires repeated deposits before withdrawal is a major warning sign of fraud.