Introduction
Online scams in the Philippines have become a major legal and practical problem. People lose money through fake online sellers, phishing, investment fraud, account takeovers, romance scams, fake job offers, bogus lending apps, cryptocurrency schemes, and fraudulent bank or e-wallet transactions. The immediate question is usually simple: Can the money still be recovered?
The legal answer is: sometimes yes, often partly, and the chances depend heavily on speed, evidence, the payment channel used, and whether the scammer can still be identified or traced.
Money recovery in Philippine law is not based on a single remedy. It may involve:
- urgent bank or e-wallet reporting,
- fraud complaints with financial institutions,
- preservation of digital evidence,
- police or NBI complaints,
- criminal prosecution,
- civil claims for damages and restitution,
- freezing or tracing of assets,
- small claims or ordinary civil actions in some situations,
- regulatory complaints if a platform, lender, or payment intermediary is involved.
In practice, recovering money from an online scam is both a legal issue and a timing issue. The first hours and days matter enormously. Once the funds are withdrawn, layered through multiple accounts, converted into cryptocurrency, or sent through false identities, recovery becomes much harder.
This article explains the Philippine legal framework, the possible remedies, the practical steps, and the limitations.
I. What Counts as an Online Scam
An online scam is not a technical legal term with one fixed statutory definition. It is a broad practical label for conduct that uses the internet, digital platforms, messaging apps, online banking, e-wallets, marketplaces, or electronic communications to deceive a person into giving up money, property, credentials, or financial access.
Common forms include:
1. Fake online selling
The victim pays for goods that never arrive, or receives fake, damaged, or entirely different items.
2. Phishing and credential theft
The victim is tricked into revealing OTPs, passwords, PINs, card details, or login credentials.
3. Account takeover
A scammer gains access to the victim’s bank account, e-wallet, email, or social media and uses it to transfer funds.
4. Investment and Ponzi fraud
The victim is induced to invest in fake or unauthorized schemes with promises of unusually high returns.
5. Romance and social engineering scams
The victim sends money after emotional manipulation, false emergencies, or fabricated stories.
6. Loan app and extortion scams
A person is deceived into paying fraudulent charges or is unlawfully pressured into sending money.
7. Fake job, visa, or processing scams
The victim pays fees for non-existent employment, travel, documents, or government processing.
8. Marketplace fraud
The scam happens through social media, buy-and-sell groups, resale channels, or online classified platforms.
9. Crypto and digital asset scams
Funds are sent to wallets or exchanges for fake investment, fake recovery, or fake trading opportunities.
10. Authorized push-payment scams
The victim personally sends the money, believing the transaction is legitimate, because of deception.
This last category is important. In many scam cases, the bank or e-wallet may say the transfer was “authorized” because the victim clicked, approved, or typed the transaction. That does not make the scam lawful. It only affects the difficulty of reversing the payment.
II. The Central Legal Question: Is Recovery Even Possible?
Money recovery is most realistic when at least one of these is true:
- the payment is still pending or can still be blocked,
- the recipient account can be quickly frozen or flagged,
- the scammer used an identifiable bank account, e-wallet, delivery address, device, or platform account,
- the victim has strong documentary and electronic evidence,
- a platform or financial institution failed in a duty and may be answerable under contract, regulation, or negligence principles,
- the scam involved a real person or business that can still be sued or prosecuted.
Recovery is far more difficult when:
- the victim waited too long,
- the funds were immediately cashed out,
- the account used was opened with fake or stolen identities,
- the money was routed through multiple mules,
- the funds were converted to cryptocurrency and moved further,
- the victim has little evidence,
- the recipient is outside the Philippines or effectively untraceable.
The law may still provide remedies, but practical collection becomes the problem.
III. Important Philippine Laws Potentially Involved
There is no single “online scam recovery law.” Different laws may apply depending on the facts.
1. Revised Penal Code
Traditional crimes may still apply, especially:
- estafa,
- false pretenses,
- fraudulent acts causing damage,
- other deceit-based property offenses.
A scam that induces the victim to part with money through misrepresentation may fall under estafa even if done online.
2. Cybercrime Prevention Act
When deceit is committed through information and communications technologies, cyber-related offenses and procedural tools may become relevant. Online fraud may overlap with traditional crimes committed through digital means.
3. Electronic Commerce Act
Electronic documents, data messages, and digital communications may be used as evidence, and electronic transactions are legally recognized.
4. Data Privacy Act
If personal data was unlawfully obtained, processed, exposed, or misused during the scam, privacy law issues may arise.
5. Consumer Act and related regulations
These may become relevant in fake selling, deceptive online merchant behavior, or platform-related disputes, depending on the facts.
6. Financial regulations and BSP framework
Banks, electronic money issuers, and payment service providers operate under regulatory duties. Complaint mechanisms and internal dispute procedures matter a great deal.
7. Civil Code
The victim may have civil remedies for:
- damages,
- restitution,
- unjust enrichment,
- quasi-delict in some settings,
- breach of contract where a service provider failed obligations,
- recovery of identifiable property or funds where legally traceable.
8. Anti-Money Laundering framework
In some cases, suspicious transactions and preservation of funds may become relevant, especially where fraud proceeds moved through regulated institutions. However, private individuals do not personally “freeze” bank accounts through accusation alone; proper institutional and legal processes are needed.
9. Rules on Evidence
Screenshots, transaction logs, chat records, email trails, account statements, electronic receipts, and platform records are critical.
IV. The Most Important Distinction: Unauthorized Transfer vs. Scam-Induced Transfer
Not all online losses are treated the same.
A. Unauthorized transfer
This means the victim did not truly authorize the transaction. Examples:
- hacked account,
- stolen card,
- account takeover,
- fraudulent use without the victim’s knowledge,
- transfer made by someone else using compromised credentials.
Here, the victim may have stronger grounds against the bank, e-wallet, or intermediary, depending on the facts and the institution’s own security obligations.
B. Scam-induced or deceived transfer
This means the victim personally sent the money, but did so because of fraud. Examples:
- fake seller,
- fake investment agent,
- fake bank representative,
- romance scammer,
- fake relative asking for emergency funds.
Here, the recipient is still potentially criminally and civilly liable. But reversal by the financial institution is often more difficult because the institution may argue that the customer initiated the transaction.
This distinction shapes the strategy.
V. Immediate Actions: The First 24 Hours Matter Most
The first stage is not yet about filing the perfect case. It is about containment.
1. Contact the bank, e-wallet, card issuer, or payment provider immediately
The victim should urgently report:
- the exact transaction,
- date and time,
- amount,
- recipient account or wallet,
- reference number,
- how the scam happened,
- whether credentials were compromised.
Ask for:
- account blocking if your own account was compromised,
- card blocking,
- password reset,
- dispute reference number,
- transaction investigation,
- recipient account flagging,
- possible hold or recall if still feasible,
- written confirmation of report.
In many cases, this is the single most important step. Delay can destroy the chance of stopping the funds.
2. Preserve evidence immediately
The victim should secure:
- screenshots of conversations,
- social media pages,
- usernames,
- account names,
- payment instructions,
- QR codes,
- bank confirmations,
- e-wallet receipts,
- emails,
- URLs,
- product listings,
- courier details,
- phone numbers,
- video recordings if available,
- profile links,
- blockchain wallet addresses in crypto cases,
- screenshots showing deletion or account disappearance.
Evidence should be preserved before the scammer deletes messages or blocks the victim.
3. Secure your own accounts
Change passwords and PINs for:
- email,
- online banking,
- e-wallets,
- social media,
- cloud storage,
- devices if compromise is suspected.
Log out other sessions where possible.
4. Stop further loss
Many victims keep sending money because the scammer invents “release fees,” “taxes,” “verification charges,” or “recovery fees.” Legally and practically, continuing to send money usually worsens the loss.
5. Record a chronological narrative
Write down:
- first contact,
- representations made,
- amounts sent,
- dates,
- accounts used,
- follow-up demands,
- when suspicion arose.
This becomes useful for police, NBI, lawyers, banks, and court pleadings.
VI. Can a Bank or E-Wallet Reverse the Transaction?
A. Sometimes yes, but not automatically
A bank or e-wallet may be able to help if:
- the transaction is very recent,
- the funds are still within the system,
- the receiving account is still funded,
- the matter is quickly escalated internally,
- fraud indicators justify intervention under internal compliance processes.
However, customers often misunderstand the situation. A bank does not simply refund every scam-related loss on demand. The institution will look at:
- whether the transaction was authenticated,
- whether OTP or biometrics were used,
- whether the customer shared credentials,
- whether there was a system breach,
- whether the institution had security lapses,
- whether the recipient account is within the same institution,
- whether the funds have already been withdrawn.
B. Internal dispute process matters
A victim should formally file a written dispute or complaint with the institution. Oral hotline reports are helpful, but written submissions create a record. Include:
- complaint summary,
- transaction details,
- evidence attachments,
- demand for investigation,
- request for remedial action,
- request for preservation of logs and recipient account data.
C. No guaranteed reimbursement
If the victim personally approved the transaction because of deception, many institutions resist reimbursement. That does not end the matter, but it means the victim may need to pursue the scammer directly and possibly challenge the institution only if there is some independent fault on its part.
VII. Complaints Against Financial Institutions
If a bank, e-wallet provider, or payment intermediary mishandles the case, the victim may pursue complaint channels such as:
- the institution’s own dispute resolution system,
- formal written escalation,
- customer assistance channels,
- applicable financial regulators,
- civil action if legally justified.
A complaint against the financial institution is strongest where there is evidence of:
- unauthorized access not caused by the victim,
- weak fraud controls,
- failure to act after prompt notice,
- wrongful refusal to investigate,
- processing errors,
- security lapses,
- noncompliance with internal or regulatory obligations.
A complaint is weaker where the institution can show the user knowingly approved the transfer and the system functioned as designed.
VIII. Criminal Remedies: Estafa and Related Complaints
A. Criminal liability of the scammer
In many online scam cases, the primary criminal theory is estafa by deceit. The classic elements are generally present where:
- the scammer made false representations or fraudulent pretenses,
- the victim relied on them,
- the victim sent money or property,
- damage resulted.
The fact that the transaction occurred through chat, social media, email, or online platforms does not remove criminal liability.
B. Why criminal action matters for money recovery
Victims often think criminal complaints are only about punishment. That is incomplete. A criminal case may also support:
- restitution,
- civil liability arising from the offense,
- pressure on the accused to settle,
- tracing through subpoenas or investigative processes,
- formal identification of suspects.
However, a criminal case does not guarantee collection. A conviction is valuable, but actual payment still depends on whether the offender has assets or can be made to pay.
C. Where to report
Victims commonly report to law enforcement bodies handling cyber or fraud complaints, including police cybercrime units or the NBI. The exact office may vary depending on local access and the nature of the scam.
D. What the complaint usually needs
A criminal complaint typically needs:
- complainant affidavit,
- complete transaction history,
- screenshots,
- IDs,
- proof of payment,
- links to accounts used,
- device and communication details,
- bank correspondence,
- recipient account information,
- witness statements if any.
IX. Civil Remedies: Suing to Recover the Money
Criminal action is not the only path. The victim may bring or reserve a civil claim, depending on procedural strategy and the facts.
A. Recovery based on fraud
The victim may sue the scammer for return of the money and damages if the scammer is identifiable.
B. Unjust enrichment
If a person received money without legal basis and refuses to return it, the Civil Code principle against unjust enrichment may support recovery.
C. Damages
The victim may claim:
- actual damages,
- moral damages in proper cases,
- exemplary damages in proper cases,
- attorney’s fees where justified,
- interest where legally warranted.
D. Contract-related claims
Sometimes the case is framed not purely as a scam, but as a breach of obligation by a seller, service provider, processor, or intermediary.
E. Small claims?
Small claims may be useful in limited scenarios, especially where the dispute is essentially a money claim for a fixed amount against an identifiable person. But small claims are not ideal for many online scam cases because:
- the defendant may be untraceable,
- fraud issues may be factually complex,
- jurisdictional and procedural issues may arise,
- the claim may require broader relief than a simple collection action.
Still, where the scammer is actually an identifiable seller or person who received the money, and the case is straightforward, a money claim route may be considered.
X. The Problem of “Mule” Accounts
A common problem is that the account receiving the money does not belong to the real mastermind. It belongs to a “money mule,” recruiter, or person lending out an account.
This creates several legal issues:
- the mule may claim innocence,
- the real scammer may be harder to trace,
- funds may already have been transferred onward,
- multiple persons may be involved in conspiracy or negligent participation.
From the victim’s perspective, the recipient account still matters. It can provide:
- account name,
- opening documents through lawful investigation,
- linked phone numbers,
- transaction pathways,
- additional suspects.
A recipient who knowingly allowed an account to be used for fraud may face legal consequences. Even an allegedly innocent account holder may become relevant to tracing and civil recovery.
XI. Online Seller Scams: Special Considerations
Where the scam involves fake online selling, the legal issues often include both fraud and consumer-type complaints.
Important evidence includes:
- product page screenshots,
- posted terms,
- proof of item description,
- chats promising delivery,
- payment proof,
- delivery records or lack thereof,
- fake waybill evidence,
- marketplace complaint logs,
- page name changes,
- linked mobile numbers.
In some cases, the dispute is not a scam but an ordinary failed sale. In other cases, it is clearly fraudulent from the start. This distinction matters because fraud supports stronger criminal consequences, while a mere delivery dispute may remain civil or administrative in character.
Where a platform is involved, internal reporting should be done immediately because platform data may later disappear or accounts may be deactivated.
XII. Phishing, OTP Sharing, and Account Compromise
A difficult area in online scam recovery is where the victim shared an OTP, clicked a phishing link, installed remote access software, or disclosed account credentials.
A. Victim mistake does not legalize the fraud
Even if the victim made a serious mistake, the scammer remains potentially criminally liable.
B. But it affects reimbursement disputes
Financial institutions often rely heavily on the fact that the customer disclosed credentials or approved the transaction. That can weaken the argument for automatic reimbursement by the institution.
C. Still investigate institutional fault
The victim should not assume there is no claim against the institution. Questions still matter:
- Was there unusual activity that should have triggered controls?
- Were there multiple high-risk transactions?
- Was there delayed fraud detection?
- Did customer support respond promptly?
- Was there any known system compromise?
The answer may affect liability.
XIII. Fake Investment and Ponzi-Type Scams
These cases often involve:
- false promises of guaranteed returns,
- social media recruitment,
- fake celebrity or professional endorsements,
- fake trading dashboards,
- fabricated profit screenshots,
- pressure to recruit others,
- repeated requests for more deposits.
Here, money recovery is especially difficult because the funds are often dissipated early. Still, the victim may have avenues through:
- criminal complaint,
- civil recovery,
- tracing of payment channels,
- complaints involving unauthorized solicitation or fraudulent investment activity,
- complaints against identifiable organizers and promoters.
Victims should avoid a common mistake: once the first fraud is discovered, they become vulnerable to a second scam by “recovery agents” who demand advance payment to retrieve the lost funds.
XIV. Crypto Scams
Crypto-related losses are among the hardest to recover.
Why?
- funds can move quickly across wallets,
- transfers may be irreversible,
- multiple chains or bridges may be used,
- perpetrators may operate anonymously or across borders.
Still, not all crypto cases are hopeless. Recovery chances improve where:
- the transfer went through a centralized exchange account,
- the exchange account can be tied to a verified identity,
- the victim acted quickly,
- blockchain tracing can identify movement patterns,
- law enforcement coordinates with regulated entities.
In these cases, preserve:
- wallet addresses,
- transaction hashes,
- screenshots of chats and dashboards,
- exchange usernames,
- deposit instructions,
- linked email addresses and mobile numbers.
XV. What Evidence Matters Most
In online scam recovery, evidence is everything. Useful evidence includes:
1. Payment proof
- bank transfer confirmations,
- e-wallet receipts,
- card statements,
- remittance records,
- QR payment screenshots.
2. Communication records
- chat screenshots,
- emails,
- SMS,
- voice notes,
- call logs,
- social media messages.
3. Identity clues
- names used,
- account names,
- phone numbers,
- profile URLs,
- delivery addresses,
- IDs sent by scammer,
- photos,
- bank account names,
- wallet addresses.
4. Platform evidence
- marketplace listing,
- page URL,
- order confirmation,
- complaint ticket numbers,
- deactivation notices,
- profile edits or deletions.
5. Technical evidence
- device logs,
- IP-related notices where available,
- sign-in alerts,
- password reset messages,
- OTP messages,
- transaction timestamps.
6. Institutional correspondence
- bank dispute reference,
- hotline report logs,
- email acknowledgments,
- investigative replies.
Electronic evidence is legally significant. The challenge is usually not admissibility in theory, but authenticity, completeness, and preservation.
XVI. A Common Misunderstanding: “I Have the Scammer’s Name, So Recovery Is Easy”
Not necessarily.
The displayed account name, social media name, or e-wallet profile may be:
- fake,
- borrowed,
- stolen,
- mule-controlled,
- partially true but not enough for service of summons or arrest.
A name is useful, but recovery depends on whether the person can be lawfully identified, located, and linked to the fraud.
XVII. Can the Police or NBI Force the Bank to Return the Money?
Not in the simplistic way many victims imagine.
Law enforcement involvement is important for investigation, but a bank does not automatically reverse a transaction merely because a complaint was filed. There are legal, privacy, procedural, and evidentiary limits. Institutions act through their own compliance and legal processes, and stronger interventions generally require proper legal basis.
A police report is helpful. It is not itself a magic refund order.
XVIII. Can the Recipient Account Be Frozen?
Potentially, but not by informal demand alone.
A victim may request urgent flagging and investigation through the bank or e-wallet. Whether funds can be held depends on:
- timing,
- whether the funds are still there,
- institutional procedures,
- legal basis,
- regulatory and compliance rules,
- law enforcement escalation where appropriate.
The earlier the report, the better the chance. Once the funds are gone, freezing becomes theoretical.
XIX. Suing the Scammer vs. Suing the Platform vs. Suing the Bank
These are different targets, with different legal theories.
A. The scammer
Best target if identifiable and solvent. Main theories:
- estafa,
- fraud,
- damages,
- unjust enrichment,
- return of money.
B. The bank or e-wallet
Possible target if there was:
- unauthorized transaction,
- poor security,
- mishandling,
- failure to respond appropriately,
- breach of obligations.
Harder where the victim willingly authorized the transfer because of deception.
C. The platform or marketplace
Possible issues arise where a platform’s policies, seller verification, complaint handling, escrow mechanisms, or representations are involved. But platform liability is not automatic just because a scam happened on the platform.
The right defendant depends on what went wrong.
XX. Cross-Border Scams
If the scammer is abroad, or the money moved outside the Philippines, legal recovery becomes harder due to:
- jurisdictional problems,
- foreign accounts,
- foreign platforms,
- service of process issues,
- international cooperation limits,
- cost of enforcement.
Still, local elements may remain actionable if:
- the recipient account is local,
- the victim paid through a Philippine-regulated institution,
- local intermediaries were used,
- local accomplices exist.
Cross-border does not mean impossible. It means slower and more complex.
XXI. What Damages Can Be Claimed?
In a proper case, the victim may seek:
1. Actual damages
The amount lost, plus provable related expenses.
2. Interest
Possible where legally justified and properly claimed.
3. Moral damages
Possible in appropriate cases involving fraud, anxiety, humiliation, or bad faith, depending on the action and proof.
4. Exemplary damages
Possible where the defendant’s conduct was particularly reprehensible and the law allows it.
5. Attorney’s fees and costs
Possible in situations recognized by law or contract.
But a favorable judgment is only part of recovery. The real challenge is collection.
XXII. The Practical Recovery Sequence
A strong Philippine response to an online scam usually follows this order:
Step 1: Stop the loss
Block accounts, cards, access, and passwords.
Step 2: Report immediately to the financial institution
Seek hold, recall, dispute, and investigation.
Step 3: Preserve all evidence
Do not rely on memory.
Step 4: Report to law enforcement
Create formal investigative records.
Step 5: Identify the legal theory
- unauthorized transaction,
- fraud by deceit,
- fake sale,
- investment fraud,
- account compromise,
- platform failure,
- breach of duty by intermediary.
Step 6: Send formal demands or complaints where appropriate
This may include the scammer, account holder, seller, intermediary, or institution.
Step 7: File the proper criminal and/or civil action
Depending on facts, amount, and identity of defendant.
Step 8: Pursue collection realistically
Winning on paper is not the same as receiving money.
XXIII. When Recovery Is More Likely
Recovery is more likely when:
- the report is made within hours,
- the funds are still in a local regulated account,
- the institution can still trace and flag the transaction,
- the scammer used a real and identifiable account,
- the victim has complete evidence,
- there is a platform trail,
- there are multiple victims who can support the case,
- the scammer has assets or continuing operations.
XXIV. When Recovery Is Less Likely
Recovery is less likely when:
- the victim waited weeks or months,
- the payment was made through informal channels,
- the recipient account is fake or mule-based,
- funds were withdrawn in cash quickly,
- the scammer is abroad and anonymous,
- the victim deleted evidence,
- the payment was converted to crypto and moved repeatedly,
- the case relies only on oral allegations with little documentation.
XXV. Common Mistakes Victims Make
1. Waiting too long to report
This is the most damaging mistake.
2. Sending more money to “unlock” or “recover” the original funds
Scammers commonly exploit panic.
3. Deleting chats out of shame
This destroys evidence.
4. Threatening publicly before preserving proof
The scammer may disappear or wipe accounts.
5. Assuming the bank must automatically refund
That is not always the law or the practical reality.
6. Failing to distinguish scammer liability from bank liability
The person who deceived you and the institution that processed the payment are not always legally liable in the same way.
7. Accepting verbal assurances without written records
Written complaint references matter.
8. Treating screenshots alone as enough
They are important, but transaction records and institutional logs matter too.
XXVI. Can Emotional Distress, Embarrassment, or Reputational Harm Be Claimed?
Potentially yes, in proper cases. Fraud can cause anxiety, humiliation, lost sleep, damaged reputation, and family or business consequences. Philippine law can recognize these in the right setting, but proof still matters. Courts do not award such damages automatically just because the victim feels distressed.
XXVII. Special Issue: Recovery from “Friendly Fraud” or a Known Person
Some online scams are committed not by strangers but by friends, relatives, co-workers, or acquaintances using online channels. These may involve:
- fake emergencies,
- fake investment pooling,
- borrowing money through lies,
- fake ticketing or booking,
- false processing services.
These cases are often easier to pursue because the wrongdoer is known. The main legal issues become:
- whether the act was criminal deceit or mere unpaid debt,
- whether there was fraudulent intent from the start,
- whether the evidence supports estafa rather than simple nonpayment.
This distinction matters a great deal. Not every broken promise is estafa. Fraudulent inducement from the beginning is key.
XXVIII. Is Settlement Allowed?
Yes. Many scam cases end in repayment arrangements, partial settlement, or compromise, especially when the wrongdoer is identified and fears criminal exposure. Settlement can be practical, but it should be documented carefully.
A private settlement should clearly state:
- amount to be repaid,
- payment schedule,
- consequences of default,
- whether claims are fully or conditionally waived,
- whether criminal aspects remain subject to law and public policy.
An informal promise to pay is usually not enough.
XXIX. Can You Recover from the Scammer’s Family, Employer, or Friends?
Generally, liability is personal unless another legal basis exists. The scammer’s relatives are not automatically responsible. An employer is not automatically liable merely because the scammer worked there. Friends are not automatically liable unless they participated, conspired, or assumed some legal obligation.
The law looks for a concrete basis, not guilt by association.
XXX. The Realistic Legal Position
Under Philippine law, money lost through an online scam can sometimes be recovered, but recovery depends on more than proving you were deceived. It depends on whether the legal system can still trace, identify, restrain, adjudicate, and collect.
The victim’s strongest position usually comes from combining:
- immediate financial reporting,
- disciplined evidence preservation,
- a criminal complaint for fraud or estafa where warranted,
- civil recovery claims where appropriate,
- strategic complaints against any institution that had a real legal failure,
- realistic attention to collectability.
XXXI. Summary of Key Legal Points
- An online scam can create criminal and civil liability in the Philippines.
- The fact that money was sent online does not prevent recovery.
- Recovery is easiest when the victim reports immediately.
- Unauthorized transfers are treated differently from scam-induced but customer-approved transfers.
- A bank or e-wallet may help investigate or flag transactions, but refund is not automatic.
- Estafa and related fraud theories are often central in criminal complaints.
- Civil actions for return of money, damages, and unjust enrichment may also be available.
- Electronic evidence is legally important and often decisive.
- The biggest obstacles are delay, weak evidence, and untraceable recipients.
- Even with a strong legal case, actual recovery still depends on whether the scammer or traceable recipient can be made to pay.
Conclusion
Recovering money from an online scam in the Philippines is possible, but it is never automatic. The law may recognize fraud, deceit, unauthorized access, damages, and restitution. But the legal right to recover and the practical ability to get the money back are not the same thing.
The victim who acts immediately, preserves evidence, reports to the financial institution without delay, and pursues the proper criminal and civil remedies has the strongest chance. The victim who waits, keeps sending money, or fails to document the scam usually faces a much harder road.
In Philippine practice, the recovery question is answered by four things: speed, traceability, proof, and collectability. Where those are present, the law has room to work. Where they are absent, the law may still condemn the scam, but recovery becomes uncertain.