How to Report Online Scams in the Philippines

Introduction

Online scams have become one of the most common forms of fraud in the Philippines. They appear in many forms: fake online sellers, investment scams, phishing messages, romance scams, job scams, loan scams, hacked social media accounts, fake delivery notices, cryptocurrency fraud, identity theft, and unauthorized banking or e-wallet transactions.

A victim of an online scam should act quickly. The first hours after discovering the scam are important because money may still be traceable, accounts may still be frozen, and digital evidence may still be preserved. Reporting the scam also helps law enforcement identify patterns, protect other victims, and pursue criminal accountability.

This article explains the Philippine legal framework, where to report online scams, what evidence to preserve, how to file complaints with law enforcement, banks, e-wallet providers, platforms, and government agencies, and what remedies may be available to victims.


1. What Is an Online Scam?

An online scam is a fraudulent scheme committed through the internet, mobile phone, social media, messaging apps, online marketplaces, websites, email, digital payment systems, or other electronic means.

The central element is deception. The scammer misrepresents facts, identity, authority, product availability, investment opportunity, employment offer, romantic intention, or payment instructions to induce the victim to send money, disclose personal information, click a malicious link, or perform another act that causes loss or damage.

Online scams may involve:

  1. Fraudulent sale of goods or services
  2. Fake investments
  3. Phishing or credential theft
  4. Unauthorized bank or e-wallet transfers
  5. Identity theft
  6. Hacked social media or messaging accounts
  7. Impersonation of government agencies, banks, couriers, or companies
  8. Fake job offers
  9. Romance scams
  10. Sextortion or blackmail
  11. Fake loans
  12. Fake charity drives
  13. Cryptocurrency or trading scams
  14. Online gambling or betting scams
  15. Advance-fee scams
  16. Fake rental listings
  17. Fake travel bookings
  18. Fake payment confirmations
  19. Marketplace scams
  20. Business email compromise

2. Common Types of Online Scams in the Philippines

A. Online Selling Scam

This occurs when a person pays for an item online, but the seller does not deliver the item, delivers a fake or different item, or disappears after receiving payment.

Common examples include:

  • fake gadget sellers;
  • fake concert ticket sellers;
  • fake appliance sellers;
  • counterfeit luxury goods;
  • “pasabuy” scams;
  • fake pre-order schemes;
  • fake supplier or wholesale offers;
  • rental deposit scams;
  • sellers using stolen photos or fake reviews.

B. Phishing Scam

Phishing occurs when scammers trick victims into revealing passwords, OTPs, card numbers, PINs, recovery codes, or other sensitive information.

Common phishing methods include:

  • fake bank emails;
  • fake e-wallet messages;
  • fake delivery tracking links;
  • fake government aid forms;
  • fake SIM registration links;
  • fake account verification pages;
  • fake raffle or prize notifications.

The victim is usually directed to a fake website that looks legitimate.

C. Smishing and Vishing

Smishing is phishing through SMS or messaging apps. Vishing is phishing through voice calls.

Scammers may pretend to be bank officers, e-wallet agents, telco representatives, delivery riders, law enforcement officers, or government personnel. They may ask for OTPs, account details, or remote access to the victim’s phone.

D. Investment Scam

Investment scams promise high returns with little or no risk. They may use terms such as:

  • guaranteed income;
  • double your money;
  • passive earnings;
  • trading bot;
  • crypto mining;
  • forex signal group;
  • online paluwagan;
  • tasking platform;
  • buy-and-earn;
  • referral bonus;
  • locked-in profits.

Many investment scams are Ponzi-like schemes where earlier participants are paid from the money of later participants until the scheme collapses.

E. Romance Scam

The scammer builds a romantic or emotional relationship with the victim online, then asks for money due to supposed emergencies, business problems, travel needs, customs fees, hospital bills, or family crises.

F. Sextortion and Blackmail

The scammer obtains intimate photos, videos, chats, or manipulated images and threatens to release them unless the victim pays money. This may involve other criminal laws beyond fraud, especially if minors are involved.

G. Job Scam

Fake recruiters offer employment, often abroad or remote work, then ask for payment for processing fees, training, medical exams, equipment, visa fees, or reservation slots.

Some job scams also use victims as money mules by asking them to receive and transfer funds.

H. Loan Scam

Fake lenders offer quick loans, then collect advance fees, processing fees, insurance fees, or deposits before releasing the loan. In some cases, illegal lending apps access the victim’s contacts and harass them.

I. Hacked Account Scam

A scammer takes over a Facebook, Messenger, Instagram, email, or messaging account and asks the victim’s contacts for money, claiming an emergency or temporary account problem.

J. Fake Customer Support Scam

Scammers pretend to be customer service representatives of banks, e-wallets, airlines, online marketplaces, couriers, or government agencies. They may ask the victim to install screen-sharing apps or reveal OTPs.

K. Business Email Compromise

A scammer compromises or spoofs an email account and sends fake payment instructions. This often targets companies, suppliers, real estate buyers, law offices, and overseas transactions.


3. Legal Basis: Philippine Laws That May Apply

Online scams may violate several Philippine laws, depending on the facts.

A. Revised Penal Code: Estafa

Many scams fall under estafa, which generally involves fraud or deceit causing damage to another person. Estafa may apply where the scammer deceived the victim into sending money, delivering property, or parting with something of value.

Examples:

  • accepting payment with no intention to deliver goods;
  • pretending to sell a product that does not exist;
  • falsely claiming authority or identity;
  • misappropriating money received in trust;
  • using fraudulent representations to obtain money.

B. Cybercrime Prevention Act

If fraud is committed through information and communications technology, the offense may be treated as cyber-related. The Cybercrime Prevention Act recognizes cybercrime offenses and may increase penalties when ordinary crimes, such as fraud, are committed through digital systems.

Online estafa is often referred to as cyber estafa, although the exact charge depends on the prosecutor’s evaluation.

C. Access Device Regulation Act

This law may apply to unauthorized use of credit cards, debit cards, account numbers, access devices, and related banking or payment credentials.

It may be relevant where scammers use stolen card information, OTPs, account credentials, or unauthorized transactions.

D. Data Privacy Act

If the scam involves unauthorized collection, processing, disclosure, or misuse of personal information, the Data Privacy Act may also be relevant.

Examples include:

  • identity theft using personal information;
  • unauthorized use of IDs;
  • unlawful disclosure of personal data;
  • phishing forms collecting sensitive information;
  • sale or misuse of personal databases.

E. Securities Regulation Code and Investment Laws

Investment scams may violate securities laws if the scammer solicits investments from the public without proper registration, license, or authority.

The Securities and Exchange Commission may become involved where the scheme offers investment contracts, securities, or similar instruments.

F. Consumer Protection Laws

If the scam involves online selling, defective goods, false advertising, misleading trade practices, or unfair consumer transactions, consumer protection laws and agencies may be relevant.

G. E-Commerce and Electronic Evidence Rules

Electronic messages, screenshots, payment confirmations, emails, platform records, IP logs, and digital documents may be used as evidence, subject to rules on authenticity, relevance, and admissibility.


4. Where to Report Online Scams in the Philippines

A victim may report an online scam to one or more of the following, depending on the nature of the case:

  1. Philippine National Police Anti-Cybercrime Group, or PNP-ACG
  2. National Bureau of Investigation Cybercrime Division, or NBI-CCD
  3. Local police station
  4. Prosecutor’s Office
  5. Bank or e-wallet provider
  6. Online platform or marketplace
  7. Social media platform
  8. Securities and Exchange Commission, for investment scams
  9. Department of Trade and Industry, for consumer complaints
  10. National Privacy Commission, for personal data misuse
  11. Telecommunications provider, for scam texts or SIM-related issues
  12. Barangay, in limited cases involving known local individuals
  13. Small Claims Court, for certain recoverable money claims
  14. Civil court, where damages or recovery of money is pursued

The best approach is often to report simultaneously to law enforcement and to the financial institution or platform involved.


5. Immediate Steps After Discovering an Online Scam

The first response matters. A victim should act quickly and methodically.

Step 1: Stop Communicating, But Do Not Delete Anything

Do not continue arguing with the scammer. However, do not delete messages, emails, call logs, transaction receipts, account names, links, photos, or posts. These may be needed as evidence.

Step 2: Secure Accounts

Change passwords immediately for:

  • email;
  • bank accounts;
  • e-wallets;
  • online marketplace accounts;
  • social media accounts;
  • messaging apps;
  • cloud storage;
  • device lock screens.

Enable two-factor authentication using an authenticator app or secure method where possible.

Step 3: Contact the Bank or E-Wallet Provider

If money was sent through a bank, e-wallet, remittance service, or card, report immediately and request:

  • account freeze;
  • transaction hold;
  • dispute investigation;
  • reversal, if possible;
  • preservation of transaction records;
  • blocking of compromised cards or accounts.

Time is critical. Once funds are withdrawn or transferred through multiple accounts, recovery becomes much harder.

Step 4: Report to the Platform

If the scam happened through Facebook, Messenger, Instagram, TikTok, Shopee, Lazada, Carousell, Viber, Telegram, WhatsApp, or another platform, report the account, listing, group, page, ad, or message.

Ask the platform to preserve records if possible.

Step 5: Preserve Evidence

Take screenshots and download files. Record URLs, usernames, profile links, mobile numbers, account numbers, email addresses, and transaction reference numbers.

Step 6: File a Complaint With PNP-ACG or NBI Cybercrime Division

Report the incident to cybercrime authorities with complete evidence.

Step 7: Consider Filing a Criminal Complaint

For serious losses or identifiable suspects, the victim may file a formal criminal complaint before the prosecutor’s office or through law enforcement referral.


6. Evidence to Gather Before Reporting

Strong evidence increases the chance of investigation and prosecution.

Prepare copies of:

  1. Screenshots of conversations
  2. Full names and aliases used by the scammer
  3. Social media profile links
  4. Marketplace profile links
  5. Usernames and handles
  6. Mobile numbers
  7. Email addresses
  8. Bank account names and numbers
  9. E-wallet account names and numbers
  10. QR codes used for payment
  11. Transaction receipts
  12. Reference numbers
  13. Deposit slips
  14. Proof of transfer
  15. Product listing screenshots
  16. Advertisements or sponsored posts
  17. Website URLs
  18. Domain names
  19. IP addresses, if available
  20. Delivery tracking details
  21. Photos or videos sent by the scammer
  22. Voice recordings, if lawfully obtained
  23. Call logs
  24. Fake IDs or documents sent by the scammer
  25. Proof of non-delivery
  26. Proof of account hacking
  27. Bank or e-wallet complaint reference number
  28. Platform report reference number
  29. Timeline of events
  30. Affidavit of complaint

Screenshots should show the date, time, account name, profile URL, and full message where possible. Avoid cropping too much.


7. How to Preserve Digital Evidence Properly

Digital evidence can be challenged if incomplete or altered. To preserve it:

  1. Take screenshots of the entire conversation.
  2. Include timestamps and profile details.
  3. Save URLs, not just profile names.
  4. Export chat history if the platform allows it.
  5. Save original emails with full headers if possible.
  6. Do not edit screenshots except to make copies.
  7. Keep the original device used in the transaction.
  8. Back up files to secure storage.
  9. Write a chronological timeline.
  10. Print copies for filing, but keep digital originals.

For emails, full headers may help trace the source. For websites, screenshots should include the URL bar. For social media accounts, profile links are better than display names because names can be changed.


8. How to Report to PNP Anti-Cybercrime Group

The PNP Anti-Cybercrime Group investigates cyber-related offenses, including online scams, cyber estafa, phishing, identity theft, hacking, online threats, and related cyber incidents.

A complainant should prepare:

  • valid government ID;
  • affidavit of complaint;
  • screenshots and digital evidence;
  • transaction receipts;
  • account details of the scammer;
  • bank or e-wallet reports;
  • timeline of events;
  • contact information of witnesses, if any.

The report may be made through the appropriate PNP-ACG office or cybercrime desk. In urgent cases, a victim may also approach the nearest police station, which may refer the matter to the cybercrime unit.

What Happens After Reporting

PNP-ACG may:

  • receive the complaint;
  • evaluate the evidence;
  • require an affidavit;
  • preserve or request digital records;
  • coordinate with banks, e-wallets, telcos, or platforms;
  • conduct investigation;
  • identify suspects;
  • refer the case for inquest or preliminary investigation;
  • assist in preparing a complaint for the prosecutor.

9. How to Report to NBI Cybercrime Division

The NBI Cybercrime Division also investigates online scams and cyber-related offenses.

A complainant should bring:

  • valid ID;
  • notarized or sworn complaint-affidavit, if required;
  • printed screenshots;
  • digital copies of evidence;
  • payment receipts;
  • account details;
  • links and usernames;
  • bank or e-wallet correspondence;
  • other supporting documents.

The NBI may evaluate whether the matter is within its cybercrime jurisdiction and whether further investigation, digital tracing, entrapment, or referral is appropriate.


10. PNP-ACG vs. NBI Cybercrime Division

Both may investigate cybercrime complaints. The choice often depends on accessibility, urgency, type of case, and where the victim can file more effectively.

PNP-ACG may be practical when:

  • immediate police action is needed;
  • the suspect is local or identifiable;
  • there is an ongoing scam;
  • coordination with local police is needed;
  • the victim wants police blotter or investigation support.

NBI Cybercrime Division may be practical when:

  • the case is complex;
  • the scam involves multiple victims;
  • digital forensic investigation is needed;
  • there are cross-regional or organized elements;
  • the victim needs investigative assistance for prosecution.

A victim should avoid filing multiple inconsistent complaints. If reporting to both, the statements should be consistent and disclose prior reports.


11. Filing a Complaint With the Prosecutor’s Office

A criminal complaint may be filed before the Office of the City or Provincial Prosecutor with jurisdiction over the offense.

The complaint usually includes:

  1. Complaint-affidavit
  2. Supporting affidavits of witnesses
  3. Screenshots and digital evidence
  4. Transaction receipts
  5. Certification or documents from banks or e-wallets
  6. Police or NBI report, if any
  7. Other documentary evidence

The prosecutor will evaluate whether there is probable cause to charge the suspect in court.

Jurisdiction and Venue

Venue in cybercrime and online fraud can be complicated because the victim, scammer, bank, platform, server, and transaction may be in different places. In practice, complainants often file where the victim resides, where payment was made, where the damage occurred, or where law enforcement directs the complaint.

For serious cases, legal advice is useful to avoid filing in the wrong venue.


12. Reporting to Banks and E-Wallet Providers

When money is transferred through a bank or e-wallet, immediate reporting is crucial.

The victim should request:

  • freezing of recipient account, if possible;
  • reversal or dispute investigation;
  • blocking of compromised account;
  • transaction history;
  • official complaint reference number;
  • preservation of logs;
  • investigation of mule accounts;
  • advice on chargeback or dispute remedies.

Provide:

  • transaction date and time;
  • amount;
  • sender account;
  • recipient account;
  • reference number;
  • screenshots;
  • police report, if already available;
  • valid ID.

Important Reminder About OTPs

Banks and e-wallets often deny liability where the victim voluntarily gave the OTP, PIN, password, or login code. However, the victim should still report immediately because the receiving account may be frozen or investigated, and the scammer may be identified.


13. Reporting Unauthorized Bank or E-Wallet Transactions

If the victim did not authorize the transaction, the matter should be reported as an unauthorized transaction, not merely as a scam payment.

Examples:

  • account takeover;
  • SIM swap-related transfer;
  • card-not-present transaction;
  • unauthorized online purchase;
  • unauthorized e-wallet cash-out;
  • linked card abuse;
  • phishing-caused account takeover.

The victim should:

  1. Freeze or block the account.
  2. Change passwords and PINs.
  3. Report to the bank or e-wallet immediately.
  4. Request investigation under the provider’s dispute process.
  5. File a police or cybercrime report.
  6. Preserve device, SMS, emails, and login notifications.
  7. Check for malware or unauthorized apps.
  8. Report SIM issues to the telco.

14. Reporting Scam Texts and Calls

Scam texts and calls are common in the Philippines. A victim should:

  • take screenshots of the message;
  • record the sender number;
  • note date and time;
  • do not click links;
  • do not reply;
  • report to the telco;
  • report to law enforcement if there was loss or identity theft;
  • block the sender after preserving evidence.

If the scam text impersonates a bank, e-wallet, courier, or government agency, report it to that institution as well.


15. Reporting Social Media Scams

If the scam happened through social media:

  1. Screenshot the profile.
  2. Copy the profile URL.
  3. Screenshot the conversation.
  4. Screenshot the post, group, page, or ad.
  5. Save transaction proof.
  6. Report the account or page to the platform.
  7. Warn contacts if your account was hacked.
  8. Change passwords and enable two-factor authentication.
  9. Report to PNP-ACG or NBI for serious cases.

For hacked accounts, request account recovery immediately and notify contacts not to send money.


16. Reporting Online Marketplace Scams

For scams on online selling platforms:

  • file a platform complaint immediately;
  • use the platform’s buyer protection process, if available;
  • avoid moving transactions outside the platform;
  • report fake sellers and listings;
  • keep order numbers, chat logs, and payment records;
  • escalate within the platform before deadlines expire.

If payment was made outside the platform through bank transfer or e-wallet, recovery may be more difficult, but criminal reporting remains available.


17. Reporting Investment Scams

Investment scams should be reported to law enforcement and, where applicable, to the Securities and Exchange Commission.

A victim should gather:

  • investment contract;
  • screenshots of promised returns;
  • proof of payment;
  • names of promoters;
  • group chat records;
  • payout records;
  • referral materials;
  • corporate registration claims;
  • certificates or licenses shown by the promoters;
  • videos, webinars, and advertisements;
  • names of other victims.

Warning Signs of Investment Scams

Common red flags include:

  1. Guaranteed high returns
  2. No real business model
  3. Pressure to recruit
  4. Referral commissions
  5. “Limited slots” urgency
  6. No clear risk disclosure
  7. Use of fake SEC registration
  8. Claim that registration equals license to solicit investments
  9. No audited financials
  10. Returns paid mainly from new investors
  11. Promoters discouraging questions
  12. Use of celebrity images or fake endorsements

Corporate registration alone does not necessarily authorize a company to solicit investments from the public.


18. Reporting Data Privacy Violations

If the scam involves misuse of personal information, identity theft, unauthorized posting of personal data, or unlawful processing of sensitive personal information, the victim may consider reporting to the National Privacy Commission.

Examples:

  • scammer used victim’s ID to open accounts;
  • personal information was posted to shame or harass the victim;
  • loan app accessed contacts without proper authority;
  • personal data was sold or used for phishing;
  • fake account was created using the victim’s name and photo.

The victim should preserve:

  • screenshots;
  • links;
  • copies of IDs misused;
  • messages threatening disclosure;
  • proof of unauthorized access;
  • reports made to platforms or institutions.

19. Reporting Fake Online Sellers to Consumer Agencies

If the transaction is a consumer purchase from a seller or business, the Department of Trade and Industry may be relevant, especially where the seller is identifiable and engaged in trade.

However, if the seller is a fake identity, mule account, or purely fraudulent operation, law enforcement may be more appropriate.

Consumer complaint remedies may involve mediation, refund, replacement, or administrative action, while criminal complaints involve prosecution for fraud or cybercrime.


20. Reporting Scams Involving Minors

If a minor is involved as a victim, especially in sextortion, grooming, online sexual exploitation, blackmail, identity abuse, or coercion, the matter should be treated as urgent.

Parents, guardians, teachers, or concerned persons should report immediately to law enforcement, child protection authorities, or appropriate hotlines.

Do not pay the blackmailer. Preserve evidence, stop contact, secure the child’s accounts, and seek immediate assistance.


21. Reporting Sextortion

Sextortion is not merely a financial scam. It may involve coercion, threats, privacy violations, cybercrime, violence against women and children laws, child protection laws, or anti-photo and video voyeurism laws, depending on the facts.

A victim should:

  1. Stop communicating with the blackmailer.
  2. Do not send more images or money.
  3. Preserve all messages and threats.
  4. Screenshot usernames and profile links.
  5. Report the account to the platform.
  6. Report to PNP-ACG or NBI Cybercrime Division.
  7. Inform a trusted person.
  8. Seek legal or psychological support.
  9. For minors, immediately involve a parent, guardian, school authority, or child protection officer.

Payment often leads to more demands, not resolution.


22. Reporting Identity Theft

Identity theft may occur when the scammer uses another person’s name, photo, ID, account, number, or personal information to deceive others.

Examples:

  • fake Facebook account using your name and photo;
  • scammer uses your ID to create e-wallet accounts;
  • someone opens a loan account using your identity;
  • scammer impersonates you to borrow money from contacts;
  • hacked account used to solicit funds.

The victim should:

  • report to the platform;
  • inform contacts;
  • file a police or cybercrime report;
  • notify banks and e-wallets;
  • monitor credit, loans, and government records;
  • file with the National Privacy Commission if personal data was misused;
  • keep proof that the fake account is not yours.

23. Scam Involving GCash, Maya, Bank Transfers, or Remittance

Many online scams use payment channels that leave transaction trails. The victim should report to the provider immediately.

Provide:

  • account name of recipient;
  • account number or mobile number;
  • amount sent;
  • date and time;
  • reference number;
  • screenshots of inducement;
  • proof of non-delivery or fraud;
  • police report, if available.

Ask whether the provider can:

  • freeze the recipient account;
  • preserve KYC records;
  • investigate mule activity;
  • reverse the transaction;
  • issue a certification of transaction;
  • coordinate with law enforcement.

Providers may not freely disclose the recipient’s personal details to the victim due to privacy rules, but they may provide information to law enforcement under proper process.


24. Can You Recover the Money?

Recovery depends on timing, payment method, whether the receiving account can be frozen, and whether the suspect can be identified.

Recovery is more likely if:

  • the report is made immediately;
  • funds remain in the recipient account;
  • payment was through a reversible card transaction;
  • platform buyer protection applies;
  • the scammer is identifiable;
  • the bank or e-wallet acts quickly;
  • law enforcement can coordinate with providers.

Recovery is harder if:

  • funds were withdrawn in cash;
  • funds passed through mule accounts;
  • cryptocurrency was used;
  • payment was made voluntarily by transfer;
  • the scammer used fake IDs or stolen accounts;
  • the victim delayed reporting;
  • the scammer is abroad;
  • the platform transaction was moved outside official channels.

Criminal prosecution may punish the offender, but it does not automatically guarantee full recovery. Civil action or restitution may still be necessary.


25. Criminal Case vs. Civil Recovery

A scam victim may have both criminal and civil remedies.

Criminal Complaint

A criminal complaint seeks prosecution and punishment of the offender. It may also include civil liability arising from the crime.

Civil Action

A civil action seeks recovery of money, damages, or enforcement of obligations. Depending on the amount and nature of the claim, small claims procedure may be available.

Platform or Bank Dispute

A platform, bank, or e-wallet dispute may lead to refund, reversal, account freeze, or internal investigation, but it is separate from criminal prosecution.

The victim should consider all available channels, especially if the amount is significant.


26. Small Claims as a Possible Remedy

If the scammer is identifiable and the claim is for a sum of money, small claims may be considered, especially where the issue is recovery rather than criminal punishment.

Small claims proceedings are designed to be faster and simpler than ordinary civil cases, and lawyers are generally not required to appear on behalf of parties during hearings.

However, small claims may not be effective if:

  • the scammer’s true identity is unknown;
  • the address is unknown;
  • the scammer used a fake account;
  • the case requires complex fraud investigation;
  • the purpose is criminal punishment;
  • the amount exceeds the applicable threshold;
  • the defendant cannot be served.

27. Barangay Proceedings

Barangay conciliation may apply to disputes between individuals who reside in the same city or municipality, subject to exceptions. However, many online scams involve unknown identities, different locations, cybercrime, or criminal offenses beyond simple barangay settlement.

If the suspect is known and local, barangay proceedings may sometimes help recover money, but serious online fraud should still be reported to proper law enforcement authorities.


28. How to Write a Complaint-Affidavit for Online Scam

A complaint-affidavit should be clear, chronological, and evidence-based.

It should include:

  1. Complainant’s name, age, civil status, address, and contact details
  2. Suspect’s name, alias, account, phone number, or identifying details
  3. How the complainant encountered the suspect
  4. What representations were made
  5. Why the complainant relied on them
  6. How much was paid or lost
  7. Payment method and transaction details
  8. What happened after payment
  9. Evidence attached
  10. Statement that the complaint is filed to seek investigation and prosecution
  11. Verification that the statements are true based on personal knowledge and records

29. Sample Complaint-Affidavit for Online Selling Scam

Republic of the Philippines City/Municipality of __________ S.S.

Complaint-Affidavit

I, [Full Name], of legal age, Filipino, and residing at [address], after being duly sworn, state:

  1. On or about [date], I saw an online listing for [item] posted by an account using the name [name/account] on [platform].

  2. The seller represented that the item was available and that it would be delivered after payment.

  3. Relying on these representations, I sent the amount of ₱[amount] on [date and time] through [bank/e-wallet/remittance] to [recipient account name, number, or details], with reference number [reference number].

  4. After receiving payment, the seller failed to deliver the item. The seller also stopped responding, blocked me, deleted the post, or gave false excuses.

  5. Attached are screenshots of the listing, my conversation with the seller, proof of payment, and the seller’s profile/account details.

  6. I am executing this affidavit to request investigation and filing of the appropriate criminal charges for online scam, cyber fraud, estafa, and other offenses that may be found applicable.

IN WITNESS WHEREOF, I have signed this affidavit this ___ day of __________ 20___ at __________, Philippines.

[Signature] Affiant

Subscribed and sworn to before me this ___ day of __________ 20___, affiant exhibiting competent proof of identity.


30. Sample Complaint-Affidavit for Phishing or Unauthorized Transfer

Republic of the Philippines City/Municipality of __________ S.S.

Complaint-Affidavit

I, [Full Name], of legal age, Filipino, and residing at [address], after being duly sworn, state:

  1. I maintain an account with [bank/e-wallet] under account/mobile number [details].

  2. On [date], I received [SMS/email/call/message] from a person or account claiming to be [bank/e-wallet/courier/government agency].

  3. The message contained a link or instruction requiring me to [verify account/update details/claim package/reverse charge/etc.].

  4. Shortly after the incident, unauthorized transactions were made from my account, including [describe transaction, amount, date, reference number].

  5. I did not authorize these transactions and did not benefit from them.

  6. I immediately reported the matter to [bank/e-wallet] and requested blocking, investigation, and preservation of records.

  7. Attached are screenshots of the message, transaction history, bank/e-wallet report, and other supporting documents.

  8. I am executing this affidavit to request investigation and filing of appropriate charges for cybercrime, unauthorized access, fraud, identity theft, and other offenses that may be found applicable.

IN WITNESS WHEREOF, I have signed this affidavit this ___ day of __________ 20___ at __________, Philippines.

[Signature] Affiant

Subscribed and sworn to before me this ___ day of __________ 20___, affiant exhibiting competent proof of identity.


31. How to Report If the Scammer Is Abroad

Many scams are operated from outside the Philippines. Reporting is still important.

The victim should:

  • file with Philippine cybercrime authorities;
  • report to the bank or payment provider;
  • report to the platform;
  • preserve all evidence;
  • identify any local mule accounts or accomplices;
  • include foreign numbers, emails, websites, and crypto wallet addresses;
  • coordinate with law enforcement if international assistance is needed.

Cases involving foreign suspects may be harder to prosecute, but local money mules, recruiters, account holders, or accomplices may still be investigated.


32. Money Mule Accounts

A money mule is a person whose bank or e-wallet account is used to receive, transfer, or withdraw scam proceeds.

Some mules knowingly participate. Others are recruited through fake jobs, “cash-in/cash-out” tasks, or promises of commission.

Victims should provide law enforcement and banks with recipient account details because these may identify the mule account, even if the mastermind is elsewhere.


33. What If the Scammer Used a Fake Name?

Even if the scammer used a fake name, the victim should report. Scammers may still be traced through:

  • bank or e-wallet KYC records;
  • mobile numbers;
  • SIM registration data;
  • IP logs;
  • device identifiers;
  • platform records;
  • delivery details;
  • cash-out locations;
  • CCTV at withdrawal points;
  • linked accounts;
  • other victims’ reports.

Victims generally cannot compel platforms, banks, or telcos to disclose private records directly, but law enforcement may request or obtain them through proper legal processes.


34. What If the Bank or E-Wallet Refuses to Refund?

A refusal to refund does not necessarily end the matter. The victim may:

  1. Ask for the basis of denial in writing.
  2. Request reconsideration or escalation.
  3. File a formal complaint with the provider.
  4. Report to the relevant financial regulator or consumer assistance channel.
  5. File a cybercrime complaint.
  6. Consider civil remedies if there is negligence or contractual breach.

The outcome depends on whether the transaction was authorized, whether the provider complied with security obligations, and whether the victim disclosed credentials or OTPs.


35. What If the Scam Involves Cryptocurrency?

Cryptocurrency scams are difficult because transfers may be irreversible and wallets may be pseudonymous.

The victim should preserve:

  • wallet addresses;
  • transaction hashes;
  • exchange account details;
  • screenshots of trading platform;
  • chat logs;
  • promised returns;
  • websites;
  • referral links;
  • names of promoters;
  • proof of fiat payments.

Report to:

  • law enforcement;
  • the exchange, if known;
  • bank or e-wallet used to buy or send crypto;
  • SEC, if it involves investment solicitation;
  • platform where the scam was promoted.

Do not send additional money to “recover” crypto. Recovery scammers often target victims again by pretending they can retrieve lost funds for a fee.


36. Recovery Scams After the First Scam

Victims are often targeted again by people claiming they can recover lost money. These may be fake lawyers, fake hackers, fake law enforcement officers, or fake recovery agents.

Warning signs include:

  • asking for upfront recovery fees;
  • promising guaranteed recovery;
  • claiming special access to banks or crypto wallets;
  • using fake badges or IDs;
  • pressuring the victim not to report to police;
  • requesting more personal information or OTPs.

A legitimate lawyer, investigator, or government officer will not guarantee recovery or ask for OTPs and passwords.


37. What Not to Do After Being Scammed

A victim should avoid:

  1. Deleting conversations
  2. Sending more money
  3. Threatening the scammer in a way that may backfire
  4. Posting unverified personal data of suspected persons
  5. Harassing relatives of the suspected scammer
  6. Sharing OTPs or passwords with “investigators”
  7. Installing remote access apps
  8. Paying recovery agents
  9. Filing exaggerated or false statements
  10. Ignoring bank dispute deadlines
  11. Waiting too long before reporting
  12. Publicly posting evidence that may compromise investigation

Public warnings may help others, but victims should be careful not to commit cyberlibel or privacy violations by making accusations without sufficient basis.


38. Cyberlibel Risk When Posting About Scammers

Victims often want to post the scammer’s name, photos, account numbers, IDs, and accusations online. While public warnings may be understandable, there is a legal risk if the post contains defamatory statements, private information, or misidentifies a person.

Safer approaches include:

  • report to authorities first;
  • post neutral warnings without excessive personal attacks;
  • avoid publishing IDs, addresses, private photos, or family information;
  • state verifiable facts only;
  • avoid accusing someone unless evidence is clear;
  • use official platform reporting tools.

A person can be both a scam victim and a respondent in a cyberlibel or privacy complaint if online posts go too far.


39. Employer or Business Victims

Businesses can also be victims of online scams, including:

  • fake supplier scams;
  • invoice fraud;
  • business email compromise;
  • payroll diversion;
  • fake purchase orders;
  • hacked corporate emails;
  • ransomware-related fraud;
  • unauthorized fund transfers;
  • fake customer refund scams.

Businesses should:

  1. Preserve email headers and server logs.
  2. Notify banks immediately.
  3. Freeze affected accounts.
  4. Report to cybercrime authorities.
  5. Conduct internal IT investigation.
  6. Notify affected clients if data was compromised.
  7. Review payment approval controls.
  8. Consider Data Privacy Act breach notification duties if personal data was affected.

40. Online Scam Checklist for Victims

Within the First Hour

  • Stop contact with the scammer.
  • Screenshot everything.
  • Call the bank or e-wallet.
  • Block cards or compromised accounts.
  • Change passwords.
  • Enable two-factor authentication.
  • Report hacked social media accounts.

Within the Same Day

  • File a report with cybercrime authorities.
  • Report to the platform.
  • Prepare a timeline.
  • Gather IDs and transaction receipts.
  • Notify contacts if your account was used.
  • Check other accounts for compromise.

Within the Next Few Days

  • Execute a complaint-affidavit.
  • Follow up with bank or e-wallet.
  • Submit additional evidence.
  • Coordinate with other victims, if any.
  • Consider SEC, DTI, NPC, or other agency reports if applicable.
  • Consult a lawyer if the loss is substantial.

41. Frequently Asked Questions

Can I report an online scam even if the amount is small?

Yes. Even small-value scams may be reported. Multiple small complaints may reveal a larger organized scheme.

Can I report even if I only know the scammer’s account name or number?

Yes. Bank accounts, e-wallet numbers, mobile numbers, usernames, links, and transaction reference numbers may help investigators.

Can I get my money back immediately after filing a police report?

Not necessarily. A police report helps investigation, but recovery depends on whether funds can be frozen or recovered and whether the suspect can be identified.

Is a screenshot enough evidence?

Screenshots help, but stronger evidence includes transaction receipts, profile links, full conversations, platform records, bank reports, and affidavits.

Should I pay the scammer again to recover my money?

No. Scammers often demand more money through fake taxes, clearance fees, refund fees, or recovery fees.

What if the scammer blocked me?

Take screenshots showing the blocked account, save the profile link, and report immediately. Blocking does not prevent investigation.

What if I gave my OTP?

Report immediately, secure accounts, and file a complaint. Giving an OTP may affect bank refund claims, but law enforcement reporting remains important.

Can I file a case if the scammer is in another city?

Yes. Cybercrime cases often involve different locations. Law enforcement or the prosecutor can guide venue and referral.

Can I report a fake investment scheme even if I received some payouts?

Yes. Receiving early payouts does not necessarily make the scheme legitimate. Preserve all records.

Can I report a scam anonymously?

You may report suspicious activity, but recovering money or filing a formal complaint usually requires your identity and participation.


42. When to Consult a Lawyer

Legal advice is strongly recommended when:

  1. The amount lost is substantial.
  2. The scammer is identifiable.
  3. The case involves business funds.
  4. The case involves investment solicitation.
  5. There are multiple victims.
  6. The victim is accused of participating as a money mule.
  7. The bank denies liability for unauthorized transfers.
  8. Sensitive photos or blackmail are involved.
  9. Minors are involved.
  10. Personal data was misused.
  11. The victim wants to file a criminal complaint.
  12. The victim wants to recover money through civil action.
  13. The case may involve cyberlibel risk from public posts.

Conclusion

Reporting online scams in the Philippines requires speed, evidence preservation, and use of the correct reporting channels. Victims should immediately secure accounts, report to banks or e-wallets, preserve screenshots and transaction records, report the scam to the platform, and file a complaint with cybercrime authorities such as PNP-ACG or the NBI Cybercrime Division.

Depending on the type of scam, additional reports may be appropriate with the SEC for investment scams, DTI for consumer transactions, the National Privacy Commission for personal data misuse, telcos for scam texts or calls, and financial institutions for unauthorized transfers.

The most important practical rule is to act quickly. Money moves fast, digital accounts disappear, and evidence can be deleted. A well-prepared complaint with clear facts, complete screenshots, transaction proof, and a chronological timeline gives authorities, banks, platforms, and prosecutors the best chance to investigate the scam and help the victim pursue recovery and accountability.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.