Network

Home / ACC Tip / Steps to document an impersonation attempt

Victim of cybercriminals? Report your incident to help prevent further attacks.

Steps to document an impersonation attempt

Impersonation scams are designed to disappear quickly. The scammer pressures you, attempts to extract information or money, and then vanishes. What many people do not realize is that properly documenting the attempt can make a major difference.

Accurate documentation helps banks investigate fraud, supports law enforcement reports, strengthens dispute claims, and may even prevent others from becoming victims.

If you experience a bank, government, or agency impersonation attempt, here is exactly how to document it correctly.


Why Documentation Matters

When reporting impersonation fraud, vague descriptions are rarely enough.

Saying “someone called pretending to be my bank” is not as powerful as providing:

  • The exact phone number used
  • The time and date of contact
  • Screenshots of messages
  • The payment method requested
  • The script or phrases used by the scammer

The more precise your documentation, the more actionable your report becomes.

Good documentation can:

  • Speed up fraud investigations
  • Help recover stolen funds
  • Assist cybercrime units in identifying patterns
  • Protect you legally if disputes arise

Step 1: Stop Communication Immediately

Before documenting anything, end the interaction.

Do not argue.
Do not threaten.
Do not attempt to outsmart the scammer.

Simply stop responding.

Continuing the conversation increases risk and gives the attacker more data.


Step 2: Record the Date and Time

Write down:

  • The exact date
  • The time
  • Your time zone
  • How long the interaction lasted

This information is critical for banks and authorities who track fraudulent call centers and phishing campaigns.

Even a few minutes of accuracy can help link your case to others.


Step 3: Capture Screenshots

If the impersonation occurred via:

  • SMS
  • Email
  • WhatsApp
  • Social media
  • Fake website
  • Messaging app

Take screenshots immediately.

Make sure the screenshots show:

  • Sender information
  • Phone number or email address
  • URL if visible
  • Entire message thread
  • Any suspicious links

Do not crop too much. Full context matters.

Store the images in a secure folder.


Step 4: Save Phone Call Details

If it was a phone call:

  • Screenshot your call log
  • Save the number exactly as displayed
  • Note if it appeared as your bank’s official number
  • Record whether it was an automated or live voice
  • Write down the accent or tone if relevant

Caller ID spoofing is common, so even official looking numbers must be documented.


Step 5: Write Down What Was Said

Memory fades quickly.

Immediately write a brief summary including:

  • How they introduced themselves
  • What institution they claimed to represent
  • The reason for the call
  • The threat or urgency used
  • The action they demanded
  • The payment method requested

Try to recall specific phrases. Scammers often follow scripts, and repeating phrases can connect your case to known campaigns.


Step 6: Preserve Evidence Without Interacting

Do not click suspicious links again.

If you received a phishing email:

  • Do not forward it carelessly
  • Do not reply
  • Do not download attachments

If possible, save the email as a file in its original format.

If a fake website was involved, take screenshots but avoid entering any data.


Step 7: Check for Data Exposure

Ask yourself:

  • Did I share personal information?
  • Did I provide a verification code?
  • Did I click a link?
  • Did I download anything?

If yes, document exactly what was shared.

Be specific.
For example: “I shared the last four digits of my Social Security number” is more helpful than “I shared some information.”


Step 8: Contact the Real Institution Directly

Use official contact details from:

  • The institution’s official website
  • The number printed on your card
  • Verified government portals

Inform them that an impersonation attempt occurred and provide your documented evidence.

Early reporting increases the chance of preventing financial damage.


Step 9: Report to Cybercrime Authorities

Depending on your country, you may report impersonation fraud to:

  • National cybercrime reporting centers
  • Financial fraud authorities
  • Consumer protection agencies
  • Local police if financial loss occurred

Provide:

  • Screenshots
  • Timeline
  • Phone numbers
  • URLs
  • Payment instructions requested

The more organized your documentation, the more credible your case.


Step 10: Secure Your Accounts

Even if no money was lost, take precautionary steps:

  • Change passwords
  • Enable two factor authentication
  • Monitor bank transactions
  • Activate account alerts
  • Consider placing a fraud alert on your credit profile

Documentation protects the investigation. Prevention protects your future.


Common Mistakes to Avoid

Ignoring the incident
Deleting messages too quickly
Failing to take screenshots
Waiting days before reporting
Assuming no harm was done

Even unsuccessful attempts should be documented. They contribute to intelligence tracking.


Quick Documentation Checklist

Immediately after an impersonation attempt:

  • Stop communication
  • Record date and time
  • Screenshot messages or call logs
  • Write down what was said
  • Save suspicious links without clicking again
  • Contact the real institution
  • Report to cybercrime authorities
  • Secure your accounts

Keep everything in one secure folder for easy access.


Final Thoughts

Impersonation scams rely on speed and emotional reaction. Documentation slows things down and shifts control back to you.

When you document properly, you are not just protecting yourself. You are helping expose criminal networks that target thousands of people every day.

Stay calm.
Collect evidence.
Report with clarity.
Secure your accounts.

Prepared individuals are much harder targets.

Back
Report a Scam
Contact Us
Get Help

Support the Fight Against Cybercrime

One-time contribution. No subscriptions.
 
Awareness Support
Helps educate people to recognize scams and digital threats.
$15
Builder
Supports
Supports educational tools and scam-prevention resources.
$35
Mission Accelerator
Directly strengthens the fight against cybercrime worldwide.
$50
Donate a Custom Amount
Choose an amount that matches the impact you want to make.

*Your contribution supports education, awareness, and community-driven cybercrime prevention

;