Steps to take after online fraud: preserve evidence, secure accounts, and contact providers quickly Legal Advice

LEGAL ADVICE • IMMEDIATE ACTION PLAN

Steps to Take Immediately After Falling Victim to Online Fraud

The first 24–72 hours often determine how many options remain. This practical checklist shows what to do right away: stop further loss, secure accounts, preserve messages and transfer proof, notify the right providers, and avoid “moves” that can damage your case.

  • By Greyline Legal
  • Date
  • Read time 8–10 min
  • Scope Canada + cross-border

Online fraud rarely ends with the first payment. Most schemes are built to keep extracting money through urgency, “verification fees”, withdrawal traps, or fake support conversations. Your goal now is simple: prevent additional loss and preserve proof in a clean, organized way. Those two actions typically make later disputes, recalls, and investigations more realistic.

Why speed matters after online fraud

Many recovery paths are time-sensitive. Banks and card issuers often need prompt notice, and platforms may only be able to review activity while accounts and logs are still available. The sooner you document what happened, the easier it is to build a clear narrative: who contacted you, where funds went, and what instructions you were given.

If you feel embarrassed or overwhelmed, that’s normal — scammers rely on that feeling to delay reporting. Try to treat this like an incident response: calm, structured, and evidence-focused.

Step 1: Stop the loss (do this first)

1) Stop sending money — especially “fees” to unlock withdrawals

Extra payments framed as “tax”, “AML clearance”, “account verification”, “insurance”, or “release fee” are classic escalation tactics. Once you pay one, another requirement often appears. Do not send additional transfers, even if they threaten account closure or claim your funds are “frozen”.

2) Cut off real-time access to your accounts

If you shared screen access (AnyDesk/TeamViewer/remote desktop) or allowed “support” to guide transactions, uninstall remote tools and revoke permissions immediately. Disable unknown browser extensions and check for recently installed apps you don’t recognize.

3) Pause risky payment instruments

If a card was used, call the issuer and request a block, replacement, or extra verification measures. If you provided banking credentials or e-transfer access, contact the bank’s fraud department right away and ask about account protection steps.

Fast rule

If someone insists the only way to “recover” or “unlock” funds is to pay more, you are almost certainly dealing with a withdrawal trap. Stop and document everything.

Step 2: Secure accounts and devices

1) Change passwords (starting with email)

Your email is the reset key for most services. Change the email password first, then banking, exchange, and social accounts. Use a unique password for each account (not variations of the same string).

2) Enable MFA (two-factor authentication)

Turn on MFA wherever available, especially for email, banking, and crypto exchanges. If possible, prefer an authenticator app over SMS for critical accounts.

3) Review security settings

  • Check “recent logins” or “devices” lists and sign out unknown sessions.
  • Review recovery email/phone settings for changes you didn’t make.
  • Confirm e-transfer contacts and limits if your bank supports those controls.

4) Keep devices clean

Run a reputable malware scan. If a device was controlled remotely during transactions, consider using a different device for banking until you’re confident your system is secure.

Step 3: Notify banks, card issuers, and platforms

1) Bank and card issuer: report the incident clearly

When contacting the provider, be specific: dates, amounts, merchants, transfer routes, and what you were told. Ask what options exist in your situation (dispute, chargeback, recall, investigation, account protection). Keep a record of the case number and representative notes.

2) Payment intermediaries and wallets

If funds moved through a payment app, crypto exchange, or online wallet, open a support ticket immediately. Provide transaction IDs, destination addresses, and screenshots of instructions you were given.

3) If the fraud involved crypto

Collect blockchain details (TXID, network, wallet addresses) and report to any exchange used to purchase or send the crypto. Even when transfers are irreversible, exchange-side controls, compliance reviews, or flags can matter — but only if you act quickly and provide structured proof.

Step 4: Preserve evidence (what to save)

Evidence gets lost fast: chats disappear, phone numbers change, dashboards get disabled, and “support” accounts vanish. Save everything now, even if it seems minor.

Minimum evidence set

  • Proof of payment: bank statements, e-transfer receipts, card confirmations, wire details
  • Crypto specifics: TXIDs, wallet addresses, network used, timestamps, exchange order history
  • Platform data: URLs/domains, account IDs, screenshots of balances and withdrawal attempts
  • Communication: emails, WhatsApp/Telegram chats, SMS, social messages, call logs
  • Identity cues: names used, “agents”, support handles, phone numbers, email addresses
  • Your timeline: a simple day-by-day note of what happened and when

How to save it cleanly

  • Create one folder and use consistent filenames (e.g., 2025-11-08_transfer_receipt_1.pdf).
  • Export chats where possible, and also take screenshots of key messages.
  • For emails, keep the full message and attachments; don’t forward as plain text if you can export properly.
  • Keep originals. Avoid editing screenshots or cropping out timestamps unless you also keep the uncropped version.

Step 5: Reporting in Canada

Reporting helps establish a timeline and can support provider investigations. In Canada, consider these channels depending on the situation:

  • Local police service: for an incident report and reference number.
  • Canadian Anti-Fraud Centre (CAFC): for national fraud reporting and intelligence.
  • Platform reporting: report profiles/pages used to contact you (social networks, messaging apps).

If you’re unsure what applies, start with your bank/issuer and local police, then file additional reports based on the fraud type (investment, identity takeover, crypto scam, business email compromise, etc.).

Common mistakes that weaken recovery options

1) Paying “recovery agents” who contact you after the loss

After a fraud incident, many victims get targeted again by “fund recovery” services promising guaranteed results for an upfront fee. Be cautious: legitimate help is documentation-first, realistic about outcomes, and does not rely on pressure.

2) Deleting chats or wiping devices too early

It’s tempting to “clean everything,” but you may delete key proof. Preserve evidence first, then secure accounts and devices.

3) Continuing to “negotiate” with scammers

Prolonged contact often leads to more manipulation and loss. Keep communication minimal and evidence-based. Don’t send new documents or payments to “prove identity” to unknown parties.

4) Mixing multiple explanations when reporting

Keep your story consistent and factual: what happened, what you paid, where it went, and what messages or instructions you received. A clean narrative improves credibility and makes reviews faster.

What to do next: build a case-ready timeline

Once you’ve stopped the loss and preserved proof, organize your case into a simple structure:

  1. Timeline: key dates and events (contact, deposit, withdrawal attempt, “fees” demanded).
  2. Parties: names/handles, phone numbers, emails, domains, wallet addresses.
  3. Money map: how funds moved (bank → exchange → wallet, card → merchant, wire → beneficiary).
  4. Evidence pack: receipts + screenshots + exported chats + platform URLs.

A structured, documentation-first review can help you understand which steps are realistic in your specific situation and what additional information would strengthen the file.

Conclusion

If you’ve been scammed online, your first priority is to stop additional loss. Your second priority is to preserve evidence while it still exists. After that, notify the right providers and report using the appropriate Canadian channels. The goal is not panic — it’s a clear record that supports action.