Skip Header

Impersonations

Impersonation scams are used by fraudsters to try to get you to provide sensitive account details by pretending to be someone trusted or in a position of authority. They will often ask you to provide credential details, share one-time passcodes or click on malicious links to provide access to your accounts.

Impersonation scams: what to look out for

Attackers may call you pretending to be a Fidelity employee, claiming there is an urgent issue with your account and creating a sense of urgency and fear to act immediately. 

How to protect yourself:

  • A genuine Fidelity employee will never ask you to share login credentials.
  • If you are unsure, contact Fidelity’s helpline directly from our website.

Fraudsters might purport to be an I.T. support worker and request to access your desktop remotely under the guise of helping you resolve an account issue. This could be done over the phone or they may send you an email and ask you to click a link.

How to protect yourself:

  • Never allow anyone to access your desktop remotely—Fidelity will never ask you to do this.
  • If you receive such a request, end the conversation and report it immediately.

Another tactic fraudsters use is sending WhatsApp messages claiming to be a trusted person - such as a close family member or a known organisation - asking you to transfer funds or click malicious links.

How to protect yourself:

  • Always verify who you are speaking with either by checking in person or via a different platform and never share your sensitive data.
  • If you notice any suspicious activity on your account or have any doubts about who may be contacting you, report it to Fidelity.

Fraudsters may impersonate trusted individuals or organisation, such as the police or employees from regulated firms, to gain your trust. They may claim your account is at risk and insist you move funds to a “safe” account or act urgently to avoid supposed penalties.

How to protect yourself:

  • If your contacted unexpectedly, do not share sensitive details or transfer money with unexpected contacts.
  • If you suspect the call is suspicious, hang up and contact the organisation directly using a verified phone number or website.

Impersonation scams are designed to exploit your emotions and trust, some may even produce convincing content to trick you into doing something or to steal your data. By staying vigilant and verifying requests, you can prevent attackers from gaining access to your accounts.

 For more tips on protecting yourself from cyber threats, visit our

Other techniques used by fraudsters

Social Engineering

Learn how to spot a fraudulent email, text or phone call, so you’re not reeled in.

Deepfakes

Understand the tell-tale signs that could help you identify a deepfake.