one person asking to borrow a phone from another This scam typically involves a stranger approaching you and asking to borrow your phone, computer, or Wi-Fi, usually claiming an emergency or urgent situation. 

What can happen to you as a result?

  1. Scammers may use your phone to charge unauthorized calls and generate revenue via tolls on your account.
  2. They might attempt to gather personal information from your phone, computer, or Wi-Fi network to exploit it for Identity Theft or other fraudulent activities.
  3. There is a risk that the scammer could steal your phone or computer or damage it before returning it. 

  • Be cautious if the person seems overly urgent or insistent on using your device, particularly if they are unwilling to provide specific details about their situation.
  • Scammers often approach potential victims without a charger, claiming their phone is dead. This could be a red flag.
  • If the person's story changes or seems implausible, it could indicate a scam. 
  • Beware of strangers who ask to use your device in a secluded area or insist on making the call or web search themselves.
  • Exercise caution when approached by strangers requesting to borrow your phone, computer, or Wi-Fi. It's okay to decline politely. 
  • If you feel inclined to help, suggest alternative ways to assist the person, such as making the requested call or web search for them or directing them to a nearby public place with a phone they can use. 
  • Always watch your electronic devices and be aware of your surroundings. Avoid leaving them unattended, especially in the presence of strangers.
  • Create alerts at all your financial institutions for your debit or withdrawal transactions. 
  • Review your call logs, messages, and app usage for suspicious or unauthorized activity.
  • Protect your devices and networks with a passcode or biometric authentication. Additionally, consider installing security software to help detect and prevent unauthorized access. See  Cybercrime Prevention.html for more information.
  • Write down your phone's IMEI or MEID number, so your carrier may be able to disable your smartphone and mobile payment apps, and block access to your personal information and sensitive data.
  • Immediately contact your finanical institutions if you see an alert for a transaction you don't recognize. If you contact the institution promptly, they may be able to trace, block, and/or reimburse you for the transaction amount.
  • If you suspect your device or personal information has been compromised, change your passwords immediately, especially for accounts related to banking, email, social media, or other sensitive platforms.  See Identity Theft for more information. 
  • Report fraudulent charges or suspicious incidents to your carrier or service provider and relevant authorities. See Reporting Fraud.

References: