Cybercriminals are always looking for ways to trick people.
Some of the most common methods are look-alike domains and spoofing—creating fake websites and emails that are almost identical to real ones. Scammers want you to believe you’re on a trusted site or communicating with a trusted source so that you’ll click a malicious link or provide your login information. Their goal is to get you to enter your username and password, giving them access to your actual account—this is known as account takeover.
Here’s how to spot the signs and keep your business safe.
It’s easy to miss small changes, like an extra dash or missing or rearranged letters. Always check URLs carefully before logging in.
Even a tiny change in a website address can mean it’s a scam.
Another scheme uses similar-looking characters to fool you—for example, lowercase “L” and capital “i” can look identical. Scammers also use letters from other alphabets that closely resemble English characters. Trust your instincts; if something seems off, it probably is.
Scammers also use email spoofing, a technique where they send emails that look like they’re from a trusted source, like J.P. Morgan or someone you know. These emails often:
Clicking a link in a spoofed email can lead you to a fake login page that closely mimics the real one, tricking you into entering your credentials. Once scammers have your login information—whether through a fake website or tricky email, or by pretending to be someone you trust—they can access your account, steal funds and damage your business.
With search poisoning, fraudsters manipulate search engines to push their fake or phishing websites to the top of search results. Often, the URLs associated with these links use look-alike domains—like ipmorganchase.com, which is spelled with an “i" instead of a “j”—to further confuse users.
Clicking on these links can lead to malware infections, stolen login credentials or financial loss. Use bookmarks for frequently visited sites instead of searching for them each time.
Always validate payment instructions or changes by calling the requester at a known phone number (not the one listed in an email). Never trust email alone for authorizing payments or account changes.
When a J.P. Morgan employee contacts you, they will never ask for:
If you’re ever unsure, contact your service representative using a valid phone number or email. Contact information can be found in your banking platform.
We offer tools and resources to help protect your business from fraud.
If you believe you’ve become a victim of fraud, contact your service representative and request to be put in contact with the “GB Fraud Recovery Team.”
If you suspect your account or systems have been compromised, contact your service representative immediately.
For more tips, check out our guide to business email compromise to learn more about payments fraud prevention.
JPMorgan Chase Bank, N.A. Member FDIC. Visit jpmorgan.com/commercial-banking/legal-disclaimer for disclosures and disclaimers related to this content.