Quick tips to identify whether you have received a suspicious email, phone call or text:
- Eloan will never call you. If you received phone call, hang up and report it.
- Eloan will never send you a text message or SMS. If you received one, don’t reply and report it.
- If you receive an email claiming to be from Eloan:
- Make sure the sender’s address has an eloan.com domain. Phishing emails are becoming more sophisticated and difficult to distinguish from legitimate emails.
- Eloan will never send an attachment in an email. Don’t open any attachment and report it.
- Eloan will never send you an email stating that you are pre-approved or pre-qualified for a loan. Delete or report any emails with this copy.
- Eloan will never ask you form of payment or value item in exchange for a loan. For example, you will never be asked to send gift cards, account transfers, payments via Paypal or Venmo.
How do you report phishing activity? Here’s how:
- Contact us directly at firstname.lastname@example.org
- Forward phishing emails to email@example.com. Your report is most effective when you include the full email header, but most email programs hide this information.
- File a report with the Federal Trade Commission at FTC.gov/complaint
- Visit Identitytheft.gov. Victims of phishing could become victims of identity theft; there are steps you can take to minimize your risk.
- Report phishing email to firstname.lastname@example.org. The Anti-Phishing Working Group – which includes ISPs, security vendors, financial institutions and law enforcement agencies – uses these reports to fight phishing.
Articles that Can Help You
Don't Get Hooked: How to Identify and Avoid Phishing Scams
Until recently, it used to be easy for Internet users to avoid phishing scams. Hackers used to send emails…
7 Steps to Take Now If You're a Victim of a Phishing Attack
Phishing is a widespread form of cybercrime that involves a target being contacted via email, phone,…
5 Common Phishing Attacks and How to Protect Against Them
Phishing schemes have become the most common security challenge that both companies and individuals face…