The term internet fraud describes fraud offences in the context of cybercrime. Colloquially, this term is also used to describe situations that do not meet the legal definition of fraud. While some forms of Internet fraud occur exclusively on the Internet, other variants represent off-network behavior.
Internet fraud thrives, among other things, on the massive information gap between victim and perpetrator. Since many mechanisms appear safe on the internet but are not, victims feel unjustly safe.
Fraud Methods
Phishing
---
A well-known type of internet fraud is phishing. In this fraud method, a fake e-mail is sent to the potential fraud victims with the content that this person’s house bank has a computer problem, combined with the request to transmit the confidential data (PIN, TAN, etc.) to the bank. The bank’s e-mail and website are reproduced in a completely authentic way. If the data is transferred to the fake website, the fraudsters now have the opportunity to misuse the victim’s data.
Scam
An Internet fraud scam is typically a phone call from a “scammer” aimed at gaining access to the victim’s PC.
Identity Theft
Identity theft is the misuse of personal data (identity) of a natural person by third parties.
The aim of identity theft is usually to obtain a fraudulent financial advantage, to sell data of the data subject to interested parties (illegal credit agencies) or to discredit the rightful owner of the identity data (reputational damage).

Entry Fraud
Entry fraud is a particular manifestation of fraud. In this case, the fraudster deceives about his intention to actually fulfill the obligations arising from a contract at the time of maturity. In terms of the Internet, this means above all offering goods that you don’t even have in online shops or at online auctions.
Entry fraud on the Internet requires payment in advance (e.g. by credit card). A variant occurs with orders from non-EU countries. You will be asked to transfer the amount by direct transfer, for example via Western Union. From the buyer’s point of view, this payment method is as insecure as a cash payment in advance.
Information Theft
Furthermore, there is the theft of information from web-based online consultations and contact portals (e.g. health data, problems, lifestyle habits, sexual preferences). Information theft often goes unnoticed by the person concerned, as there are no traces at first (in contrast to online banking, where the fraud becomes visible at the latest when money is debited). The information obtained through the fraud is marketed, among other things, by illegally operating credit agencies.
Subscription Trap
The trader offers the consumer the opportunity to purchase a service after a one-time registration. Some time later (usually after two weeks), the service provider claims that a continuing obligation with a contract term of at least two years has been concluded and that the statutory withdrawal period has expired. The service provider demands payments – often through well-known lawyers or debt collection agencies – for the opportunity to receive the service for two years.
There are numerous other ways of fraud, which are primarily based on good faith. One problem with internet fraud is the difficulty of proving it (if it is noticed at all).