Sunday, October 5, 2025
Cyber Safety Canada | Scam Shield Digest
  • Login
  • Register
  • Home
  • Latest Scam Alerts
  • Fraud Prevention News
    lock and key as symbol for Privacy and General Data Protection Regulation on a notebook computer

    Passkeys Are Phishing-Resistant—But Not Magic: Where They Break in the Real World

    Portrait of young bearded computer programmer looking at camera near the computer monitor with software in dark office

    How Attackers Use Code Signing and Social Proof to Trick You — Why a Certificate Isn’t Enough

    Six young adult friends using smartphones and digital tablets in park

    What to Do If Apple Says You’ve Been Targeted by Spyware

    Male web designer working late at night

    3 Things You’ll Need Most If a Cyberattack Hits You

    What to Do if a DDoS Attack Disrupts Your Online Service

    What to Do if a DDoS Attack Disrupts Your Online Service

    Above view of young social media marketers sitting on floor and using computers while analyzing marketing tools

    How to Review and Revoke Connected Apps in 2025: Complete Security Guide

    Trending Tags

    • romance investment fraud Canada
    • crypto romance scam
    • Chinese State-Sponsored Hacking
  • Cybersecurity Trends
    lock and key as symbol for Privacy and General Data Protection Regulation on a notebook computer

    Passkeys Are Phishing-Resistant—But Not Magic: Where They Break in the Real World

    Portrait of young bearded computer programmer looking at camera near the computer monitor with software in dark office

    How Attackers Use Code Signing and Social Proof to Trick You — Why a Certificate Isn’t Enough

    Six young adult friends using smartphones and digital tablets in park

    What to Do If Apple Says You’ve Been Targeted by Spyware

    Male web designer working late at night

    3 Things You’ll Need Most If a Cyberattack Hits You

    What to Do if a DDoS Attack Disrupts Your Online Service

    What to Do if a DDoS Attack Disrupts Your Online Service

    Above view of young social media marketers sitting on floor and using computers while analyzing marketing tools

    How to Review and Revoke Connected Apps in 2025: Complete Security Guide

    How the “Pig-Butchering” Crypto Romance Scam Works—And How to Protect Yourself

    senior women hand using smart phone close up

    Text Phishing Scam Costs Long Island Senior $15,000 — How Not to be a Victim

    grandmother on her computer at home

    The 2025 Cyber Safety Checklist for Seniors

    Trending Tags

    • Nation-State Cyber Threats
    • China Telecom Hack
    • Chinese State-Sponsored Hacking
    • Salt Typhoon China Hack
  • Investment & Retirement Scams
    senior women hand using smart phone close up

    Text Phishing Scam Costs Long Island Senior $15,000 — How Not to be a Victim

    hacker in the shadows on their laptop that has a figure of a closed lock glowing on it. The background is a dark city scape that is raining with orange digital letters and numbers

    🚨 Orange Belgium Hack 2025: 850,000 Customers Impacted in SIM Data Breach – Protect Yourself

    African american photo designer retouching images next to green screen on dual screens in a tech driven environment, representing modern digital media. Male graphic artist uses software tools.

    Beware the Deepfake Investment Scam Surge: What Kiwis Must Know

    Cheerful senior couple enjoying a Ferris wheel by the Santa Monica pier

    🛑 How Scammers Target Your Retirement: Inside Pre-Approved Scams & New Tactics

    Trending Tags

    • protect retirement savings online
    • investment scam prevention
    • Nation-State Cyber Threats
    • romance investment fraud Canada
  • Protection Guides
No Result
View All Result
  • Home
  • Latest Scam Alerts
  • Fraud Prevention News
    lock and key as symbol for Privacy and General Data Protection Regulation on a notebook computer

    Passkeys Are Phishing-Resistant—But Not Magic: Where They Break in the Real World

    Portrait of young bearded computer programmer looking at camera near the computer monitor with software in dark office

    How Attackers Use Code Signing and Social Proof to Trick You — Why a Certificate Isn’t Enough

    Six young adult friends using smartphones and digital tablets in park

    What to Do If Apple Says You’ve Been Targeted by Spyware

    Male web designer working late at night

    3 Things You’ll Need Most If a Cyberattack Hits You

    What to Do if a DDoS Attack Disrupts Your Online Service

    What to Do if a DDoS Attack Disrupts Your Online Service

    Above view of young social media marketers sitting on floor and using computers while analyzing marketing tools

    How to Review and Revoke Connected Apps in 2025: Complete Security Guide

    Trending Tags

    • romance investment fraud Canada
    • crypto romance scam
    • Chinese State-Sponsored Hacking
  • Cybersecurity Trends
    lock and key as symbol for Privacy and General Data Protection Regulation on a notebook computer

    Passkeys Are Phishing-Resistant—But Not Magic: Where They Break in the Real World

    Portrait of young bearded computer programmer looking at camera near the computer monitor with software in dark office

    How Attackers Use Code Signing and Social Proof to Trick You — Why a Certificate Isn’t Enough

    Six young adult friends using smartphones and digital tablets in park

    What to Do If Apple Says You’ve Been Targeted by Spyware

    Male web designer working late at night

    3 Things You’ll Need Most If a Cyberattack Hits You

    What to Do if a DDoS Attack Disrupts Your Online Service

    What to Do if a DDoS Attack Disrupts Your Online Service

    Above view of young social media marketers sitting on floor and using computers while analyzing marketing tools

    How to Review and Revoke Connected Apps in 2025: Complete Security Guide

    How the “Pig-Butchering” Crypto Romance Scam Works—And How to Protect Yourself

    senior women hand using smart phone close up

    Text Phishing Scam Costs Long Island Senior $15,000 — How Not to be a Victim

    grandmother on her computer at home

    The 2025 Cyber Safety Checklist for Seniors

    Trending Tags

    • Nation-State Cyber Threats
    • China Telecom Hack
    • Chinese State-Sponsored Hacking
    • Salt Typhoon China Hack
  • Investment & Retirement Scams
    senior women hand using smart phone close up

    Text Phishing Scam Costs Long Island Senior $15,000 — How Not to be a Victim

    hacker in the shadows on their laptop that has a figure of a closed lock glowing on it. The background is a dark city scape that is raining with orange digital letters and numbers

    🚨 Orange Belgium Hack 2025: 850,000 Customers Impacted in SIM Data Breach – Protect Yourself

    African american photo designer retouching images next to green screen on dual screens in a tech driven environment, representing modern digital media. Male graphic artist uses software tools.

    Beware the Deepfake Investment Scam Surge: What Kiwis Must Know

    Cheerful senior couple enjoying a Ferris wheel by the Santa Monica pier

    🛑 How Scammers Target Your Retirement: Inside Pre-Approved Scams & New Tactics

    Trending Tags

    • protect retirement savings online
    • investment scam prevention
    • Nation-State Cyber Threats
    • romance investment fraud Canada
  • Protection Guides
No Result
View All Result
Cyber Safety Canada | Scam Shield Digest
No Result
View All Result
Home Fraud Prevention News

Grandparent Phone Scam: How to Spot and Stop It in Canada

by Stacey
September 9, 2025
in Fraud Prevention News, Latest Scam Alerts, Protection Guides
Reading Time: 5 mins read
0 0
A A
1
Grandparent Phone Scam: How to Spot and Stop It in Canada
0
SHARES
59
VIEWS
Share on FacebookShare on LinkedInShare on XShare on PinterestShare Via Email

The Grandparent Phone Scam is one of the most emotionally manipulative frauds currently in Canada. Criminals call seniors pretending to be a grandchild in trouble—often claiming they need bail money, medical help, or emergency travel funds. This scam can evade normal caution due to its emotional appeal. This guide shows you how to spot it, stop it, and report it so you and your loved ones stay safe.

Table of Contents

What is the Grandparent Phone Scam?

This scam involves a caller pretending to be a relative—usually a grandchild—in urgent trouble. The fraudster claims they need money immediately and instructs the senior to keep the situation secret. These calls typically occur late at night or early in the morning to surprise the target.

Grandparent Scam on the Rise in Canada

Who is Being Targeted

  • Seniors with grandchildren or younger relatives

  • People who may be hard of hearing or easily confused by emotional distress

  • Families with public social media profiles that mention names and family details (information scammers can exploit)

How the Scam Works

  1. The scammer calls and says “Grandma? It’s me.”

  2. They wait for you to guess a name, then pretend to be that person.

  3. They claim they are in urgent trouble — legal, medical, or travel-related.

  4. They demand money via wire transfer, courier, or gift cards.

  5. They stress secrecy: “Don’t tell mom or dad.”

How to Spot It—Red Flags to Watch For

  • The scammer caller uses vague phrases like “It’s me” instead of a name.

  • Time-sensitive request for money that must be sent immediately.

  • The scammer caller begs you to keep the matter secret.

  • The caller requests payment to be made using gift cards, cryptocurrency, or wire transfers.

  • The caller’s voice is disguised by a poor phone connection or background noise.

What to Do if You Encounter It

  1. Pause. Don’t respond emotionally — hang up if necessary.

  2. Verify. Call the grandchild or their parents using a known phone number.

  3. Refuse unusual payment methods. No legitimate emergency requires payment via gift cards.

  4. Report the incident immediately.

Reporting the Scam in Canada

  • Canadian Anti-Fraud Centre: 1-888-495-8501 or Report Online

  • RCMP: Contact your local detachment.

  • Police Non-Emergency Line: In your municipality.

  • Better Business Bureau Scam Tracker:

Prevention Tips to Protect Yourself

  • Create a family password to confirm identity during emergencies.

  • Keep social media profiles private to limit information scammers can use.

  • Remind family members never to request money over the phone without in-person or verified confirmation.

  • Share this scam warning with friends, neighbours, and community groups.

Young boy and his grandfather smile as they high five each other

Good News Corner – Scam Avoidance Story

Mr. Thompson, a senior in Ontario, got a late-night call from someone claiming to be his grandson needing bail money. Suspicious, he asked the caller for the family password — they hung up immediately. His quick thinking prevented a $5,000 loss.

Trusted Resources & Links

  • Canadian Anti-Fraud Centre: antifraudcentre-centreantifraude.ca

  • RCMP Fraud Prevention: rcmp-grc.gc.ca

  • Better Business Bureau Scam Tracker: bbb.org/scamtracker

  • ScamShield Digest – Phone Scam Prevention Guide (Internal Link)

Get ScamShield Alerts

Share this post with your family and friends, especially seniors. Sign up for the free ScamShield Digest newsletter to get weekly scam alerts, prevention tips, and real-life success stories that keep you safe.
Get ScamShield Alerts
Online Safety

Related Posts

  • Cyber Safety Checklist
Stacey

Stacey

Please login to join discussion

Recommended

Chinese anonymous criminal recording himself asking for ransom, hacking intelligence systems and spreading false information, misleading. Autocracy communism doctrine in hybrid war.

⚠️ Top 5 Cyber Hacks of 2025 (So Far) — What You Need to Know to Stay Safe

3 months ago
What to Do if a DDoS Attack Disrupts Your Online Service

What to Do if a DDoS Attack Disrupts Your Online Service

3 weeks ago
Male web designer working late at night

3 Things You’ll Need Most If a Cyberattack Hits You

3 weeks ago
The businesswoman standing near the blue monitor

Signs You Might Be a Hidden Victim of Brickstorm: Red Flags & What to Do If You Suspect It

6 days ago

Ransomware Isn’t Dead — It’s Just Changing Shape

2 months ago
lock and key as symbol for Privacy and General Data Protection Regulation on a notebook computer

Passkeys Are Phishing-Resistant—But Not Magic: Where They Break in the Real World

6 days ago

Popular News

  • lock and key as symbol for Privacy and General Data Protection Regulation on a notebook computer

    Passkeys Are Phishing-Resistant—But Not Magic: Where They Break in the Real World

    0 shares
    Share 0 Tweet 0
  • Signs You Might Be a Hidden Victim of Brickstorm: Red Flags & What to Do If You Suspect It

    0 shares
    Share 0 Tweet 0
  • How Attackers Use Code Signing and Social Proof to Trick You — Why a Certificate Isn’t Enough

    0 shares
    Share 0 Tweet 0
  • What to Do if a DDoS Attack Disrupts Your Online Service

    0 shares
    Share 0 Tweet 0
  • What to Do If Apple Says You’ve Been Targeted by Spyware

    0 shares
    Share 0 Tweet 0

Connect with us

Newsletter

Stay one step ahead of scammers. Get our free weekly ScamShield Digest with the latest alerts and simple safety tips for seniors and families.

Category

  • Critical Infrastructure Security
  • Cybersecurity Trends
  • Fraud Prevention News
  • Investment & Retirement Scams
  • Latest Scam Alerts
  • Nation State Cyber Threats
  • Protection Guides
  • Ransomware & Extortion
  • Romance & Dating Scams
  • Tech Support Scams
  • Telecommunications Security

About Us

ScamShield Digest is part of the Shield IT Training Foundation. We believe online safety is for everyone — especially seniors and families. Our blog, guides, and newsletter are here to inform, protect, and empower.

  • About
  • Advertise
  • Careers
  • Contact

© 2025 ScamShield Digest

Welcome Back!

OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

OR

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Home
  • Cybersecurity Trends
  • Latest Scam Alerts
  • Tech Support Scams
  • Romance & Dating Scams
  • Investment & Retirement Scams

© 2025 ScamShield Digest