The more national reporting data that’s collected, the better the chance law enforcement has to catch the criminals and decrease online crime. Reporting a fraudulent incident will also assure that you have accurate documentation in order to aid in your recovery. Please consider reporting your incident to the FBI Internet Crime Complaint Center (IC3).  

Once processed, complaints filed via their website may be referred to federal, state, local, or international law enforcement or regulatory agencies for possible investigation. Any investigation opened on any complaint is initiated at the discretion of the law enforcement and/or regulatory agency receiving the complaint information. Reporting the incident at IC3 will not result in a call back for assistance.

The FAQs about reporting can be found here. Please read the FBI/IC3 privacy policy here.


Business Recovery Solutions

The following resources have been gathered and vetted in order to better serve you. These resources have been chosen to help simplify the process of recovery after a cyber incident has taken place. With these resources you may need to contact organizations outside Fraudsupport.org. Results will vary depending on your circumstances.

What is Ransomware and how do I recover?

Ransomware Guidance from US-CERT

Cybersecurity for Small Business: Ransomware Guide from FTC

See page 16 of this document for recovery checklist

Start on Page 12 of this document for tips on how to respond to a cyber incident


Business Security Solutions

Once the proper organizations have been notified and you are on the road to recovery, it is time to reinforce your cybersecurity. Let’s take action and strengthen your cybersecurity with the following resources and tools.

How to defend against ransomware

Take the FTC Ransomware Quiz to Test Your Knowledge

Is your home or business router secure?

Add Two-Factor Authentication to key accounts and follow other security tips at LockDownYourLogin.org

Run KnowBe4’s Ransomware Simulator “RanSim” for a quick look at the effectiveness of your existing network protection.

Other Resources