Is there a Regions Bank scam going on?
The Regions Bank text going around is telling people via text that their accounts are being deactivated. This is a scam. If you call the number provided, it will request your personal information. Do not provide that information.
Why does Regions keep calling?
Remember, Regions will not initiate a call asking you to provide your full account number, online/mobile banking passwords, PINs or complete Social Security number over the phone, except limited instances when we are returning a call at your request.
What number does Regions text from?
Send an approved command to the Regions short code REGBNK (734265) to request the information you need. For example, text BAL to get balances for all of the accounts you’ve set up in text banking. Receive a text message reply right away….Text Banking.
INFO | Receive a list of all available commands |
---|---|
STOP | Stop receiving messages |
How do you know if someone else is using your phone number?
The surest sign that someone is using your number to make spoofed calls is if you start getting multiple calls or SMS responding to communication you never initiated. You might get texts asking who you are, or get calls from people demanding that you stop bothering them.
How do I report spam to Regions?
Email Fraud, Phishing or Spoofs If you believe that you have received or replied to a suspicious email and provided private information about your Regions account, please contact us immediately at 1-800-REGIONS (1-800-734-4667) or via email at [email protected].
Why is my Regions account locked?
Regions Help & Support When you are unable to answer a security question correctly, access to your accounts may be locked. If you know your Online ID and password, you can enter additional information to unlock your security questions.
What can a hacker do with your phone number?
How hackers can use your number to get access to your personal information
- ‘Phishing’ for personal data. It’s common for hackers to send fake text messages to their targets in order to gain username and password information (this is known as phishing).
- Sending links to malicious apps.
- Two-factor authentication.