
If you get a verification code you did not request, assume someone is trying to sign in. Do not share the code. Change the password on the real site and enable two-step verification.
{{component-cta-custom}}
A one-time code is often the last step needed to sign in. If you did not request it, it usually means someone is already trying your username and password somewhere.
Scammers also use codes socially: they will call or text and ask you to read the code back. They are not hacking the code, they are recruiting you to hand it over.
A one-time code is a password for a few minutes. If you did not request it, treat it as a sign-in attempt, not a message to respond to.
In 2026, many account takeovers are “human-assisted.” The attacker triggers the code, then socially engineers you into handing it over. Tools help, but the rule stays simple: codes are passwords, and no legitimate support needs yours.
Do not share the code: it is the last step needed to sign in.
Change the password on the real site: assume your password is already being tried.
Review sessions: sign out unknown devices and remove unknown connected apps.
Lock down your email: email is the reset key for most accounts.
Turn on two-step verification: it reduces damage even if a password leaks again.
You use the service: secure it now (password, sessions, two-step verification).
You do not use the service: ignore the code but watch for follow-up phishing.
You are getting many codes: assume repeated attempts and strengthen security quickly.
Someone calls asking for the code: hang up. That is a common trick.
That can happen after a phishing attempt that collected your login.
Instead, change the password immediately and review sessions from the official app.
Sometimes it is a typo. Sometimes it is a broad attempt to find active accounts.
Instead, ignore the code, but be alert for follow-up messages that include links.
Support impersonation is common because it sounds official.
Instead, do not share it. Hang up and contact the company through official support channels.
Do not share the code. Treat it like a password.
Change your password on the real site and enable two-step verification.
Review sessions: sign out unknown devices and remove unknown connected apps.
Secure your email: email is the reset key for most accounts.
Report phishing:ReportFraud.ftc.gov
Report messages: use your messaging app report features to reduce future delivery.
How to Spot a Fake Text Message
Unknown Number Link? How to Verify Without Clicking
NIST: SP 800-63B-4 Authentication and Authenticator Management
The code is usually a sign-in step. If you share it, it can help someone sign in as you. Do not share it.
Someone may be trying to sign in using your phone number or email. Secure the account through the official app or site.
No. Do not engage. Go to the service directly and secure the account.
Change the password and enable two-step verification on the affected service, then review active sessions.
Ignore it, but stay alert for follow-up messages that try to get you to click or call.
Guardio can help warn you about suspicious links and lookalike sign-in pages before you enter credentials.
Phishing Scams
Phishing Scams