Published: March 2026  |  Source: The Straits Times / Singapore Police Force

1. Executive Summary

Singapore faces a systemic and worsening financial crime challenge rooted in digital fraud. Since 2019, scams have collectively extracted over SGD 4 billion from the population, reflecting a structural vulnerability in how citizens engage with digital platforms, online commerce, and telecommunications. While 2025 marked the first year-on-year decline in case volume in eight years — with 37,308 cases and SGD 913.1 million lost — the financial toll remains historically elevated. Early 2026 data reinforces that scammers are actively adapting, with phishing campaigns on peer-to-peer marketplaces emerging as a dominant vector.

This report synthesises the available evidence into a structured case study, examines sectoral impacts on Singapore’s economy and society, and proposes a multi-layered policy and technological response framework.

2. Statistical Overview

2.1 Cumulative Losses (2019–2026)

MetricValue
Total losses since 2019SGD 4 billion+
2025 total cases37,308
2025 total lossesSGD 913.1 million
2025 recovered by policeSGD 140.5 million
Recovery rate (2025)~15.4%
Jan 2026 cases reported>2,800
Jan 2026 losses>SGD 47.4 million

2.2 Trend Interpretation

The modest decline in case volume during 2025 should not be interpreted as resolution. The per-case financial impact remains high, and the January 2026 figures — SGD 47.4 million in a single month — project an annualised loss trajectory potentially comparable to 2025 if trends persist. The low recovery rate (~15%) underscores the near-irreversibility of losses once funds leave the domestic banking ecosystem.

3. Case Study: Phishing Scams on Peer-to-Peer Platforms

3.1 Context and Emergence

The most prominent scam typology emerging in early 2026 targets users of peer-to-peer resale platforms, specifically Carousell and Facebook Marketplace. These platforms aggregate millions of transactions monthly and serve as primary venues for second-hand commerce in Singapore. Their popularity and the implicit trust embedded in peer transactions make them highly exploitable attack surfaces.

3.2 Modus Operandi

The attack chain in these phishing scams follows a structured sequence:

  • Scammers identify active sellers on platforms such as Carousell or Facebook Marketplace and initiate contact expressing genuine buying interest.
  • After establishing initial rapport, the perpetrator pivots to impersonating either the platform itself or a logistics intermediary (e.g., Lalamove), citing a need to confirm the transaction or arrange delivery.
  • A phishing link is transmitted via in-platform messaging or external channels (WhatsApp, email), directing the victim to a fraudulent website mimicking legitimate interfaces.
  • The victim enters banking credentials or card details under the false assumption that the information is required to receive payment for the item sold.
  • Unauthorised debits are executed against the victim’s accounts. Discovery typically occurs only after the victim notices suspicious transactions.
Key ObservationOver 185 phishing cases of this type were reported in January 2026 alone, with losses exceeding SGD 825,000 in a single month. The average loss per case in this category approximates SGD 4,459 — disproportionately affecting middle-income sellers transacting in everyday consumer goods.

3.3 Victim Profile

Victims tend to be digitally literate but not security-aware, an increasingly common vulnerability class. The trust embedded in familiar platforms reduces vigilance; sellers are cognitively primed to expect payment confirmation messages, making them particularly susceptible to urgency-framed phishing prompts.

3.4 Structural Enablers

  • Inadequate sender verification on third-party messaging channels used to transmit phishing links.
  • Visual mimicry of legitimate platform interfaces, including spoofed logos, colour schemes, and transactional language.
  • Absence of mandatory two-step verification for payment credential submission on third-party landing pages.
  • Insufficient real-time detection and blocking of malicious domains associated with ongoing campaigns.

4. Singapore-Specific Impact Assessment

4.1 Economic Impact

The SGD 913.1 million lost in 2025 represents approximately 0.15% of Singapore’s GDP for that year — a non-trivial drag, particularly when compounded annually. The indirect economic costs — including law enforcement resources, judicial processing, banking fraud remediation, and reduced consumer confidence in digital commerce — multiply this figure substantially.

Impact CategoryAssessment
Direct financial loss (2025)SGD 913.1 million
Estimated indirect costs (multiplier ~2x)SGD 1.5–2.0 billion
% of GDP (direct losses)~0.15%
E-commerce trust erosionHigh (ongoing)
Law enforcement burdenSignificant and rising

4.2 Social and Psychological Impact

Beyond financial loss, scam victimisation inflicts lasting psychological harm. Research in criminology identifies scam victims as experiencing elevated rates of depression, anxiety, and diminished social trust. In Singapore’s high-trust societal context — where institutional trust is a key social compact — erosion of trust in digital systems carries outsized implications for social cohesion.

Elderly and lower-income victims are disproportionately represented in high-loss cases, deepening inequality and financial precarity. Social stigma around victimisation further suppresses reporting rates, meaning official statistics likely understate the true incidence.

4.3 Reputational and Regulatory Dimensions

Singapore’s status as a global financial hub amplifies reputational stakes. The trajectory of scam losses risks undermining investor and consumer confidence in the integrity of Singapore’s digital financial infrastructure. Regulatory bodies, including the Monetary Authority of Singapore (MAS), face increasing pressure to enforce accountability not just on victims but on financial intermediaries.

5. Outlook: 2026 and Beyond

5.1 Short-Term Projections (2026)

Extrapolating from January 2026 data, the annualised loss trajectory for 2026 is estimated at SGD 500–600 million, assuming some reduction from intensified enforcement and public awareness. However, this remains highly sensitive to the proliferation of AI-assisted scam tooling and the rate at which perpetrators adapt to countermeasures.

Projection CaveatThese projections assume continuation of current enforcement intensity. A significant AI-enabled escalation in scam sophistication — particularly through deepfake impersonation and LLM-generated phishing content — could materially worsen outcomes.

5.2 Emerging Threat Vectors

  • AI-generated voice and video deepfakes enabling more convincing impersonation of authority figures, family members, or financial institutions.
  • Cross-border syndicate operations leveraging cryptocurrency layering to launder proceeds beyond the reach of domestic asset recovery frameworks.
  • Exploitation of social commerce features (live selling, group buys) as new attack surfaces within evolving platform architectures.
  • SIM-swapping and eSIM exploitation to bypass SMS-based two-factor authentication, which remains the predominant verification mechanism for Singapore’s banking sector.
  • Targeted spear-phishing against high-net-worth individuals and SME owners, with AI-personalised content derived from public social media footprints.

5.3 Medium-Term Structural Risks

Without structural reform in three domains — telecommunications security, platform accountability, and financial system safeguards — Singapore risks a return to record loss figures by 2027–2028. The first-in-eight-years decline seen in 2025 may prove temporary if attributed primarily to cyclical enforcement efforts rather than durable structural change.

6. Recommended Solutions Framework

6.1 Regulatory and Legislative Reforms

6.1.1 Platform Liability Standards

Singapore should establish a statutory framework imposing joint liability on platforms hosting peer-to-peer transactions for losses arising from scams facilitated through inadequate security controls. This would incentivise platforms to invest in sender verification, malicious link detection, and anomaly-based fraud flagging.

6.1.2 Financial Institution Accountability

Building on the MAS’s Shared Responsibility Framework (SRF) introduced in 2024, regulators should extend accountability provisions to require mandatory loss reimbursement for victims where institutions failed to deploy available fraud detection tools. This shifts the burden of risk more equitably toward institutions with superior information and technical capacity.

6.1.3 Telecommunications Security Mandates

Mandate SMS sender ID registration across all telcos and prohibit alphanumeric sender IDs not registered with the Singapore SMS Sender ID Registry (SSIR). Extend this to enforce blocking of calls from unregistered international numbers spoofing local prefixes.

6.2 Technological Countermeasures

6.2.1 AI-Powered Real-Time Detection

Deploy federated machine learning models across financial institutions to identify scam transaction patterns in real time without sharing customer data between institutions. The model architecture should be governed by MAS with mandatory participation from all licensed banks.

6.2.2 ScamShield Enhancement

Upgrade the ScamShield Suite to incorporate proactive domain-blocking capabilities integrated directly into mobile network operator traffic routing. This would prevent phishing links from loading at the network level, before device-level intervention. Additionally, integrate AI-assisted call pattern analysis to flag likely scam calls before answer.

6.2.3 Behavioural Friction in High-Risk Transactions

Introduce mandatory cooling-off periods (minimum 12–24 hours) for first-time transfers to new payees above SGD 5,000. Implement step-up authentication for transactions initiated via mobile platforms when anomalous device or location signals are detected.

6.3 Public Education and Social Architecture

6.3.1 Mandatory Digital Literacy Curricula

Embed scam awareness and digital hygiene into national education frameworks from secondary school through to polytechnic and ITE programmes. Curricula should be revised annually to reflect the current threat landscape, with particular attention to social engineering tactics.

6.3.2 Community-Based Intervention Networks

Establish neighbourhood-level ‘digital safety wardens’ trained by the National Crime Prevention Council, tasked with peer-to-peer education within HDB communities and senior citizen centres. This leverages Singapore’s existing community infrastructure and trusted social networks to reach at-risk populations.

6.3.3 Destigmatisation of Victimhood

Launch a sustained public communications campaign to destigmatise scam victimisation and encourage prompt reporting. Higher reporting rates improve law enforcement intelligence, accelerate blacklist updates, and may improve asset recovery rates.

6.4 International Cooperation

The majority of scam syndicates operating against Singaporean victims are based in Southeast Asia, particularly in Myanmar, Cambodia, and the Philippines. Singapore should intensify bilateral law enforcement cooperation under the ASEAN framework, including joint financial intelligence units and extradition pathway clarification for cybercrime perpetrators.

7. Conclusion

Singapore’s scam epidemic is not a temporary anomaly but a structural challenge shaped by the intersection of high digital adoption, dense financial infrastructure, sophisticated transnational criminal networks, and an evolving technological frontier. The marginal 2025 improvement in case volume — while encouraging — does not constitute structural resolution.

Durable progress requires a coordinated national strategy that integrates regulatory accountability, technological innovation, public education, and international law enforcement cooperation. The SGD 4 billion lost since 2019 is not merely a financial statistic; it represents the cumulative erosion of individual security, societal trust, and national resilience.

The 2026 period presents a critical policy window. The institutions, tools, and public awareness infrastructure are largely in place. What remains is the political will to consolidate them into a coherent, mandatory, and continuously adaptive national anti-scam architecture.

Key Sources & References

  • The Straits Times — Scam Tracker: Singapore Trends and Losses 2026 (Published 11 March 2026)
  • Singapore Police Force — Annual Scams and Cybercrime Brief 2025
  • Monetary Authority of Singapore — Shared Responsibility Framework for Phishing Scams (2024)
  • National Crime Prevention Council — ScamShield Suite Documentation (2024)
  • Open Government Products / GovTech Singapore — ScamShield Technical Architecture