How to Report Phishing in Hong Kong: HKPF, HKCERT, and ADCC

Reporting phishing and scams is not just about recovering your own losses — it helps authorities disrupt fraud operations, protect others, and build the intelligence picture that enables enforcement. Here is exactly who to contact and how.

How to report phishing in Hong Kong guide illustration
1Who to Contact

The Key Reporting Bodies for Phishing and Scams in Hong Kong

The Hong Kong Police Force Cyber Security and Technology Crime Bureau (CSTCB) is the primary law enforcement body for cybercrime in Hong Kong. For non-emergency cyber fraud and phishing reports, call 182 388 or report online through the HKPF's Cyber Crime Reporting Portal. For financial fraud in progress — where money has just been transferred or you believe a transfer can still be intercepted — call 999 or the Anti-Deception Coordination Centre (ADCC) at 18222. The ADCC operates specifically to intercept fraud in progress and has direct relationships with banks enabling faster action than standard police reporting channels.

The Hong Kong Computer Emergency Response Team Coordination Centre (HKCERT) handles phishing website and infrastructure reports. HKCERT works with hosting providers and domain registrars to take down phishing websites, coordinates with international CERT bodies for cross-border phishing infrastructure, and provides public advisories about active phishing campaigns. Report phishing websites, malicious URLs, and suspected malware to HKCERT at hkcert.org/report. HKCERT does not handle financial recovery or criminal investigations — its focus is on technical takedown and public awareness, and it handles both individual and business reports.

The Office of the Privacy Commissioner for Personal Data (PCPD) is the appropriate reporting body when personal data has been disclosed as a result of phishing or a data breach — HKID numbers, addresses, financial data. PCPD can be contacted at [email protected] or 2827 2827. For financial fraud involving bank accounts or payment systems, your bank's own fraud team is a critical first contact — they can freeze accounts and initiate internal investigation processes that the police and HKCERT cannot. The SFC is the reporting body for investment fraud and unlicensed securities activity. Each body handles a specific aspect, and comprehensive reporting often means contacting more than one.

  • HKPF CSTCB: 182 388 — non-emergency cybercrime and phishing reports
  • ADCC: 18222 — fraud in progress, financial interception — call immediately if transfer just occurred
  • HKCERT: hkcert.org/report — phishing website takedown and infrastructure reports
  • PCPD: 2827 2827 — personal data breach and HKID disclosure
  • Your bank: Fraud team via number on card back — essential first contact for any financial fraud
  • SFC: sfc.hk/complaint — investment fraud and unlicensed securities activity
Tools that help detect and report phishing automatically →
Reporting bodies for phishing in Hong Kong HKPF HKCERT ADCC
2What to Report and Preserve

What Information to Gather Before Reporting Phishing

Effective phishing reporting requires preserving evidence before it disappears. Phishing websites are often taken down quickly — either by the attacker to avoid detection or by hosting providers acting on abuse reports — so screenshotting the fraudulent site and noting the full URL is important. For phishing emails, forward the original message including full email headers to HKCERT and to your email provider's abuse address — headers reveal the true sending infrastructure and are critical for technical investigation. Do not just forward the message body; the headers require accessing the "view source" or "show original" option in your email client.

For financial fraud, document all transaction details: the date and time of any transfers, the recipient account number and bank, the amount, the reference used, and any confirmation numbers. If the fraud involved a fraudulent website, preserve the URL and screenshots of any pages where you entered information. If it involved a phone call, note the number displayed (even knowing it may be spoofed), the time of the call, the language used, any case numbers or names mentioned, and the demands made. This documentation serves both the formal police report and any subsequent civil recovery action, and is required for insurance claims under cyber insurance policies.

For SMS phishing (smishing), forward the fraudulent SMS to your mobile carrier's spam reporting service before deleting it — PCCW/HKT, CSL, and SmarTone all provide SMS spam reporting channels. For WhatsApp scams, report the message within the app using the Report function (long-press the message → Report) and also take screenshots before doing so, as reporting may result in the message being removed from your view. For social media scams, use the platform's reporting mechanism for fraudulent accounts or posts in addition to formal reporting to HKPF — platform takedowns are often faster than formal investigation processes.

  • Screenshot phishing sites immediately: Sites are taken down quickly — capture full URL and page content before it disappears
  • Forward with full email headers: "Show original" in Gmail/Outlook — headers reveal true sending infrastructure
  • Transaction documentation: All transfer details including recipient account, amount, date, time, and reference
  • Phone call notes: Displayed number, time, case numbers, demands — even spoofed number has intelligence value
  • SMS forwarding: Forward fraudulent SMS to carrier spam number before deleting
  • Platform reporting: WhatsApp, Facebook, Instagram, LinkedIn — platform takedowns complement formal reporting
How to identify and document phishing evidence →
What to report phishing evidence preservation Hong Kong
3Reporting by Scam Type

Reporting Different Types of Phishing and Scams in Hong Kong

Email phishing should be reported to your email provider's abuse or phishing reporting channel ([email protected] for Microsoft 365/Outlook, [email protected] for iCloud, and the spam/phishing reporting button in Gmail), to HKCERT at hkcert.org/report for website takedown, and to the impersonated organisation's security or fraud team. Banks maintain dedicated phishing reporting addresses — HSBC uses [email protected], and other major HK banks have similar dedicated channels. These reports enable the bank to alert their customers, engage with HKCERT for site takedown, and potentially provide intelligence to HKPF for investigation.

For investment scams and suspected unlicensed investment activity, report to the SFC at sfc.hk/complaint and to the ADCC at 18222 if funds have been transferred. The HKMA maintains a scam alert list of suspicious financial entities and accepts reports of suspicious virtual asset platforms. HKPF should also receive a formal report, particularly for pig butchering and other investment fraud where significant financial losses are involved — the Cyber Security and Technology Crime Bureau handles investment fraud cybercrime alongside its broader cybercrime mandate. Report to the PCPD if personal data was extracted as part of the investment scam.

For phishing that impersonates government departments — IRD, Immigration, ICAC, Labour Department — report to both HKPF and directly to the impersonated department. Most government departments publish dedicated fraud alert channels: the ICAC maintains a corruption reporting hotline at 2526 6366, the IRD provides a dedicated fraud report channel on their website, and the Hong Kong Customs and Excise Department accepts reports of customs impersonation fraud. Reporting to the impersonated government body enables them to publish public warnings that protect other potential victims, and government bodies often move quickly to issue press releases warning the public when an active impersonation campaign is identified.

  • Email phishing: Email provider's phishing button + HKCERT + impersonated organisation's fraud team
  • Bank impersonation: Bank's own phishing reporting address (e.g. [email protected]) + HKPF + HKCERT
  • Investment scams: SFC complaint + ADCC 18222 + HKPF 182 388 + HKMA if virtual asset platform
  • Government impersonation: HKPF + the specific impersonated department's fraud reporting channel
  • WhatsApp scams: In-app report + HKPF + screenshot preservation before reporting
  • Smishing: Carrier spam reporting + HKCERT + HKPF + impersonated organisation
Government impersonation scams and reporting channels →
Reporting phishing by type email SMS investment government Hong Kong
4Why Reporting Matters

Why Reporting Phishing — Even When You Were Not Defrauded — Matters

Many people who successfully identify and avoid a phishing attack do not bother reporting it, reasoning that since they were not harmed, the report adds little value. This reasoning, while understandable, underestimates the collective protective value of phishing reports. Each report of an active phishing website provides HKCERT and their international partners with the information needed to initiate takedown requests to the hosting provider — and faster takedowns directly reduce the number of victims who reach the site before it is removed. A phishing site that receives ten reports and is taken down the same day exposes far fewer victims than one that operates undetected for a week.

Intelligence about phishing campaigns — the organisations being impersonated, the message content, the domains being used — enables HKPF and HKCERT to publish public warnings that pre-empt harm. When a new smishing campaign impersonating HK Post or a specific bank is identified through early reports, a public advisory warning can be issued within hours, reaching millions of potential victims before the campaign fully deploys. This early warning system only functions if people report early — waiting until significant harm has already occurred reduces the intelligence value substantially. Hong Kong has a well-developed public advisory infrastructure that depends on timely public reporting to remain effective.

For victims who experienced financial loss, formal reporting to HKPF is a prerequisite for any subsequent recovery action. Without a police report number, civil recovery proceedings cannot be initiated, cyber insurance claims cannot be processed, and victims cannot access the limited victim support services available. Even in cases where prosecution is unlikely — small-value frauds, overseas perpetrators — the formal report creates a record that contributes to crime statistics, informs policy, and builds the case for enhanced regulatory action. Reporting is also a legal requirement in some professional contexts: financial services firms regulated by the HKMA and SFC have explicit notification obligations when they suffer certain types of cyber fraud.

  • Faster takedowns: More reports = faster takedown action = fewer victims reaching the phishing site
  • Public advisories: HKPF and HKCERT can issue campaign warnings when enough early reports identify a new attack
  • Financial recovery prerequisite: Police report number required for civil action, insurance claims, and victim support
  • Crime statistics value: Aggregate reports inform policy, regulatory action, and resource allocation
  • Regulatory obligation: HKMA and SFC-regulated firms have mandatory notification requirements for cyber fraud
  • Protect others: The person who reports an attack they avoided may prevent the next person from losing money
Anti-phishing tools that automatically report threats →
Why reporting phishing matters community protection Hong Kong

Report Every Phishing Attempt — Even If You Spotted It

Reports from people who avoided phishing attacks are as valuable as reports from victims — they enable faster takedowns and earlier public warnings that protect the whole community.

Related VPN Articles