Fraudsters will try anything to gain access to your information. For example, they might attempt to log in to an online account (such as a T‑Mobile account, bank account, or email account) using passwords they obtained from another source (like a breach of some other online account). Similarly, they might try to obtain the password directly from the potential victim or the account provider through various techniques, such as: