{"id":23625,"date":"2024-01-13T12:24:45","date_gmt":"2024-01-13T20:24:45","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2024\/01\/13\/news-17355\/"},"modified":"2024-01-13T12:24:45","modified_gmt":"2024-01-13T20:24:45","slug":"news-17355","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2024\/01\/13\/news-17355\/","title":{"rendered":"Investment fraud a serious money maker for criminals"},"content":{"rendered":"\n<p>Europols\u2019s spotlight report \u2018<a href=\"https:\/\/www.europol.europa.eu\/cms\/sites\/default\/files\/documents\/Spotlight-Report_Online-fraud-schemes.pdf\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Online fraud schemes: a web of deceit\u2019<\/a>, looks into online fraud schemes\u2014a major crime threat in the EU and beyond\u2014and one of the report&#8217;s primary themes is investment fraud.<\/p>\n<p>But first I want to share some more remarkable conclusions from the report:<\/p>\n<ul>\n<li>Charity scams that prey on concern about international conflicts and natural disasters are becoming more prevalent.<\/li>\n<li>Fraudsters are evolving their techniques and increasingly re-target fraud victims.<\/li>\n<li>The social engineering techniques used by fraudsters are growing in complexity.<\/li>\n<li><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2019\/08\/atm-attacks-and-fraud-part-2\">Logical attacks on ATMs<\/a> still occur in the EU, with criminal networks testing ways to exploit new vulnerabilities.<\/li>\n<li>It also notes the increasing use of &#8220;shimming&#8221; attacks where an attacker intercepts communication between a card and card reader&#8217;s chip interface, and then relays it to another device.<\/li>\n<\/ul>\n<p>Investment fraud and <a href=\"https:\/\/www.malwarebytes.com\/glossary\/business-email-compromise-bec\">business e-mail compromise (BEC)<\/a> fraud remain the most prolific online fraud schemes. Criminal networks involved in these schemes pose a high threat, given their level of organization and resilience. This conclusion matches that of the <a href=\"https:\/\/www.fbi.gov\/contact-us\/field-offices\/springfield\/news\/internet-crime-complaint-center-releases-2022-statistics\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">2022 Internet Crime Report<\/a> produced by the FBI\u2019s Internet Crime Complaint Center (IC3), which attributed almost $84 million dollars to BEC and over $75 million to investment fraud.<\/p>\n<p>Europol found that criminal networks involved on investment fraud show great levels of adaptability by constantly refining and improving their methods and leveraging new investment products that are in high demand.<\/p>\n<p>Preying on one of the most basic human flaws, <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/02\/investment-scams-are-on-the-rise\">investment scams<\/a> and other get-rich-quick schemes are making up an ever larger portion of the online scammers\u2019 cake. And the scammers are very much aware that a large amount of money can be made, and they are more than willing to invest in the tools that make their fraud look more trustworthy.<\/p>\n<p>Investment fraudsters look for victims on social media platforms. But they also use e-mail, advertisements on websites, and instant messaging to trigger a potential victim\u2019s interest. When a victim starts to ask questions, the criminals come up with reasons why funds can\u2019t be withdrawn, such as fees or state taxes. To top things off, they will tell the victim they need more money in order to release their funds.<\/p>\n<p>Criminal networks involved in investment fraud make extensive use of call centers. These call centers operate in different languages and the operators are not necessarily aware of the criminal activities behind the work they do.<\/p>\n<p>One of the preferred tactics of investment fraud is the pyramid scheme, where victims are encouraged to recruit more participants. But another method resembles that of <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2021\/02\/romance-scams-ftc-reveals-304-million-of-heartache\">romance scams<\/a> where the criminal builds a relationship with the victim.<\/p>\n<p>Popular investment opportunities offered by the criminals include stocks, cryptocurrencies, and pension funds. The most reported investment fraud products in the EU are cryptocurrencies. The IC3 report mentions for example:<\/p>\n<blockquote class=\"wp-block-quote\">\n<p>\u201cCryptocurrency support impersonators: Increasingly, crypto owners are falling victim to scammers impersonating support or security from cryptocurrency exchanges. Owners are alerted of an issue with their crypto wallet and are convinced to either give access to their crypto wallet or transfer the contents of their wallet to another wallet to \u201csafeguard\u201d the contents.\u201d<\/p>\n<\/blockquote>\n<p>To re-target victims the criminals pose as lawyers or members of law enforcement claiming they can help victims to get the lost money back.<\/p>\n<h3 class=\"wp-block-heading\" id=\"h-recognizing-investment-scams\">Recognizing investment scams<\/h3>\n<p>We are by no means financial experts, but we have seen too many good people lose money on Ponzi schemes, rug-pulls, and fake Initial Coin Offerings (ICOs), so we feel it is our job to keep you safe, and warn against these types of online investment frauds.<\/p>\n<p>We realize that it is hard to tell investment scams apart from some of the more legitimate offers that are thrown at us in commercials every day. But we do want to hand you a few easy-to-follow rules to keep your money in your own hands:<\/p>\n<ul>\n<li>Treat calls, texts, mails, and other advice out of the blue with extreme caution.<\/li>\n<li>Don&#8217;t judge a book by its cover. Investment scams can often afford to look good.<\/li>\n<li>Make sure to read the fine print. Understand what you are getting into.<\/li>\n<li>If it sounds too good to be true, it usually isn\u2019t true.<\/li>\n<li>Very high returns usually come with extremely high risks. Your money may sometimes even be better off in a casino.<\/li>\n<li>When you are urged to act now, remember that while\u00a0<em>some <\/em>legitimate opportunities want you to hurry, scammers\u00a0<em>always <\/em>want you to hurry.<\/li>\n<li>Don\u2019t get turned into a\u00a0<a href=\"https:\/\/www.malwarebytes.com\/blog\/glossary\/money-mule\/\">money mule<\/a> or money launderer.<\/li>\n<\/ul>\n<p>Still not convinced? I have this piece of land on Venus, that I would be willing to part with for the right price. But you will need to act fast.<\/p>\n<hr class=\"wp-block-separator has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-wide\" \/>\n<p><strong>We don\u2019t just report on threats\u2014we remove them<\/strong><\/p>\n<p>Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/for-home\">downloading Malwarebytes today<\/a>.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/01\/investment-fraud-a-serious-money-maker-for-criminals\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Europols\u2019s spotlight report \u2018Online fraud schemes: a web of deceit\u2019, identifies investment fraud as a major threat. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[13136,14347,30644,13114,19980,28873,24819,32,26699,10574],"class_list":["post-23625","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-atm","tag-bec","tag-criminal-networks","tag-europol","tag-ic3","tag-investment-fraud","tag-investment-scams","tag-news","tag-personal","tag-scams"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23625","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23625"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23625\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23625"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23625"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23625"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}