Skip to main content

How risk intelligence dismantled a criminal network

We uncovered a complex cryptocurrency fraud against our client and acted swiftly, collaborating to dismantle the criminal network and safeguard their business.

3 min read

We discovered that our client had become the target of a sophisticated cryptocurrency scam. Fraudsters were impersonating their brand through fake websites, altered email addresses, and social media platforms, all designed to trick people into believing they were interacting with a legitimate financial services provider. Victims were tricked into sharing sensitive personal and financial information, which the criminals used for identity theft and unauthorized access to accounts.

The consequences of this scheme went far beyond the immediate harm to the victims. The fraudsters’ use of the client’s brand put the company at risk of reputational damage, potential lawsuits, and financial losses. If victims fell for the scam, the negative publicity could also undermine future customer trust and deter people from using their services. It was a multifaceted threat requiring swift and coordinated action to prevent further harm.

What made the situation especially challenging was the complexity of the operation. The criminals used advanced tactics, including fake contact information and billing details, shell companies, and email addresses altered with Cyrillic characters to mimic the client’s brand, to obscure their activities and evade detection. The operation was highly organized and widespread, allowing the network to continue its activities and heightening the urgency for an effective response.

Responding to the threat

Upon identifying the threat, Securitas initiated a detailed investigation to uncover the full scope of the fraudulent operation. Early in the process, we discovered a fake cryptocurrency page on Telegram falsely associated with the client’s brand. This led us to additional fraudulent websites, including one claiming to represent the client’s business using falsified corporate information.

We traced the fraudulent website at the center of the scam, which falsely claimed to be linked to the client’s address. By cross-referencing public databases, we uncovered several shell companies registered at the same location and connected them to a network of individuals behind the operation.

A collaborative approach

Throughout the investigation, we worked closely with the client’s cybersecurity, fraud, and legal teams, sharing findings, and supporting their efforts to protect the business. We pulled together our findings into a detailed intelligence report, mapping out the links between the telegram channel, the fraudulent website, the shell companies, and the key individuals behind the scam.

Our collaborative approach helped the client shut down fraudulent websites, block suspicious channels, and strengthen their defenses to protect their customers. The legal team coordinated with law enforcement, contributing to the disruption of the criminal network’s activities.

Protecting the future

Throughout the process, we remained fully involved, providing ongoing support and expertise at every step. Our efforts not only addressed the immediate threat but also helped the client strengthen their security measures, significantly reducing the chances of similar incidents in the future.

While the immediate threat was addressed, the experience underscored the importance of robust security measures in today’s digital landscape. By responding quickly and strategically, the client maintained customer trust, protected their reputation, and avoided potentially expensive legal and financial consequences.

The case highlighted the value of a coordinated approach in managing complex risks. By working together, we were able to respond quickly and decisively, safeguarding the client’s business and its customers from further harm. This story serves as a reminder of the challenges businesses face in an evolving threat landscape and the importance of vigilance and preparedness in protecting critical assets.

Stay ahead with intelligence insights

Stay informed with the latest trends and analysis, and gain a competitive edge with our expert intelligence insights.

Sorry, www.securitas.com does not support Internet Explorer. To enjoy our website, try using a newer browser like Chrome, Safari, Firefox, or Edge.