FBI Seizes $112m From 'CryptoRom' Criminals

The US Department of Justice (DoJ) has seized six crypto currency wallets believed to have been used to launder the proceeds of investment fraud scams of virtual currency worth an estimated $112m (£90m) linked to crypto-currency investment scams.

Scammers have been using accounts to launder funds acquired via crypto-currency confidence scams, called “CryptoRom”.

The schemes involve fraudsters cultivating long-term relationships with victims online to coax them to make crypto-currency investments. The catch is that the transferred funds end up in the swindler’s pockets while the victim is abandoned.

Judges in Arizona, California and Idaho authorised seizure warrants for six virtual currency accounts that prosecutors say were used to launder proceeds of the various frauds after they were socially engineered into investing their savings in dodgy digicash schemes. “According to court documents, the virtual currency accounts were allegedly used to launder proceeds of various crypto-currency confidence scams. In these schemes, fraudsters cultivate long-term relationships with victims met online, eventually enticing them to make investments in fraudulent crypto-currency trading platforms.

“In reality, however, the funds sent by victims for these purported investments were instead funneled to crypto-currency addresses and accounts controlled by scammers and their co-conspirators,” says  the US Department of Justice news.

"In this case, the FBI Phoenix Division has identified at least 69 victims with an estimated loss of at least $33.9 million related to these various fraudulent investment platforms," according to the California court document.

The scheme often involves faking a romantic interest in the victim, earning the scheme the title of “crypto-currency romance” or “CryptoRom.

“These particularly vicious frauds, where scammers carefully cultivate relationships with their victims over time, have devastated families and cost individuals their life savings,” Assistant Attorney General Kenneth Polite said.

The hacking scam criminals create a relationship with their victims over a number of months and gradually scammers introduce the idea of trading in crypto. Initial “investments” are often small, so as not to spook the victim. The criminals later connect the victim to a fake investment website, promising profitable returns and then the money invested goes directly into the pockets of these cyber criminals.

Only when the victim decides to withdraw a big sum do they realize the whole thing is a scam. Often they’ll be told to pay an exit fee or taxes to gain access to their accounts, which also goes to the scammers. According to the FBI’s Internet Crimes Complaint Center, investment fraud is the most common scam, totaling $3.31 billion in losses in 2022, a 183% increase from 2021.

US Dept. of Justice:     I-HLS:     The Regsister:    Cybernews   International-Adviser:    Infosecurity Magazine:

You Might Also Read:

$3 Million Romance Fraudster Arrested:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Japan’s Leading Companies Exposed To Ransomware
Attack On Israel’s Water Systems »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DataGuidance

DataGuidance

DataGuidance is a platform used by privacy professionals to monitor regulatory developments, mitigate risk and achieve global compliance.

CyberTrap

CyberTrap

CyberTrap is an advanced highly-interactive deception technology allowing real-time analysis and control of security breaches.

Cyber Defense Labs

Cyber Defense Labs

Cyber Defense Labs helps companies identify, mitigate and reduce risk as a trusted, reliable partner for cyber risk management.

Avatao

Avatao

Avatao is an online training platform for building secure software, offering a rich library of hands-on IT security exercises for software engineers to teach secure programming.

Infosec (T)

Infosec (T)

Infosec (T) Limited is an independent Tanzania based consultancy specializing in IT governance, information security and IT audit.

Data Protection People

Data Protection People

Data Protection People are specialists in Data Privacy, Governance, and Information Security.

MyCyberSecurity Clinic (MyCSC)

MyCyberSecurity Clinic (MyCSC)

MyCyberSecurity Clinic's main goal is toward establishing an international reference centre for excellence in the field of digital forensics and data recovery services.

Propelo

Propelo

Propelo (formerly LevelOps) is an engineering excellence platform that helps increase developer productivity and improve security with data-led insights and workflow automation.

Sertainty

Sertainty

Sertainty enables developers to mix intelligence into data files for active risk mitigation and data control. Discover the impact of Data: Empowered.

Cybertronium

Cybertronium

Cybertronium is a leader in managing cyber risk. We bring you the latest from the complex, ever-evolving online threat environment with the insights to inspire and the expertise to act.

Cornami

Cornami

Cornami delivers real-time computing on encrypted data sets, which is vital for data privacy and cloud security.

Data Defenders

Data Defenders

Data Defenders provide information security technology solutions that empower consumers, businesses and governments with safe and secure IT and cybersecurity infrastructures.

Galvanick

Galvanick

Galvanick enables your operations and IT teams to protect your industrial systems and networks against digital threats.

IONIX

IONIX

IONIX (formerly Cyberpion) is the attack surface management solution that uses Connective Intelligence to shine a spotlight on exploitable risks across your supply chain.

HTX (Home Team Science & Technology Agency)

HTX (Home Team Science & Technology Agency)

HTX brings together science and engineering capabilities to transform the homeland security landscape and keep Singapore safe.

Standard Notes

Standard Notes

Standard Notes is a secure digital notes app that protects your notes and files with audited, industry-leading end-to-end encryption.