FBI Seizes $112m From 'CryptoRom' Criminals

The US Department of Justice (DoJ) has seized six crypto currency wallets believed to have been used to launder the proceeds of investment fraud scams of virtual currency worth an estimated $112m (£90m) linked to crypto-currency investment scams.

Scammers have been using accounts to launder funds acquired via crypto-currency confidence scams, called “CryptoRom”.

The schemes involve fraudsters cultivating long-term relationships with victims online to coax them to make crypto-currency investments. The catch is that the transferred funds end up in the swindler’s pockets while the victim is abandoned.

Judges in Arizona, California and Idaho authorised seizure warrants for six virtual currency accounts that prosecutors say were used to launder proceeds of the various frauds after they were socially engineered into investing their savings in dodgy digicash schemes. “According to court documents, the virtual currency accounts were allegedly used to launder proceeds of various crypto-currency confidence scams. In these schemes, fraudsters cultivate long-term relationships with victims met online, eventually enticing them to make investments in fraudulent crypto-currency trading platforms.

“In reality, however, the funds sent by victims for these purported investments were instead funneled to crypto-currency addresses and accounts controlled by scammers and their co-conspirators,” says  the US Department of Justice news.

"In this case, the FBI Phoenix Division has identified at least 69 victims with an estimated loss of at least $33.9 million related to these various fraudulent investment platforms," according to the California court document.

The scheme often involves faking a romantic interest in the victim, earning the scheme the title of “crypto-currency romance” or “CryptoRom.

“These particularly vicious frauds, where scammers carefully cultivate relationships with their victims over time, have devastated families and cost individuals their life savings,” Assistant Attorney General Kenneth Polite said.

The hacking scam criminals create a relationship with their victims over a number of months and gradually scammers introduce the idea of trading in crypto. Initial “investments” are often small, so as not to spook the victim. The criminals later connect the victim to a fake investment website, promising profitable returns and then the money invested goes directly into the pockets of these cyber criminals.

Only when the victim decides to withdraw a big sum do they realize the whole thing is a scam. Often they’ll be told to pay an exit fee or taxes to gain access to their accounts, which also goes to the scammers. According to the FBI’s Internet Crimes Complaint Center, investment fraud is the most common scam, totaling $3.31 billion in losses in 2022, a 183% increase from 2021.

US Dept. of Justice:     I-HLS:     The Regsister:    Cybernews   International-Adviser:    Infosecurity Magazine:

You Might Also Read:

$3 Million Romance Fraudster Arrested:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Japan’s Leading Companies Exposed To Ransomware
Attack On Israel’s Water Systems »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

WEBINAR: How To Build And Implement An Effective Endpoint Detection And Response Strategy

WEBINAR: How To Build And Implement An Effective Endpoint Detection And Response Strategy

Join this webinar to learn how the cloud threat landscape is evolving and organizations are deploying more advanced and capable security controls at scale.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Global Secure Solutions (GSS)

Global Secure Solutions (GSS)

Global Secure Solutions is an IT security and risk consulting firm and authorised ISO training partner for the PECB.

Aqua Security Software

Aqua Security Software

Aqua Security helps enterprises secure their cloud native applications from development to production, whether they run using containers, serverless, or virtual machines.

CERT-PY

CERT-PY

CERT-PY is the national Computer Emergency Response Team for Paraguay.

Syhunt Security

Syhunt Security

Syhunt is a leading player in the web application security field, delivering its assessment tools to a range of organizations across the globe.

Olfeo

Olfeo

Olfeo is a content filtering software vendor. Our proxy and filtering solution helps our customers to manage, monitor and secure their Internet traffic.

redGuardian

redGuardian

redGuardian is a DDoS mitigation solution available both as a BGP-based service and as an on-premise platform.

th4ts3cur1ty.company

th4ts3cur1ty.company

th4ts3cur1ty.company specialize in delivering intelligence lead adversary emulation purple teaming & the bespoke building of Security Operation Centers.

UKAS

UKAS

UKAS is the national accreditation body for the UK. The directory of members provides details of organisations offering certification services for ISO 27001.

Cybersecurity Manufacturing Innovation Institute (CyManII)

Cybersecurity Manufacturing Innovation Institute (CyManII)

CyManII was established to create economically viable, pervasive, and inconspicuous cybersecurity in American manufacturing to secure the digital supply chain and energy automation.

BeyondTrust

BeyondTrust

BeyondTrust is a leader in Privileged Access Management, offering a seamless approach to preventing data breaches related to stolen credentials, misused privileges, and compromised remote access.

Rocheston

Rocheston

Rocheston is an innovation company with cutting-edge research and development in emerging technologies such as Cybersecurity, Internet of Things, Big Data and automation.

Palantir

Palantir

Palantir software empowers entire organizations to answer complex questions quickly by bringing the right data to the people who need it.

Aura

Aura

Aura is a mission driven technology company dedicated to creating a safer internet for everyone. We’re making comprehensive digital security that's simple to understand and easy to use.

Alea Consulting

Alea Consulting

Alea Consulting is a global risk mitigation and investigative consulting firm, which helps organizations reduce reputation and operational concerns.

PROW Information Technology

PROW Information Technology

PROW is at the forefront of the technology and digital revolution with a focus and mastery in the cybersecurity, information security and data management realms.

Data Defenders

Data Defenders

Data Defenders provide information security technology solutions that empower consumers, businesses and governments with safe and secure IT and cybersecurity infrastructures.