[Threats ALERT]
supported by
TOTAL CASH PRIZE:
30 000 PLN
That means
1st Place
15 000 PLN
2nd Place
10 000 PLN
3rd Place
5 000 PLN
- They run fake advertising campaigns
- They create websites and social media accounts to encourage future "victims" of fraud to donate funds
- They organize fake call center (Boiler Room)
- By trickery they gain remote access to the victim's computer
- They steal all savings from victims' bank accounts
- They profile a Polish resident for the purpose of financial fraud
Output base for Teams -> here
IOSCO warnings list - downloading the list, updating the list on an ongoing basis, monitoring
- Entities on the above lists must be checked for the presence on online scam websites such as scamwatcher, scambroker, scamreview, broker review, forex review or others. The person performing the task should gather the knowledge and opinions of clients/internauts describing the services offered by established companies themselves
- Determining whether the registered office indicated by the surveyed entity on the website is qualified as a tax-haven, the location of the place offering registration of offshore companies. The sources can be used:
LINK
*It is recommended, when performing the task, to check the validity of the lists. Displaying documents can be disabled by isap.sejm.gov.pl at any time. The participant of the task will have to determine the archival and current lists themselves.
- Determining whether the entities from the lists do not profile the Polish resident via websites (*explanation: profiling of the Polish resident may result e.g. from the availability of the website in the PL language and e.g. from opinions/reviews about the products offered by the entity expressed by persons of Polish nationality on forums, blogs, social media.
- Monitoring of changes in the IOSCO list or others (current update of changes in the list)
- Determining as much information as possible about the entity:
- registration data
- owners
- certificate of incorporation / memorandum of association
- Web page analysis
- Analysis of records in the WHOIS database (current + archival, search for further links through information contained in WHOIS)
- Verification whether the entity indicated on the page (usually the page footer) is actually supervised
- Collecting all contact data from websites
- Determining the social media accounts kept within the framework of the audited activity
- Establishing what entities on the list profile the Polish resident
- Periodically updated information from monitoring lists in order to check whether new pages are created within the same entity (rebranding)
- Periodically updated information from the monitoring of lists whether new entities profiling Polish residents via websites are created
- Collected and systematized business information about the entity
- Collected and structured information on/about/regarding/in terms of websites and social media
Why is this important?
Recently, Poles have been falling victim to fraudsters more and more often, losing their money. More and more sophisticated methods used by fraudsters, combined with low interest rates on bank deposits and unsatisfactory returns on other forms of investment make people look for alternative forms of investing capital. The activities of scammers are accompanied by aggressive marketing and the information provided is incomplete or insufficient for proper risk assessment. In addition, there is the promise of high and fast profits. The time of the pandemic and the increasing use of the Internet make it easier for criminals to act, who often take advantage of the difficult life situation of their victims, e.g. due to the loss of their jobs. In such a situation, not everyone is able to see the threats that lie behind an attractive website, advertisements appearing in search engines or social media.
EXAMPLE
Encouraged by the promise of easy and quick earnings, the Internet user decides to take advantage of an attractive opportunity to make money. By registering on the website, the user gives his/her personal data, telephone number and e-mail address. He does not realize that he has just been put on the contact list managed by an international group of fraudsters. Often, on the same day, the contact details of the newly registered user are sent to a fake call center, which starts manipulating the future victim to force the first payment of money through experienced telemarketers. However, it does not stop at one payment. Fraudsters require the installation of software on the victim's computer for remote desktop sharing. This allows them to access sensitive data and thus to make bank transfers or financial commitments on behalf of their victims. They often end up losing their life savings.
Fraudsters, in order to make it difficult to track them down, open new companies under a different banner, create new websites with changed web addresses, register more fake offshore companies and go hunting again.
Presentation on Task PL
Presentation on Task ENG