Blog

Cyber Crime

Fraud Recovery

No one wants to fall victim to a scam. It’s even worse to lose money in one. Cybercrime victims have been known to lose thousands of dollars to online scams. In worst-case scenarios, people have lost their entire life savings they spent decades building up. No matter how much money was lost, the first question on victims’ minds is whether they can recover stolen funds. Despite the complex nature of the process, fraud recovery is possible. However, there are specific circumstances and factors that can increase or decrease the likelihood of success. Continue reading to learn if fraud recovery is an option for you.

Is Fraud Recovery Possible?

Fraud recovery requires many factors to be successful. The type of payment is important because different methods are easier or more difficult to trace. The identity of the cybercriminal is also a factor. Known cybercriminals can be forced by the legal system or authorities to return the funds. Lastly, how quickly a victim acts is the most important factor for successful fraud recovery.

Our experts recommend that you immediately collect evidence of the scam pertaining to the time and method of payment. You should also report fraudulent charges to your bank as soon as possible.

How to Respond If You Paid a Scammer

Every payment method has a different recovery process. Depending on the form of transaction, they may be reversible or lost forever. Below are our experts’ recommendations when it comes to recovering stolen funds, based on the payment method.

  • Credit card payments. Credit card providers will typically reverse fraudulent charges while their internal department investigates the transactions. Victims should contact the company or bank that issued the card immediately and notify them of the fraudulent charge.
  • Bank transfers. Contact your bank and alert them of the unauthorized transaction. Request that they reverse the transaction and return your money. The faster you notify them, the better.
  • Cash payments. If you mailed a cash payment by U.S. mail, try contacting the Postal Inspection Service. They may be able to intercept the package before it reaches the destination. Once the cash reaches the scammer, fraud recovery is practically impossible.
  • Scammers commonly use crypto because these transactions are extremely difficult to trace and reverse. However, crypto fraud recovery is possible. Report the scam to law enforcement as soon as possible to have the best chance of recovering stolen funds.
  • Gift cards and prepaid debit cards. Similar to crypto fraud recovery, scammers also prefer to use gift cards and prepaid debit cards. They are extremely difficult to trace, making recovery of stolen funds nearly impossible. Try contacting the company that issued the gift card, alerting them to the scam and need for a refund.
  • Payment services or apps. Mobile payment services like Venmo offer protection for certain payments. Transactions for goods and services or toward business profiles can be refunded. However, you should always read the terms and conditions of a payment service to understand their processes fully.

Recovering Crypto and Tracing Blockchain-Based Wallets

Many experts have access to specialized tools, allowing them to perform crypto wallet tracing. This is the process of monitoring and analyzing the transaction history of a blockchain-based wallet. The authorities can work with centralized crypto platforms to trace transactions through different wallets.

They can also request user information about the owner of certain wallets. Experts may be able to tie transactions to an individual, supporting crypto fraud recovery and the possibility of legal action. However, the process of crypto wallet tracing is very complex.

Report the Scam to the Proper Agencies

Many victims of online scams avoid reporting schemes that they fell victim to. They may want to keep it private to avoid humiliation or shame. However, reporting scams is vital. It allows law enforcement agencies to track cybercrime trends across the country and can lead to investigations. Here are the three main law enforcement agencies to report a scam to when you have lost money.

  • Local Law Enforcement. File a police report immediately after being threatened or scammed. Make sure to include evidence, such as messages, transaction records, social media profiles involved, etc. You can visit your local police department in person or call their non-emergency phone number.
  • Federal Trade Commission (FTC). The FTC has a reporting system specifically for commerce scams. This agency can’t recover money lost to a scam for you. However, they will provide essential support. The FTC can sue businesses, shut down fraudulent websites, and impose fines. Reports to the FTC are also referred to the appropriate local, state, and federal authorities. You can report a scam to the FTC at ftc.gov
  • Federal Bureau of Investigation (FBI). While local law enforcement has authority over their locality, the FBI has jurisdiction over the country. You can report scams to the FBI’s Internet Crime Complaint Center (IC3), where they can pursue perpetrators globally. The FBI has connections to international law enforcement agencies to pursue criminals in different countries. You can report a scam to the IC3 by visiting their website.

Why Timing Matters in Fraud Recovery

Timing is extremely important when it comes to fraud recovery. The longer it takes to reverse a transaction, the harder it will be to recover stolen funds. Once a scammer receives a victim’s funds and withdraws them, the fraud recovery process becomes virtually impossible.

Cybercriminals also tend to cover their own tracks by erasing data associated with the scam. Things like deleting messages, moving money around, and withdrawing funds make tracing scammers more difficult.

The Role of Law Enforcement and Legal Professionals

With the identity of your scammer, you can take legal action to recover lost funds. You can file a civil lawsuit for damages, fraud, or whatever else applies to your situation. Class action lawsuits are legal avenues for groups of individuals to hold organizations responsible. It’s important to work with a fraud recovery legal professional to understand all your options.

For scams that cross borders, the International Criminal Police Organization (INTERPOL) is an essential resource. INTERPOL consists of 196 countries that help police communicate with each other in different countries. They can help victims recover scammed money. However, they can also help bring global perpetrators to justice.

How One Man Lost $500K. A Painful Lesson in Investment Fraud

Mr. Richard Giam thought he would never fall for a scam until he learned a painful lesson. In 2019, a friend introduced a forex trader to Giam who shared an investment opportunity. He invested a small amount to test the waters, and he saw the promised return on investment. He continued investing for years and even brought friends and family into the opportunity.

One day, the investor was suddenly charged and arrested for fraud. Giam soon after realized that all of his investments were involved in a huge Ponzi scheme. Giam lost $500K to the scam and many of his friends and family lost money as well. Some of his relationships did not survive the incident. However, many of his loved ones found it in their hearts to forgive him.

A Real-World Story of Crypto Fraud Recovery

A resident of Maine wanted to donate to a friend who needed a lung transplant. She clicked on a link on a social media platform that appeared to be for the friend. However, it actually was a malicious link that extracted tens of thousands of dollars from her bank account.

She immediately alerted law enforcement who worked with the Wisconsin Department of Justice to recover stolen funds. The authorities traced the funds to an online cryptocurrency trading website and recovered over $26,000.

Work with Cybersecurity Experts to Recover from a Scam

Private cybersecurity firms like Cyber Investigation Inc. have deep knowledge of scam tactics and how to help victims recover. By acting quickly and strategically, they will work to improve the chances for successful fraud recovery.

Working on your behalf, these experts can also trace the digital footprint to uncover a perpetrator’s geolocation and identity. While recovering stolen funds is not a certainty, these specialists understand how to give victims the strongest chance.

If you or someone you know has been impacted by an online scam, take action as soon as possible. Reach out for expert support by contacting Cyber Investigation Inc.

Read More
Cybercrime Report with the FBI’s IC3

The launch of the World Wide Web in 1989 led to the rapid evolution into the cybersphere we know today. As the internet expanded, so did the prevalence of online crime. In response, the FBI created the Internet Crime Complaint Center (IC3) in 2000 to combat cyber-enabled crimes. The IC3 has gone from receiving 2,000 reports per month to the exact same number each day. However, many victims of cybercrime prefer to not involve law enforcement out of embarrassment or shame. To make the process easier for victims, we’ve outlined everything they need to know about making a cybercrime report with the FBI’s IC3.

What is the IC3?

The IC3 is the FBI’s central hub for reporting cyber-enabled crimes. It was created to collect reports, distribute the complaints to the appropriate agencies, and track national trends regarding cybercrime. Anyone who believes they were affected by an online crime can make a cybercrime report with the FBI’s IC3. The information will then be forwarded to the appropriate law enforcement or partner agencies. The IC3 does not conduct investigations, provide emergency support, or guarantee that action will be taken for your case. However, the IC3 is an ideal place to start when involving the authorities in your cybercrime incident.

What is Cyber-Enabled Crime?

The FBI defines cyber-enabled crime as illegal activity that is performed in part by using digital means. The most common forms of cyber-enabled crime involve bad actors using internet technology to create fraudulent personas or representations. These facades allow cybercriminals to trick online users into sharing sensitive information or money. Here are some of the most common forms of cyber-enabled crime.

  • Computer hacking. Unauthorized access to systems or networks.
  • Employment scams. Fake job listings intended to steal money or personal information.
  • A malicious software that encrypts files unless a ransom is paid.
  • Romance scams. Bad actors fake an online relationship to gain trust and then manipulate the victim into sending money.
  • Identity theft. Scammers steal personal information to commit fraud.
  • Investment scams. Criminals promise high returns on investments to lure in victims.
  • Business Email Compromise (BEC). Scammers pose as co-workers, business partners, or executives to gain access to sensitive data or funds.
  • Criminals coerce victims to comply with demands by claiming they’ll expose explicit images or videos if they don’t obey.
  • Phishing scams. Messages from scammers that trick individuals into giving up personal information and login credentials.

How to File a Complaint with the IC3

You can make a cybercrime report with the FBI’s IC3 through their website. Simply visit the IC3 homepage and select “File a Complaint” to get started. However, children affected by online exploitation should report the incident to the National Center for Missing and Exploited Children instead of the IC3.

Filing a complaint is a 7-step process, and it’s important to know what details you will need before getting started. If you are looking to file a complaint, you’ll need the following information.

  1. Reporting party information. The information of the person affected by the crime. You can file a complaint on behalf of someone else. However, you will enter your own contact information.
  2. Financial transactions. If you experienced any financial loss, you need to enter key details like the total amount lost, account information, transaction dates, and who received the money.
  3. Suspect information. Any information that you have about the person who committed the cybercrime. This could be their name, address, email, website, social media profile, or IP address.
  4. Details of the event. Describe the incident and include information that might help law enforcement understand what happened.
  5. Technical details. Include information about the technical details of the cybercrime, like crypto transaction metadata or email headers.
  6. Possible witnesses. List any possible witnesses to the crime if there are any.
  7. Previous reports about the incident. Provide the details of other law enforcement agencies that you previously reported the crime to if applicable. Lastly, sign the privacy statement and submit your complaint.

What Happens After I Make a Cybercrime Report with the FBI’s IC3?

Once you finish filing a complaint with the IC3, you should see a message stating that the complaint has been successfully submitted. Then, trained analysts will review and research the complaint as well as distribute the information to the appropriate law enforcement and partner agencies. The IC3 does not notify complainants of any updates. All complaints are also included in the IC3’s annual report, tracking regional and national cybercrime trends.

Does the IC3 Accept Evidence?

The IC3 does not accept evidence or attachments. It’s essential to preserve your evidence and keep it in a secure place. If an agency opens an investigation into your case, they will contact you and may request your evidence to support their investigation. Take note of the examples of evidence provided below.

  • Phone bills
  • Credit card receipts
  • Chat transcripts or screenshots
  • Printed or electronic copies of email with header information
  • Wire receipts
  • Canceled checks
  • Money order receipts
  • Printed or electronic copies of webpages
  • Copies of malware

When Should You Report to Another Agency?

  • Crimes involving children. Online crimes involving child exploitation should be reported to the National Center for Missing & Exploited Children (NCMEC). This non-profit runs the CyberTipline, a reporting center for the sexual abuse of minors.
  • Consumer-focused scams. The Federal Trade Commission (FTC) provides a reporting tool for individuals who experienced fraud, scam, or bad business practices. You can report consumer-focused scams on the FTC’s Report Fraud webpage.
  • Local scams. If you have been a victim of a scam or online crime, you should always report it to your local law enforcement. They can help you file an official report and help you recover from the incident.
  • Investment scams. The Securities and Exchange Commission (SEC) investigates investment-related fraud, specifically concerning federal security law violations. You can report fraud to the SEC on their website.

Next Steps for Victims

Making a cybercrime report with the FBI IC3 is essential for many reasons. It not only opens the door for law enforcement support and prosecution of the perpetrator, but it also contributes to the effort to track cybercrime trends nationwide. However, due to the FBI’s heavy caseload, there may be delays before your case is reviewed. While reporting to the IC3 or local authorities is an important first step, you can also turn to digital investigators for immediate assistance.

At Cyber Investigation, it’s our mission to support victims of cybercrime however we can. We have state-of-the-art technology that we use to trace the digital footprint of anonymous cybercriminals. Our team can also help victims after being scammed — either by attempting to recover lost funds or strengthening the victim’s cybersecurity against future attacks. Our experts are available 24/7 to provide immediate and reliable support. You don’t have to face cybercrime alone. Contact us today.

Read More
Scam Email Threatening to Expose Video

It’s one thing to receive a spam email threatening to expose your personal data to the public. When the person on the other end sends a scam email claiming to have videos to support their assertions, the situation instantly becomes more dire. But do they actually have a video of you, or are they just employing classic scare tactics? Keep reading to learn more about video scam emails saying they have videos of you.

What Should I Do If I Get an Email Claiming to Have Videos of Me?

While it’s possible that the scammer has obtained video of you either from a third-party source or through surveillance, these claims are often empty threats. More realistically, the email has been sent to multiple people with the hopes that at least one will believe it. Here’s how you can tell.

Generic Messages

As we stated, these types of video scam emails are often delivered in a mass-email blast to multiple recipients. As such, they are composed of messages that follow a generic outline with limited personal information found from previous data breaches sprinkled in. One way to check if you received a generic spam email is by searching for a portion of the message you were sent to see if other similar examples exist online.

Lack of Evidence

Email scams threatening to expose videos can cloud your judgment — but think critically for a second: If they had a video of you, wouldn’t they at least send a single frame as proof. If the email doesn’t go into specifics on the content they have and fails to tangibly prove the video’s existence, it’s likely a fake claim meant to scare you into complying.

Scare Tactics

If the scammer doesn’t actually have video of you, their entire scheme relies on your fear and belief. To manufacture this, scammers will employ scare tactics. They may throw around names like Pegasus, a well-known form of spyware. They claim that they’ve monitored you for months and acquired a stockpile of footage.

The perpetrator will likely set a deadline for payment and tell you they will know if you contact law enforcement to create a sense of urgency. They may even spoof the email header to make it appear as though the message was sent from your own address.

How to Respond to a Video Scam Email

  • Stay Calm: We understand what you are feeling and the type of duress these video scam emails can put victims under. However, it’s important that you don’t panic and instead proceed with the appropriate course of action.
  • Don’t Engage: You may feel inclined to either respond to the threatening email or block the sender altogether. You should not converse with the cybercriminal, but you’ll want to leave the line intact while you investigate the attack.
  • Analyze the Email: With the information we covered above in mind, evaluate the validity of the threats being sent your way. If it feels like the email could’ve been sent to anyone, it’s probably just spam.
  • Collect Evidence: While you are vetting the validity of the video scam email, document the sender and any details of the message that display the threats being made. Even if they don’t have the dirt on you that they claim to, they’ve still committed a crime.
  • Contact Authorities: Like any cybercrime, you should report the video scam email to law enforcement and the email platform provider. This can help deter your harasser and keep the entire internet a little bit safer in the future.

Consider the Assistance of Cybersecurity Professionals

If you need help at any point in your response, the assistance of cybersecurity experts can be a huge asset. These professionals understand how such schemes unfold from experience. They can help you assess the validity of the threat, gather and document evidence, and determine the optimal path to take to combat your assailant.

You’re Not in This Alone: Cyber Investigation Inc. Can Help

At Cyber Investigation Inc., our team of experts know exactly what to do in the event of a scam email threatening to release private videos. We’ve seen thousands of similar cases, and our 4.93-star rating displays our ability to reach a satisfying resolution for our clients. Here’s what we can do for you.

Take Over Communication

You have enough on your plate and likely don’t have experience conversing with cybercriminals. When you work with CI, we can step into your place and take over communication on your behalf. Our experience handling these cases allows us to delay the harasser, collect valuable intel, and prevent further harm.

Thorough Analysis

Our proprietary tools and techniques allow us to analyze metadata in email headers and any content that has been shared. Through this, we can determine the origin of the email down to the geolocation and the device used to send it. This can allow us to identify the perpetrator.

Malware Detection

Scammers often claim to have captured video of you using your own webcam. Attacks like this require the download of malicious software onto your device. We can scan your device for such programs to determine if unauthorized access to your webcam or microphone has occurred.

Complete Documentation

We chronicle our entire investigation from the minute we pick up your case through its resolution. This ensures that the chain of custody is maintained, and your report can be used as admissible evidence in any legal proceedings.

Ongoing Monitorization

After your case has concluded, we can still be of assistance. We can provide continual monitoring for security threats to help you avoid falling into similar traps in the future. Additionally, we can assess your current system and internet practices to help you beef up your cybersecurity.

Moving Forward: Safe Online Practices

Unfortunately, there is always a threat of bad actors engaging you online. However, there are steps you can take to minimize your chances of experiencing their harmful behavior:

  • Secure Your Accounts: Update your passwords regularly, especially if you are notified that they’ve been compromised in a breach. A password manager can help you update and store your passwords. Additionally, using two-factor authentication (2FA) can add an extra level of security to your online accounts.
  • Avoid Oversharing: This may seem like an obvious step. Don’t share compromising videos online. But with the advancement of AI deepfake technology, you also have to be wary of who can see your innocent media.
  • Don’t Click Suspicious Links: Many video scam emails claim to have videos that they don’t and contain links to either make payment or view the alleged content. These links often contain malware and clicking on them may open you up to a legitimate spyware scam.
  • Use a Reputable Antivirus: Regularly scan your devices to detect any unwanted programs and malicious software. This can help you determine the validity of a spyware claim and protect your personal data from the wrong hands.

And if you are experiencing a scammer threatening to release videos of you, remember that you are not alone. Reach out to Cyber Investigation Inc. today and let us help you protect your reputation and restore your peace of mind.

Read More