Investment_Hero
Investment Scams

A deceptive scheme enticing a victim to invest in a fake opportunity for a promised high return.
Frequently, Investment Scams also overlap with Romance Scams.

Learn More

Problem overview

In a fraudulent investment scheme, an offender persuades their target to transfer their funds to a non-existent fund or to contribute to a counterfeit investment. Typically, the perpetrator offers an attractive profit to lure the victim into initiating the transaction.

These scams involve placing investments in assets such as cryptocurrencies, gold, real estate, and other valuable commodities. Perpetrators of investment fraud often utilize cold-calling strategies to pinpoint their targets and exert pressure for immediate responses, citing the limited-time nature of the opportunity.

Around the world, investment scams typically contribute to huge monetary losses while presenting a low number of individual cases compared to other Authorized Push Payment (APP) scam types.

View Solution Brief

A differentiated approach to tackling Investment Scams

 

Regarding Investment Scams, the deceptive transfer of funds can occur either during a live phone call between the victim and fraudster or when the victim is alone. For instance, they might receive an email with instructions on how to execute the investment opportunity.

In instances where the fraudster manipulates the victim into making a deceitful transfer while on the phone, behavioral biometrics intelligence can be leveraged. This involves scrutinizing the ongoing call to detect signs of hesitation, mouse doodling, phone motion, and the dictation of an account number. These behaviors are strong indications the fraudster is in the process of persuading the victim to make the transfer.

In cases where the victim completes the transfer independently, there are other revealing cues to consider — for instance, monitoring for the presence of high-risk applications such as cryptocurrency and dating apps, evaluating the transfer context, examining connections to new beneficiaries, noting repeated deposits, and scrutinizing transactions to high-risk account destinations.

Effectively countering investment scams necessitates a comprehensive analysis of behavioral, device, network, and application intelligence simultaneously. This gives financial institutions more insight and opportunity to shut down deceitful transfers before the purchase money is gone.

$3.3B

Reported losses from Investment Scams in 2022

image-4

Types of social engineering attacks: Detecting the latest scams

Social engineering has been one of the largest threats to an organization’s cybersecurity for some time. Unlike threat actors that use ransomware or zero-day exploits, a good social engineer doesn’t need technical skills to succeed.

Learn More
iStock-623762322 Rectangle 2890
Additional scams
use cases 

Impersonation scams

In impersonation scams, fraudsters often adopt the disguise of a well-known organization, such as the police, a customer's bank, their utility provider, or a government department. By impersonating these trusted entities, scammers aim to manipulate and deceive individuals into transferring money to an account under their control. 

Learn More  >

Remote access attacks

Legacy fraud prevention controls have limited or no ability to detect remote access attacks. When a remote access tool is present on a user’s device, the bank’s systems detect a genuine device fingerprint, with no traces of proxy, code injections, or malware, and with the proper IP and geo-location. 

Learn More  >

Peer to peer fraud

A Peer-to-Peer (P2P) scam is typically when a fraudster poses as a legitimate business and requests payment from the victim for a product or service that never materializes. 

Learn More  >

Request an intelligence briefing

Join us for a 30-minute deep dive with a BioCatch expert to learn the latest tactics, techniques, and procedures (TTPs) fraudsters use to scam your customers
and harm your brand.

Request a Briefing