Scams

Stay Ahead with Capital Shield.

As the leading independent provider of risk and financial advisory solutions, CSP leverages our unique insights, data and technology to help clients stay ahead of complex demands.

What Is Binary Options Fraud?

Binary trading scams are used to defraud investors of millions of dollars every year. They promise quick returns through the prediction of asset, commodity or index price over a short time period. While there are many licensed firms that trade in them as a legitimate financial services, investment in binary options is high-risk with returns that are almost impossible to predict, even for professionals. This system of investment is often co-opted by scammers.

What Is Cryptocurrency Fraud?

Various forms of cryptocurrency fraud exist, ranging from digital heists where hackers pilfer cryptocurrencies like Bitcoin or Ethereum from individuals and prominent cryptocurrency exchanges. A notable instance is the extensive theft of over $32 million from Japan's Bitpoint exchange, reminiscent of the substantial $500 million hacking operation that targeted Coincheck. Individuals can fall prey to crypto-fraud by investing in scam currencies. For further insights into cryptocurrency fraud and Mustang's role in combating these cyber-attacks, please refer to our Cryptocurrency Scams page.

What Is Binary Options Fraud?

Binary trading scams are used to defraud investors of millions of dollars every year. They promise quick returns through the prediction of asset, commodity or index price over a short time period. While there are many licensed firms that trade in them as a legitimate financial services, investment in binary options is high-risk with returns that are almost impossible to predict, even for professionals. This system of investment is often co-opted by scammers.

What Is Cryptocurrency Fraud?

Various forms of cryptocurrency fraud exist, ranging from digital heists where hackers pilfer cryptocurrencies like Bitcoin or Ethereum from individuals and prominent cryptocurrency exchanges. A notable instance is the extensive theft of over $32 million from Japan's Bitpoint exchange, reminiscent of the substantial $500 million hacking operation that targeted Coincheck. Individuals can fall prey to crypto-fraud by investing in scam currencies. For further insights into cryptocurrency fraud and Mustang's role in combating these cyber-attacks, please refer to our Cryptocurrency Scams page.

 

Facebook Scams, Fake News and Bogus Bitcoins

One example of a crypto scam is the advertisements you may have seen on popular social media platforms. These often show up on Facebook using photos of well-known celebrities such as Mel Gibson, to entice people into cryptocurrency investments. These scams are perpetrated by organised criminal gangs across the world, who prey on people’s lack of knowledge in this area.

Types of malware to watch out for

Malware is a catch-all term for software designed to damage or exploit a digital device, network or operating system, usually for the cybercriminal’s financial gain. Our meticulous malware investigations can tackle any type, including the most common forms below.

Viruses


This malware comes as an email attachment that contains a virus payload, which carries out the malicious action. When the victim opens the file, their device gets infected.

Ransomware


Ransomware installs itself onto a victim’s device and then encrypts its files, obstructing your access until they pay the culprit a specified sum of money.

Worms


Worms replicate from machine to machine with no need for user interaction. Rather, they exploit a weak link in a software or operating system’s security to spread on their own.

Scareware


These programs instil fear through alarming messages online. This tactic pressures the victim into purchasing a fraudulent application as protection, which is the actual malware.

Spyware


Installed on a victim’s device without their knowledge, spyware transmits personal details, communications and browsing behaviours to its user, who can monitor activities remotely.

Adware


These programs bombard users with unwanted ads that blink or block a particular action. They tend to be installed in return for something, like unpaid access to an online service.

Trojans


Trojans pose as safe applications, swindling unsuspecting users into downloading them. Once launched, they then can steal data, crash systems, spy on operations and more.

Fileless malware


This code works within a computer’s memory instead of the hard drive. As it doesn’t depend on files and leaves no malicious trace, it can be difficult to identify and tackle.

 
Phishing attack investigators with a proven track record

World-class phishing investigations


Our investigators, analysts and researchers have been collecting evidence to fight fraudulent operations around the world for decades. Global leaders in phishing attack investigation, we have the expertise to unravel any scam with exceptional efficiency.

Powerful techniques


Availing of direct access to local databases, expert witnesses in cyber fraud, and a network of confidential informants, Capital Shield employs a plethora of proactive methods to conduct meticulous investigations into even the most sophisticated phishing scams from foreign countries.

Global connections


Capital Shield has vast experience collaborating with state, federal and international law enforcement agencies. Our investigators can also partner with local and foreign correspondent lawyers to reveal money trails and hidden assets in almost any country.

Actionable evidence


Capital Shield delivers a detailed brief of evidence for use in criminal proceedings in the relevant jurisdiction. Equipped with proof of phishing fraud, and the identities of those behind it, you can take measures to prosecute the offender and recover your losses.

Robust results


Capital Shield investigators play a pivotal role in assisting international law enforcement agencies to crack down on fraud syndicates, gathering crucial intelligence that has facilitated major police raids, arrests and prosecutions across the globe.

Total discretion


Our passionate team performs every phishing attack investigation with unwavering professionalism, sensitivity and discretion. To safeguard our clients’ confidentiality, we encrypt every piece of personal data and will never disclose case details without consent.

 
Ponzi scheme investigators with a proven track record

Global leaders


Capital Shield is renowned for its unparalleled ability to uncover evidence and crack down on ponzi schemes across the globe. Our highly-experienced investigators, researchers and analysts bring the truth to light with unrivalled skill.

Proactive investigations


We approach every ponzi scheme investigation with driven and dynamic solutions that evolve with each breakthrough. Our investigations draw upon direct access to local databases, expert witnesses in cyber fraud, and a network of confidential informants.

Worldwide resources


Capital Shield investigators leverage powerful relationships with state, federal and international law enforcement agencies around the world. We can also work closely with local and foreign correspondent lawyers to identify money trails and hidden assets in nearly any country.

Actionable evidence


Losing your hard-earned savings to an investment scam can be devastating. To help you take legal action against the fraudster and recover your losses, we will present a thorough brief of evidence for use in criminal proceedings within the appropriate jurisdiction.

Guaranteed discretion


Capital Shield performs every ponzi scheme investigation with total professionalism and sensitivity. You can rest assured that every piece of personal data is encrypted for your privacy. Case details remain confidential and will never be disclosed without your consent.

Scams we helped our clients recover from

Reclaiming Trust: Our Success Stories in Combatting Scams