
The Israel Police Cyber Crime Unit has successfully destroyed a cryptocurrency scam involving hackers who used a tricky “sting software” to steal millions from crypto investors. The company behind this fraudulent scheme has not yet been disclosed, but it planned a cunning software designed to defraud investors.
Recently, Israeli authorities conducted a raid on the operation’s headquarters. During the operation, it was discovered that the individuals behind this scam were young and inexperienced, seemingly driven solely by the attraction of quick financial gains.
Their primary target demographic consisted of European investors, whom they attracted through outbound phone calls, promising substantial cryptocurrency profits. Once attracted in, these innocent investors received login credentials that appeared legitimate for accessing their investment portfolios.
However, these credentials were entirely unreal, only designed to create a false sense of authenticity. The scammers utilized software to control and manipulate profit figures, creating the misconception of a successful investment when, in reality, it was a fake.
Victims only realized they had fallen victim to a scam when attempting to withdraw their funds, discovering that their accounts were empty of any assets. This scam impacted investors from several countries, including Serbia, Ukraine, Georgia, Germany, Spain, and Israel. Numerous agencies collaborated in this operation, including the Israel Money Laundering and Terror Financing Prohibition Authority, the Israeli Tax Authority, and the Bavarian Cyber-Warfare Unit of the German police, all working together to dismantle this fraudulent operation.
In a recent report by Todayq News dated September 5, 2023, Swyftx, an Australian cryptocurrency exchange, is taking an innovative step by launching a unique “Earn and Learn” educational platform. This initiative aims to protect the public from cryptocurrency scams by equipping them with the knowledge and skills to identify deceptive tokens and detect pump-and-dump schemes.
Todayq News has also reported that scammers are currently exploiting government-owned website URLs to deceive MetaMask users. They create clone websites that closely resemble the genuine MetaMask platform. Unsuspecting users who click on these links within government websites are redirected to these fake MetaMask websites. To date, there have been no reported instances of individuals falling victim to this ruse, and neither MetaMask nor any social media or press release has addressed the matter.