Recovery of Funds in Hong Kong

CEO Fraud, Email Scam and Invoice Fraud Investigation Service in Hong Kong

Digitpol has seen an increase in CEO Fraud, Email Fraud, Internet Fraud and Banking Scams in Hong Kong. Digitpol’s operational units deploy daily to assist with the recovery of funds and seizure of rogue bank accounts that are used to facilitate the transfer of scammed funds, Digitpol assists with tracing the funds transferred overseas in cooperation and liaising with International Police and Banks. Digitpol has key relationships with the global banking industry.

If you suspect that you are, or have been, a victim of banking, email or internet fraud,  the time to act is the most important element. The first approach is of upmost importance, a police report is to be filled at the Hong Kong Police Force, the report needs to be filled instant as the crime is discovered. If the report is filled in time there is a high possibility that the fraudster’s bank account can be seized and the funds frozen.

To file a Police report in Hong Kong, this can only be done in person at the police station or by the E-Crime service. The Police will first need to be satisfied that a crime is actually committed, this is done by the examination of evidence and the evidence of a crime. If sufficient evidence is presented the Police will take action. Digitpol can assist with compiling further evidence into a report to assist the investigation and ensure the case receives the right attention.

Digitpol can assist foreign firms and local by providing on the spot support and the collection of evidence, if and when possible, Digitpol in cooperation with the Police can investigate further. Digitpol can engage a legal partner to act on behalf of victims when the recovery of losses becomes a civil matter.

According to the Hong Kong Police Force, technology crime has remained an operational priority of the Commissioner of Police since 2012. In 2015, the Police Force established the new Cyber Security and Technology Crime Bureau so as to allocate extra manpower to combat and prevent technology crimes. Since 2014 there were more than 2,000 reported cases of online business fraud, and the pecuniary loss hit almost $50 million. Besides email scams, other common types of online business fraud often involve e-banking, e-auctions, e-purchases, online trading and the misuse of credit cards.

If your company has been targeted by Internet Fraud, CEO Fraud or Email Fraud and funds have been transferred to a bank account in Hong Kong or China, we can help you, but only if you act fast and if you have the proof. If Digitpol is notified in time, Digitpol will stop the funds from been transferred further and assist with all matters such as reporting the crime to the local Police.

Common Phishing Attacks & Funds Transferred to Hong Kong Banks 

Such email scams often happen when fraudsters hack into the email accounts of targeted companies, often in Europe or the USA and over time, cyber criminals learn about their businesses and invoices that are due to be paid, fraudsters then use the information obtained to impersonate employees and suppliers, in order to arrange transfer of funds. According to the Latest Trend of Email Scams – CEO Email Scam published by the Hong Kong Police Force, email scams typically take the following forms:

Sale contract scam: fraudsters know from stolen emails about transactions between company A (the seller) and company B (the buyer). The fraudsters, pretending to be company A, send fictitious emails to company B, claiming that company A’s bank account has changed and requesting transfer of funds to the new bank account in Hong Kong.

CEO scam: pretending to be senior management officers of victim companies, fraudsters send fictitious emails to staff in the finance department, seeking the transfer of funds to overseas business partners or to make business investments on an urgent basis. The finance department staff are requested to transfer funds to a bank account in Hong Kong.

The misspelt domain name.

This is where the attacker will own the misspelt domain name, which closely resembles your domain, but is usually off by one character.

From: "CEO Name" <ceo.email.address@examplle.com>

In this case, anti-spoofing will not identify these messages. Instead, regular expressions can be applied to the From: line in order to identify the misspellings. Below are two regular expressions for a domain called example.com. These expressions are useful not just for these scams, but phishing in general. For efficiency, the regexes assume the first character is never changed, which is a fairly safe assumption because otherwise the domain would not look similar enough. Simply copy the pattern and apply to your own domain(s).

Character Substitution Regex

This expression identifies a domain where one of the letters in the domain has been replaced. It works by checking each letter for substitution (for instance [^m] means "any letter but m").

@e(?:[^x]ample|x[^a]mple|xa[^m]ple|xam[^p]le|xamp[^l]e|xampl[^e])\.com

 

Digitpol is available 24/7.

Phone HK: +85253360558 / +85239733884 or Europe: +31639220420

Email: info@digitpol.com