Executive Summary

The Organized Crime and Corruption Reporting Project (OCCRP), in collaboration with Swedish Television (SVT) and other media partners, conducted an extensive investigation into large-scale scam operations masquerading as investment firms.

These fraudulent enterprises operate call centers to defraud individuals worldwide, leveraging advanced tactics to appear legitimate. They create fake KYC departments, fabricate legal documentation, and train employees to navigate banking procedures, making it challenging for financial institutions to detect them.

I created this report as a first attempt to outline red flags and recommendations to help banks counteract these threats effectively.

Case Study by Giannakis Papageorgiou: Georgian Call-Center Scammers

Scam Center Investigation Report

Scam Center Investigation Report

Date:11 March 2025

Case Study: Scam Centers in Action

Fraudsters establish fake investment platforms, lure victims with guaranteed returns, and use deepfake videos of celebrities to gain trust.

Hypothetical Example: Fraudsters need first to Exploit Weak Cryptocurrency Regulations

Let’s break it down with a hypothetical example from day one:

Step 1: Setting Up in a Weak Regulated Jurisdiction

A scammer chooses a country with minimal cryptocurrency oversight, such as one that lacks strict Know Your Customer (KYC) or Anti-Money Laundering (AML) requirements. They register a shell company under a fake name, using forged documents. The jurisdiction’s lax regulations mean the company is approved without thorough checks.

Step 2: Creating a Fake Investment Platform

The scammer builds a professional-looking website for a fake cryptocurrency investment platform. They promise high returns on investments in Bitcoin or other cryptocurrencies. To appear legitimate, they:

Step 3: Attracting Victims

The scammer uses aggressive marketing tactics, including:

Step 4: Collecting Funds

Victims deposit funds into the platform, often in cryptocurrency. The scammer ensures the platform looks legitimate by:

Step 5: Laundering the Funds

The scammer begins laundering the stolen funds using cryptocurrency:

  1. Mixers/Tumblers: They send the funds through a cryptocurrency mixer to obscure the transaction trail.
  2. Chain Hopping: They convert the funds into multiple cryptocurrencies (e.g., Bitcoin to Ethereum to Monero).
  3. Privacy Coins: They transfer the funds into privacy-focused cryptocurrencies like Monero, which are harder to trace.
  4. Offshore Exchanges: They cash out the funds through exchanges in jurisdictions with weak AML enforcement.

Step 6: Disappearing

Once the funds are laundered, the scammer shuts down the fake platform and disappears. Victims are left with no way to recover their money, and the scammer has successfully integrated the stolen funds into the financial system.

This example highlights how scammers exploit weak regulations to operate with minimal risk. Strengthening global cooperation and regulatory frameworks is crucial to combat such schemes effectively.

How Scam Centers Exploit Financial Institutions

These scam centers adopt practices to make themselves appear as legitimate financial businesses:

  1. Creating Fake KYC and Compliance Departments: Fraudulent firms hire compliance officers to handle bank interactions and submit legitimate-looking documentation.
  2. Using "Mule" Companies and Fake Investors: They register front companies and seed accounts with small transactions before ramping up activity.
  3. Targeting Small and Medium-Sized Banks: They avoid major banks and target smaller ones with weaker anti-money laundering policies.

Specific Red Flags for Financial Institutions

Recommendations for Financial Institutions