Some real frauds spotted and stopped

Our solutions stop the fraud before the money leaves the bank. Discover examples of the fraud cases we've successfully prevented globally. These include BEC fraud, social engineering, scams, CEO fraud, fake invoices, account takeover, authorized push payment, internal fraud, and more.

CHF 19,990

Switzerland

Account takeover fraud

The fraudster used a pharming technique, injecting malicious code into the victim’s computer, to acquire a customer’s e-banking credentials. The fraudster was then able to take over the customer’s account to seize a payment of CHF 19,990.

The payment was stopped as a number of factors did not match the customer's profile, including the new beneficiary (both at the customer and bank level), as well as the unusual screen resolution, session browser, and the amount.

CHF 1,000,000

Switzerland

Social engineering

The fraudster impersonated a bank customer and asked the banking employee to order a transaction of CHF 1,000,000. The banking employee was scammed, believed that the fraudster was the customer and validated the transaction.

Although the case involved a new client with little historical data, the payment was blocked because the transaction was unusual at the bank level, and the beneficiary account was also unusual.

EUR 22,114

Netherlands

Social engineering

The customer, a victim of vishing, gave his/her e-banking credentials over the phone to the fraudster posing as an agent. The fraudster then took over their e-banking and transferred EUR 22,114 to an illicit account.

Although the case involved a new customer with little historical data, the AI risk models stopped the fraud because the transaction characteristics were unusual at the bank level, as was the screen resolution.

EUR 33,170

Netherlands

Account takeover fraud

The fraudster impersonated a bank agent and through social engineering persuaded the customer to release his/her e-banking login details. The fraudster took over the customer’s account and made a payment of EUR 33,170 to an account of their own.

The AI risk models identified the transaction as fraudulent and blocked it because the e-banking metrics – e-banking language, browser, screen resolution, etc – did not match the customer’s usual profile.

USD 7,500

Lithuania

Tech support scam

The fraudster impersonated a Microsoft tech support worker and called the victim. Through social engineering, the fraudster managed to obtain enough information about the victim’s e-banking to transfer USD 7,500 to an illicit account.

Vyntra's AI risk models stopped the transaction due to its variables not matching the customer’s profile, noting the unusual currency, operation type, beneficiary account, beneficiary country, account ID, and account type.

GBP 21,000

United Kingdom

Account takeover fraud

A fraudster impersonating a banking agent persuaded a customer to disclose his/her e-banking login details through social engineering, took over the account and attempted a payment of GBP 21,000 to an illicit account.

Vyntra's AI risk models blocked the transaction due to unusual e-banking and transaction variables, including unusual amount, screen resolution, beneficiary institution, beneficiary account, e-banking session language, and currency.

EUR 125,000

Spain

Authorized push payment fraud

Using social engineering techniques, the fraudster convinced the bank customer to transfer EUR 125,000 to an illicit account.

Vyntra's AI risk models stopped the transaction as certain variables did not match the customer’s profile, including the transaction creation day, the beneficiary account, beneficiary country, operation type, order type, and currency.

EUR 170,000

Spain

CEO fraud

The fraudster impersonated the CEO of the account holder’s company and over email convinced the victim to pay EUR 170,000 into an illicit account.

Vyntra's AI risk models stopped the transaction due to unusual variables including the beneficiary account and country, the operation type, order type, and currency.

USD 100,000

Peru

BEC fraud

A company employee fell victim to a business email compromise (BEC) fraud after their business partner’s email account was hacked and the fraudster sent a fake email from this account requesting a payment of USD 100,000 to a beneficiary in Peru.

Vyntra's AI risk models stopped the transaction due to the unusual destination country, payment creation date, and beneficiary account.

USD 170,000

Bulgaria

Investment scam

The victim was advised by a fraudster impersonating a business partner to invest in a fictitious company and ordered a payment of USD 170,000.

Vyntra stopped the transaction due to variables not matching the customer’s profile, including the unusual destination, beneficiary bank, beneficiary account, amount, and currency.

EUR 32,000

Belgium

Scam

A customer fell victim to social engineering and was scammed on the purchase of a car. When the customer tried to pay a non-existent car company, NetGuardians solution stopped the payment before the money had left the bank.

Vyntra blocked the transaction because of a number of unusual variables. These included an unusual beneficiary for the customer and the bank as well as the unusual amount and destination country.

CHF 17,000

Germany

Love scam

The fraudster introduced himself to the victim as an American soldier based in the Middle East. A romantic relationship started and the fraudster convinced the victim to make three transactions to his bank in Germany – of USD 1,500, of EUR 3,000, and one of EUR 11,300.

Vyntra’s AI risk models stopped the first and third transactions, spotting unusual variables including the beneficiary bank account, the destination bank country, the amount and currency.

USD 500,000

Kenya

Internal and channels fraud

Fraudsters manipulated internal accounts in one bank to send money to another bank, who are protected by Vyntra. The fraud was detected in real time and the fraudsters were arrested while attempting to withdraw USD 500,000 (KSh 58 million) from the second bank’s ATMs.

Vyntra’s AI risk models prevented the fraud due to the unusual timing and frequency of ATM withdrawals. After the detection of the fraud scheme by our solution, fraudsters were successfully caught by the police using the cameras installed at the ATM’s.

EUR 3,469

Slovenia

Tech support scam

The fraudster impersonated a Microsoft employee and called the victim to say he had been hacked. The victim gave over control of his computer to the fraudster, who then planted malicious code and was able to transfer a payment of EUR 3,469 from the victim’s bank account to an illicit account in Slovenia.

Vyntra spotted a number of unusual transaction variables and stopped the payment. These included an unusual beneficiary country and account, and unusual currency for the customer, and an unusual beneficiary account for the bank.

CHF 38,000

Italy

Love scam

A customer became romantically involved with a woman over the Internet, unaware she was a fraudster. She told him that her bank account was blocked but he could unblock it if he sent money to her account in Italy. So, he ordered the payment. Vyntra spotted the fraudulent transaction and sent a real-time alert to the bank. The bank called the man setting out its suspicions and the transfer was not completed.

Vyntra software spotted a number of unusual attributes around the transaction, including the unusual amount, beneficiary country, beneficiary account, order type, operation type, and currency.

USD 22,000

Tanzania

Privileged user abuse

An IT administrator with back-end user privileges inflated account balances for an accomplice. The funds were then were ready to be withdrawn from ATMs and mobile banking but we detected the fraud before the money left the bank.

Vyntra’s AI risk models spotted the internal fraud because the privileged user checked the account several times over a number of days, behavior the models picked up as suspicious.

USD 58,000

Philippines

Employee collusion

A rogue employee exploited a misconfiguration of the core-banking system that allowed direct debit transactions to be posted on dormant accounts. The fraudster then attempted to withdraw the funds.

Vyntra’s AI risk models spotted the fraud because the transactions did not match the customers’ historical profiles.

USD 37,000

Singapore

Phishing

The victim received an invitation via a phishing email apparently from the government containing a malicious link. On clicking the link, the fraudsters were able to install a banking Trojan, add a new device, enter two payments and validate them through eBanking.

Vyntra’s AI risk models detected and stopped the payments after spotting variables that didn’t match the victim’s usual profile. These included the unusual screen resolution, beneficiary institution, beneficiary account, amount of transaction and browser.

EUR 18,000

Malaysia

Scam

A bank customer received a call from someone impersonating a Microsoft employee. The fraudster convinced the victim to sign into his eBanking and subsequently took control of the account, initiating a EUR 18’000 payment to an account in Malaysia.

Vyntra’s software detected and stopped the payment because a number of factors didn’t match the customer’s profile including the currency, the beneficiary, operation type and the beneficiary country.

CHF 38,000

Germany

Man in the middle attack

A client wanted to access her eBanking service. After entering her credentials and scanning the QR code, a message appeared in French and German asking her to re-enter her credentials for greater security. After she did so, an error message appeared saying the site was unavailable. This is likely to have been a man in the middle attack in which the second QR code was displayed by a hacker to recover the victim’s account credentials. The fraudster then attempted a payment of CHF 38,000.

Vyntra’s blocked the payment due to unusual session information, including browser language and screen resolution, and transaction details including the unusual amount and beneficiary bank. The system logs showed three sessions that raised suspicions, suggesting the fraudster accessed the victim’s account several times while attempting the payment

USD 130,000

United States

Scam / Fake authorities

A fraudster impersonating tax authorities, phoned the victim to say she needed to pay a large amount of money for undeclared funds. Threatened over the phone and under pressure, she agreed to initiate a transfer of USD 130,000 to an account named by the fraudster.

Vyntra’s stopped the payment because of a number of factors outside the customer’s payment profile. These included the unusual beneficiary account, both for the customer and the bank, and the unusual amount.

USD 850,000

United States

BEC fraud

A bank customer received emails from a fraudster impersonating an existing supplier which instructed him to change the IBAN of the beneficiary for certain transactions as the supplier’s account details had changed. The customer proceeded with 8 payments without any further control or validation, sending a total of USD 850,000 to the fraudster’s IBAN account.

Vyntra’s AI solution stopped the fraudulent payments as there were unusual factors such as unusual beneficiary account and unusual country.

Book a demo

Book a demo

    Vyntra uses your personal information to manage your account and provide services, and with your consent, to send updates on products and services of interest via your preferred contact method.