🔍

⚠️ ZOOM LIMIT REACHED

Hai raggiunto il limite massimo di zoom.
Per ingrandire gli elementi, usa la LENTE-MOUSE:
passa il cursore sopra qualsiasi elemento per attivare l'ingrandimento lenticolare!

Scorri per vedere altro
Track Name
Video
Educational
😵‍💫
PERSEO
😵‍💫
Perseo con la testa di Medusa
Financial Defense Shield logo
BE CAREFUL!
SOYEZ PRUDENTS!
SEI VORSICHTIG!
Tu sei il CavalloTROJANdei truffatori
You are thescammers'TROJANHorse
Tu es leChevalde TROIEdes escrots.
Du bist dasTROJANISCHEPferd derBetrüger
BE CAREFUL!
SOYEZ PRUDENTS!
SEI VORSICHTIG!
Medusa di Caravaggio - Ipnosi Bancaria
Medusa Sinistra - Ipnosi
Medusa Destra - Ipnosi
Medusa Centrale - Ipnosi

Diventa immune alle trappole digitali

Resisti alla suggestione a distanza.

Respingi ogni ipnosi di Medusa

Riconosci le manipolazioni.

Proteggi il tuo denaro.

💸 Stolen -0$
1😐
2😐
3😐
4😐
5😐
6😐
7😐
8😐
9😐
10😐
11
💸 Stolen -0$
1😐
2😐
3😐
4😐
5😐
6😐
7😐
8😐
9😐
10😐
11
📜 EUROPEAN BANK DATABASE - SCROLL TO EXPLORE 📜
⬇️
🤝 COLLABORATE!
HELP US! 🤝
Help us complete the Bank Database! Write here the "complaint service" address of the Bank you don't see in the icons on this page!
🪙 🪙 🪙 🪙 🪙 🪙 🪙 🪙
COMPLAINTS
😭
BANK
🪙 🪙 🪙 🪙 🪙 🪙 🪙 🪙
BANK
😭
COMPLAINTS
BANK
BANK
10
9
8
7
6
5
4
3
2
1
10
9
8
7
6
5
4
3
2
1
Medusa di Caravaggio - Scudo cerimoniale, olio su tela applicata a scudo convesso, 1597 - Galleria degli Uffizi, Firenze
Medusa di Caravaggio - Scudo convesso degli Uffizi
Medusa di Caravaggio su scudo convesso, Galleria degli Uffizi Perseo Vincitore
Benvenuto Cellini
Loggia dei Lanzi, Firenze

⚔ Perseo, gli Argonauti e la Difesa Psicologica

Nella mitologia greca, Perseo sconfisse Medusa usando lo scudo-specchio di Atena — non la forza bruta, ma la conoscenza e la preparazione. Gli Argonauti, guidati da Giasone sulla nave Argo, superarono prove mortali grazie all'intelligenza collettiva e al coraggio condiviso. Questi archetipi eroici incarnano la stessa strategia antifrode che proponiamo: informazione, prevenzione, azione collettiva contro i moderni truffatori-Medusa.

Psychological defense: documents and presentations

↓ Vai alla Guida Antifrode completa
Practical anti-fraud guide

Common online financial scams and the most useful defense before you pay

People are rarely trapped by a single trick. In most cases the scammer combines urgency, fake authority and an apparently convenient offer. The real defense is to slow the process down, verify every detail outside the scammer's channel and refuse to move money until the basic checks are complete.

Browse the guide by theme - Secret Chamber

Use these thematic buttons to jump directly to the risk area you want to study, then return to the summary
from each section.

Warning: these "secret rooms" expose scam tactics.
Follow the guided sequence and verify every move before opening links or actions.

Anteprima del database internazionale delle 189 autorita finanziarie — 189 Financial Authorities worldwide
Indexed external directory

Open the indexed external directory with direct landing pages for financial authorities worldwide, already discoverable through Google.

Contact or verify through the global Authority directory

🌍 189 Financial Authorities — Flag Alphabet

Click any flag to see the financial authority, fraud report link and contact details for that country.

⚠️ Report Suspect Entity

Verification request to Financial Authority

⚠️ Critical data: will be forwarded to the Authority and stored in the public Warning List.

ℹ️ Data will be sent to your email so you can contact the Authority.
A copy goes to the administrator for the public Warning List.

×

🛡️ Practical Legal Guide – Verifying a Financial Firm in 5 Steps

Authority:

Scheda Medusa: archetipo storico e difesa antifrode

Il banner verticale di Medusa introduce la stessa metafora visiva sviluppata qui: la paura che paralizza, il riflesso che smaschera l'inganno e la conoscenza come scudo che restituisce azione.

Perseo con la testa di Medusa, scultura di Benvenuto Cellini
🛡 Come Perseo vinse Medusa con lo scudo della conoscenza, così tu puoi vincere le truffe finanziarie con l'informazione e la prevenzione.

🖼 Medusa di Caravaggio (1597)

1597, olio su tela montata su scudo convesso in legno di fico. Michelangelo Merisi da Caravaggio dipinse questo capolavoro come dono per Ferdinando I de' Medici, Granduca di Toscana. L'opera cattura l'istante in cui Medusa, decapitata da Perseo, vede il proprio riflesso nello scudo: l'orrore, il grido, i serpenti ancora vivi. Caravaggio rovescia il mito — il mostro diventa vittima del proprio inganno.

La modernità del messaggio è straordinaria: chi usa la paura come arma finisce per esserne distrutto. I truffatori-Medusa di oggi — phishing, spoofing, social engineering — usano le stesse leve psicologiche: paralisi, confusione, terrore. Ma come Perseo, chi conosce il trucco può difendersi.

🏛 L'originale rinascimentale è conservato nella Galleria degli Uffizi, Firenze, Italia. Visita la scheda ufficiale dell'opera → uffizi.it

⚔ Perseo Vincitore di Benvenuto Cellini (1545-1554)

1545–1554, fusione in bronzo, altezza 320 cm. Nella parte superiore di questa pagina, sopra il banner centrale, l'immagine del Perseo di Cellini rappresenta l'archetipo della rivincita: l'eroe che sconfigge il mostro usando intelligenza, preparazione e lo scudo-specchio di Atena.

Benvenuto Cellini, orafo, scultore e scrittore fiorentino del Rinascimento, creò questa monumentale statua per Cosimo I de' Medici. L'opera rappresenta Perseo in piedi sul corpo decapitato di Medusa, brandendo la testa mozzata — simbolo universale del trionfo della ragione sulla manipolazione.

La fusione del bronzo fu un'impresa leggendaria: Cellini racconta nella sua autobiografia di aver rischiato la vita quando il metallo si solidificò prematuramente, costringendolo a gettare nel crogiolo piatti e posate per completare l'opera. Il risultato è uno dei capolavori assoluti della scultura mondiale.

🏛 La statua originale è esposta nella Loggia dei Lanzi, Piazza della Signoria, Firenze. Una copia in bronzo si trova nel cortile di Palazzo Vecchio.

🇮🇹 Italy — Forze di Polizia e canali ufficiali di denuncia

Country: Italy · work in progress

Questa sezione autonoma collega direttamente alle pagine istituzionali per denunciare crimini informatici, criminalita economica e frodi in Italia.

Video Avatar: educational and motivational short clips

To improve performance, heavy media are now loaded from a dedicated external hub (Canvas / Google Drive / OneDrive links) instead of being embedded in this page.

🧠 Mental Health Impact — Psychological Support for Fraud Victims

Financial fraud can cause trauma comparable to physical aggression. These resources provide psychological first aid, recovery programs and helplines for victims and their families.

🇺🇸 AARP — Fraud Watch Network

Specialized program on the psychological impact of financial scams on the elderly. Offers therapeutic support, emotional recovery resources and peer-to-peer groups to combat shame and isolation after fraud.

🧠 Mental Health Impact

📞 Emergency Helplines

If you or someone you know is experiencing emotional distress after financial fraud, contact these free confidential services: Telefono Amico (IT: 02 2327 2327), Samaritans (UK: 116 123), SAMHSA (US: 1-800-662-4357).

📞 Telefono Amico Italia

💔 Post-Fraud PTSD & Recovery

Victims of financial fraud can develop clinical depression (25% of cases), persistent anxiety, paralysing shame and social isolation. Early recognition and professional support are essential for recovery.

💔 Mind UK — PTSD Guide

👨‍👩‍👧 Family Support & Elder Protection

Financial exploitation of the elderly often stays hidden due to shame. Families should watch for sudden secrecy about finances, unexplained transfers, anxiety around phone calls and unusual urgency about money.

👨‍👩‍👧 APA — Elder Psychology
$1.7B lost yearly by elderly in the US alone
60% of victims don't report due to shame
25% develop clinical depression after fraud
higher suicide risk in vulnerable elderly
Theme

Social pressure and emotional traps

Keywords: job scam, romance scam, fake charity

These frauds work by manipulating trust, urgency, compassion or personal vulnerability before the victim has time to verify the story.

Job scam and fake remote work

A job scam promises easy money for simple actions: liking content, filling in forms, forwarding bank transfers, renting out your account or buying materials that will allegedly be refunded later. The target is often hooked with a small initial payment to make the scheme look real.

The safest rule is to reject any offer where the worker must send money first, use a personal account for third parties or hand over documents before a verifiable interview. A real employer does not turn the candidate into a financial intermediary.

Common warning signs often include requests to pay before hiring, instructions to use your personal bank account for third parties, pressure to move money through crypto or instant transfers and interview processes that never lead to a verifiable employer identity. A legitimate recruiter should be able to identify the employer clearly and explain why any payment or document is needed.

  • Upfront payment for training, devices or onboarding.
  • Request to receive and forward transfers through your own account.
  • Only chat-based contact with no verifiable company identity.
  • Request for sensitive ID documents before a verifiable interview, or through chat-only non-corporate channels.

If the offer mentions investments, wallets, recovery, financial onboarding or transfers to a named beneficiary, use the Authority check before you pay. If the transfer involved an Italian bank and a later refund is disputed, review the ABF section as a possible next step.

Romance scam, social engineering and fake emergencies

Relationship scams build trust for weeks or months. Once the emotional bond is strong, the emergency appears: illness, travel trouble, customs problems, a shared investment, a blocked wallet or an urgent loan. At that point the victim is no longer evaluating money, but the relationship.

A healthy response is to add an outside check every time: talk to someone who is not emotionally involved, verify photos and identity and keep one simple rule. Never transfer money to a person you have never met in a verifiable way.

Romance scam often follows a repeatable script: rapid emotional intensity, excuses to avoid in-person verification, a private crisis that demands secrecy and finally a request for money through bank transfer, gift cards, top-up codes or crypto wallets. The manipulation often works by isolating the victim from independent verification.

  • The relationship becomes unusually intense in a very short time.
  • Repeated reasons are given to avoid a live and verifiable meeting.
  • An emergency appears and money is requested with unusual urgency or secrecy.
  • You are discouraged from involving family, friends or your bank.

If shame, panic or emotional confusion make it harder to assess the situation clearly, stop the payment decision and use an outside check immediately. The mental health support section helps frame the trauma response, while the Authority check helps you verify names, websites and payment requests before further losses.

Fake charity and emotional donation fraud

Fraudulent charity campaigns appear after wars, disasters, medical emergencies or public tragedies. They use moving images, copied logos and dramatic appeals to push donors to act quickly before checking who will really receive the money.

The safest behavior is to donate only through official websites you reach independently, checking legal identity, bank details and public references. If the request insists on instant transfers to personal accounts, it is a warning, not a cause.

Deepfake voice scam and cloned family emergency calls

Voice cloning lets criminals simulate a relative, a manager or a trusted colleague well enough to trigger panic. The call sounds emotional, rushed and specific. The victim is pushed to send money fast before asking questions that would expose the deception.

Create a verification habit before emergencies happen: use a family code word, call back on a known number and confirm the request through a second channel. The more urgent the story sounds, the more disciplined the verification must become.

Theme

Authority abuse and impersonation

Keywords: phishing, fake banker, tax refund scam

These schemes borrow the tone of banks, lawyers, public bodies and support desks to make unsafe actions look official and urgent.

Phishing, bank spoofing and altered IBAN fraud

Phishing does not live in email alone. It arrives by SMS, phone call, search result, fake certified message and even notes that appear to come from a bank or lawyer. The goal is always the same: make you click, reveal codes or pay to manipulated bank details.

The strongest defense is to ignore the suspicious link and open the website manually instead. Then call the official number found on real documents and compare the IBAN with an independent source before authorising any payment.

Fake bank officer and security-call fraud

In this scam the caller sounds professional, knows basic personal details and claims to be protecting your account from fraud. The conversation is designed to create trust while pushing you to reveal codes, approve a device, move funds to a so-called safe account or install a security app.

The right defense is to end the call and contact your bank yourself using the number printed on official documents or the banking app. A real bank employee does not need you to transfer money away from your own account to keep it safe.

Real case • Roma Today

7 October 2025

SMS plus fake bank call: twelve transfers to Lithuania

Roma Today reported the case of a Roman customer tricked by an SMS followed by a fake security call, with twelve transfers sent to a Lithuanian bank in just over two hours.

The ABF then recognised a partial refund, noting that the bank should have detected the anomaly and activated stronger monitoring and automatic blocking.

Read the Roma Today article

Fake lawyer scam and invented legal pressure

This fraud uses legal language, stamps, copied signatures and urgent deadlines to scare the victim into paying. The message may claim to come from a law firm handling debt, copyright, inheritance, recovery or urgent settlement activity.

The correct response is to verify the lawyer independently through an official register or a number you find yourself, never through the contact details included in the threatening message. Real legal communications do not collapse when you ask for verification.

Tax refund scam and fake public authority notices

This scam claims you are entitled to a refund or that a tax irregularity must be fixed immediately. The message imitates an official authority, uses formal language and includes a link or attachment designed to capture banking data, credentials or identity documents.

The best defense is to ignore the embedded link and access the public service portal directly from a trusted bookmark or manual search. Official agencies do not need urgency and secrecy to return money that is legitimately yours.

Fake technical support and remote access fraud

The fake support scam appears through popups, phone calls or messages warning about viruses, blocked banking apps or compromised devices. The attacker tries to convince the victim to install remote control software or reveal one-time codes during the so-called repair.

A real operator does not need to scare you into immediate access. Close the popup, disconnect the call and contact the official support number yourself from a trusted source. If someone asks for remote control while you are logged into banking or email, stop instantly.

WhatsApp Security Pills

Vote for the dancer on WhatsApp? It may be a trap.

A recent WhatsApp scam asks you to vote for a dancer or a girl in a contest. The message looks harmless and often appears to come from a trusted contact, but the link can capture data from your smartphone and then use the compromised account to send money requests to your contacts.

  • Do not open the voting link and do not enter codes, names or login data on pages reached from the chat.
  • If you clicked, warn your contacts immediately, review linked devices and secure the account before the scam spreads further.
  • Treat every request to vote, help a dancer or support a contest through a rushed link as suspicious, especially if it is followed by requests for money or verification codes.

How to query financial authorities before you trust a site

When a website offers trading, crypto, investments, credit, recovery or financial advice, the most prudent move is to contact the competent authority directly and ask for written confirmation before you pay, register or continue the conversation.

  • Ask whether the entity really exists and whether it is authorised to offer financial services in your country of residence.
  • Ask whether the website or domain name you found is officially linked to that entity, or whether it may be a clone or an abusive use of identity.
  • Ask for the official public telephone number of the entity you want to verify, so you can call back using an independent contact.
  • Ask whether the person who contacted you is registered in the official register of financial promoters or authorised advisers allowed to provide investment advice to the public.
  • Ask whether warnings, sanctions or public notices already exist regarding that name, website, phone number or offer.

Keep the authority reply, the web address, the phone number used by the caller and the name presented by the contact in the same file. If the answers are incomplete, contradictory or only verbal, do not move money and do not send documents yet.

Ask 190 Financial Authorities for confirmation
Financial defense shield icon

You$ - Your Financial Shield

Financial defense shield icon

This operating card condenses a simple self-defense routine: before you trust a financial website, broker, crypto platform or recovery service, verify the country, the competent authority and the real identity of the operator.

  1. Open the Financial Authorities Database (190) and search for the country named by the operator or shown on the website as its registered location.
  2. Identify the competent financial authority for that country: central bank, supervisory authority or market regulator.
  3. Send a short written request to the authority, or use the official Avv. Stanca site, and ask for confirmation before paying, registering or sending documents.

Simple message you can copy and adapt

  • Tell me whether this company really exists as a financial or insurance firm.
  • Tell me whether it is authorised to offer financial services in my country of residence.
  • Tell me what its official website address is.
  • Tell me what its official email address is.
  • Please note any abusive financial activity or possible cloning of a legitimate firm's identity.
  • You may reply to me by email at the address I provide, and I may or may not require further legal assistance.

This internal card is useful for deposits, wallet transfers, fake trading offers, recovery proposals and every situation where the other side asks you to act with urgency.

Open the Financial Authorities Database (190)

Arbitro Bancario Finanziario: out-of-court dispute resolution

The Arbitro Bancario Finanziario is an out-of-court system for resolving disputes between customers and banks or other financial intermediaries. It is useful when you need to challenge unauthorised transfers, abnormal account operations, refund refusals or conduct that may not have met the required banking diligence.

Before going to court, this channel can help structure the dispute with documents, chronology and concrete objections. It is especially relevant when the issue concerns anomalous transactions, missing monitoring, delayed blocking or disputed payment operations.

Open the ABF official website Watch the Bank of Italy explainer video
Theme

Investments, credit and recovery traps

Keywords: trading scam, crypto scam, loan scam

These schemes promise profit, education, rescue or easy credit, but their real objective is always an upfront payment or loss of control over funds.

Online trading, fake brokers and miracle investments

Many financial scams start with aggressive ads on social platforms, search engines or private chats. The fraudster displays a polished platform, a fake adviser and steady profits. As soon as the victim asks to withdraw, invented taxes, technical blocks or new deposit requests appear.

The concrete defense is to verify licence, registered office, independent contact details and outside reputation before sending anything. If someone pushes you to deposit immediately so you do not miss the opportunity, the urgency itself is already a warning.

Crypto scam, fake wallets and copied exchanges

Crypto fraud often starts with a fake tutor, a cloned exchange, a private group or a recovery promise. The victim is pushed to move funds to a wallet they do not control or to authorise a temporary transfer that is supposed to unlock profits.

The best defense is simple: never send coins to a wallet shared only in chat and verify the exchange URL character by character. If you cannot confirm the destination independently on a trusted device, do not move anything.

Investment academy scam and paid mentorship traps

These scams imitate educational programs, trading academies or elite investor communities. The victim is first sold a course, then a premium signal group, then a managed opportunity that supposedly works only if more money is deposited quickly.

A useful defense is to separate education from custody of funds. You can study finance without giving strangers access to your wallet, exchange account or capital. When learning and money transfer are tied together, caution should rise immediately.

Recovery room, fake fund recovery and double victimisation

After the first loss, fake investigators, improvised legal offices, crypto experts or invented associations appear and promise to recover everything in a few days. They request an advance for taxes, notarisation, unlock wallets or fictional international procedures.

If you have already been scammed, preserve evidence, block the contact channels and speak only with verifiable counterparts. A real recovery path does not rely on pressure in chat and does not guarantee impossible outcomes. The first defense here is not to pay a second time.

Loan scam and fake easy-credit approval

Loan scams target people who need quick liquidity. The fraudster promises guaranteed approval, no checks or instant release of funds, then asks for upfront fees, insurance costs, notarisation or verification payments before the money can supposedly be transferred.

A reliable lender deducts legitimate costs transparently or documents them through formal contracts, not urgent chat pressure. If credit is promised to everyone but money must be sent first, the offer is almost certainly a trap.

Pyramid scheme and chain letter fraud (Catena di Sant'Antonio)

A pyramid scheme disguises itself as a business opportunity, a solidarity circle, a gift exchange or a mutual aid group. Each participant must recruit new members and contribute money that flows upward. Early joiners may receive a payout, which makes the system look real, but the structure is mathematically unsustainable: it requires an exponentially growing number of recruits, and when recruitment slows the entire chain collapses, leaving the vast majority with a loss.

Modern variants appear as social media challenges, WhatsApp or Telegram groups, crypto staking circles or gifting tables. The language avoids the word pyramid and instead uses community, rotation, solidarity or multiplication. The constant element is always the same: your return depends on convincing others to pay in after you.

The clearest warning sign is that the income does not come from a product or service sold to an external market, but exclusively from new participants' contributions. In many countries, including Italy (Law 173/2005) and across the EU, organizing or promoting a pyramid scheme is a criminal offence. If an offer requires you to pay to join and then earn mainly by recruiting others, it is a pyramid — regardless of the name it uses.

WhatsApp Security Pills

How can you protect your WhatsApp account?

To secure your WhatsApp account, activate two-step verification from Settings, choose a 6-digit PIN, add a recovery email and lock the app with fingerprint or Face ID. Then protect sensitive chats with chat lock and a secret code.

  • Enable two-step verification from Settings > Account > Two-step verification > Turn on, then set a 6-digit PIN and a recovery email.
  • Activate app lock with fingerprint or Face ID from Privacy so nobody can open WhatsApp if they get your phone.
  • Use chat lock to hide specific chats: press and hold the chat, open the menu and activate the lock.
  • Add a secret code for locked chats to hide them further and reduce exposure if someone inspects the app.
Theme

Shopping, payments and transfer fraud

Keywords: marketplace fraud, invoice scam, QR code scam

These frauds target everyday purchases, invoices, bookings and transfers, usually by moving the victim outside a trusted payment flow.

Fake products, cloned shops and unbelievable offers

Clone websites sell phones, cars, appliances, tickets or luxury goods at unrealistic prices. They copy famous logos, generic terms and convincing photos, but behind the surface the goal is to collect payment without delivering anything or to ship something completely different.

Before buying, check the domain, company data, real address, return policy and independent reviews. If the only accepted method is a transfer to an unknown IBAN, stop the purchase. No discount is worth that risk.

Marketplace fraud and fake buyer protection links

Marketplace fraud affects both sellers and buyers. A fake buyer sends a payment link outside the platform, or a fake seller requests a deposit to reserve the item. The conversation feels normal until the victim leaves the protected system and enters a cloned page.

Stay inside the marketplace chat, payment flow and shipping tools whenever possible. The moment the other party tries to move the deal to an external link, courier shortcut or instant refund page, stop and re-evaluate the entire transaction.

Parcel scam and fake delivery problems

Parcel scams exploit curiosity and routine. A text says your shipment is blocked, customs are unpaid or an address must be confirmed. The fee looks tiny, but the real goal is to steal card data, credentials or identity details through a fake courier page.

The practical defense is to track deliveries only from the official courier app or website that you open directly. If you were not expecting a parcel, or if the message asks for urgent payment through an unfamiliar link, treat it as suspicious from the start.

QR code scam and hidden payment redirection

QR code scams work because people trust visual shortcuts. A sticker can replace a real payment code at a parking meter, on a poster, in a restaurant or inside a fake invoice. One scan is enough to open a malicious page or to redirect payment to a different beneficiary.

Before confirming anything, check the destination shown after the scan, inspect the physical code for tampering and prefer typing known addresses manually when the context involves banking or account access. A QR code is a shortcut, not a proof of legitimacy.

Invoice scam and payment redirection fraud

In an invoice scam the victim receives a bill that looks routine: same supplier name, same graphics, similar email thread. The crucial change is hidden in the payment details, where the bank account is replaced so the money reaches the attacker.

A strong defense is to treat every new invoice template, account change or last-minute correction as a separate verification event. Compare the banking details with older records and confirm them by phone with a trusted contact before paying.

Urgent transfer scam and fake supplier IBAN

This fraud targets families and businesses through altered invoices, fake lawyer emails or urgent messages that appear to come from a manager. One changed IBAN is enough to redirect a large payment before anyone notices the difference.

The correct habit is to confirm every new bank detail by voice, using a phone number you already know and never the one written in the suspicious email. A one-minute callback can save an entire transfer.

Gift card scam and irreversible code payments

Gift card fraud appears when a scammer pretends to be a company, tax office, manager or family member and asks for urgent payment through prepaid cards. The method is chosen because the codes can be redeemed quickly and are difficult to recover once shared.

The best rule is absolute: no legitimate institution settles debts, fines, security checks or emergency help through gift card codes. The moment that request appears, stop the conversation and verify the story with an independent contact.

Rental scam and fake property listings

Rental scams present attractive apartments, short-term stays or holiday homes at persuasive prices. The fraudster claims strong demand and asks for a deposit before any real viewing, often hiding behind excuses about travel, keys, platform issues or legal urgency.

Never transfer a deposit for a property you cannot verify through a real viewing, a trusted platform or documented ownership checks. A home can be urgent, but your payment should never outrun your verification.

Theme

Identity and account control

Keywords: SIM swap, account takeover, identity theft

These risks aim to seize access, intercept verification or harvest documents that later unlock banking, credit and impersonation fraud.

SIM swap and hijacked verification codes

SIM swap fraud begins when criminals collect enough personal data to convince a phone operator to move your number onto another card. Once they control the line, they intercept one-time passwords and use them to enter banking, email or exchange accounts.

If your phone suddenly loses signal without explanation, react immediately: contact your operator from another line, block sensitive accounts and change passwords from a secure device. Activating stronger authentication than SMS reduces the damage dramatically.

Account takeover and chained identity abuse

Account takeover happens when attackers enter one service and then pivot into others: email, banking, shopping platforms and cloud storage. A single compromised mailbox can become the master key for password resets, card fraud and impersonation.

The best defense is layered: unique passwords, an updated password manager, multi-factor authentication and alert review for new logins. When one account shows suspicious activity, treat every linked service as potentially exposed and rotate credentials in sequence.

Identity theft and document harvesting fraud

Identity theft often begins quietly: a fake form, a bogus verification request, a copied login page or an offer that asks for ID cards, selfies and utility bills. Those documents can later be reused for fraudulent accounts, loans, SIM activation or social engineering.

Before uploading any document, ask why it is needed, how it will be stored and whether the request comes from a verified institution. A cautious habit is to share the minimum necessary and to avoid sending sensitive files through ordinary chat whenever possible.

Real case • Roma Today

5 February 2026

Golden Tree: fake bank, fake cards and fake banking app

Operation Golden Tree exposed a fake bank network that looked credible with branded payment cards, offices and even a banking-style app shown to clients.

The lesson is practical: cards, apps and polished language do not prove legitimacy. Before trusting a financial operator, check authorisation, public registers and official warnings through independent channels.

Read the Roma Today article
Theme

Psychological defense and awareness resources

Keywords: psyco-defense, manipulation awareness, fraud psychology

In-depth analyses and educational materials on the psychological mechanisms behind financial fraud: deceptive architectures, emotional manipulation, and defense strategies.

Psychological defense: documents and presentations

Downloadable resources that explore the psychological architecture of financial fraud — how scammers exploit cognitive biases, emotional vulnerability and social pressure — and the concrete strategies to recognize and resist manipulation.

⬆ Download PDF & PPTX from the Psychological Defense section
Final self-defense rule: when a money request is driven by urgency, secrecy or the promise of easy profit, pause the operation for at least thirty minutes and recheck everything through an independent channel. That delay alone blocks many scams better than any software.
Caravaggio Codex ti insegna autodifesadalle pericolose Meduse Truffa del webOgni truffa è una violenza psicologica!
MEDUSA
Advertisement
M E D U S A
Role play anti-truffa

Assumi il ruolo dei predatori occulti

Per pochi istanti osservi il metodo mentale dei truffatori: considerano ogni vittima una preda, non provano pieta e mirano solo a riempire i loro forzieri.

Questo passaggio non invita ad agire come loro. Serve a riconoscere la crudelta di Medusa, smontare la manipolazione e rinforzare la tua difesa psicologica.

  • Osservi il metodo del truffatore, non il punto di vista della vittima.
  • Riconosci freddezza, assenza di pieta e urgenza artificiale.
  • Trasformi lo shock in difesa mentale, spirito critico e disciplina operativa.

🔍 Cerca la tua Banca

Digita per cercare tra le banche disponibili

⚖ Autore & Credenziali

Avv. Marcello STANCA — Avvocato cassazionista, 25 anni di esperienza in diritto bancario, finanziario e tutela dei consumatori.

📄 Curriculum completo dell'autore

Verifica essenziale: questa pagina usa una connessione HTTPS attiva; l'identita editoriale dell'autore e richiamata nella scheda SEO ed e verificabile anche tramite il curriculum pubblico. Per dati sensibili e documenti usa sempre contatti ufficiali e canali indipendenti.