An investment fraud where returns to earlier investors are paid using capital from new investors rather than from profit earned. Named after Charles Ponzi who became infamous for using the technique in the 1920s.
A business model that recruits members via a promise of payments for enrolling others into the scheme, rather than supplying investments or sale of products. The structure is unsustainable and eventually collapses.
A confidence trick where the victim is convinced to pay money upfront in expectation of receiving something of greater value, which never materializes. Named after Section 419 of the Nigerian Criminal Code.
A form of securities fraud involving artificially inflating the price of a stock through false or misleading statements, then selling the stock at the inflated price before the truth comes out.
Psychological manipulation of people into performing actions or divulging confidential information. Scammers exploit human trust and emotions rather than technical vulnerabilities.
A crime involving scheming to defraud people or entities of money or property using electronic communications such as telephone, internet, or email.
Theft or misappropriation of funds placed in one's trust or belonging to one's employer. Often involves complex accounting fraud to hide the theft over extended periods.
A company without active business operations or significant assets, often used in financial fraud to hide money trails, create false legitimacy, or facilitate tax evasion.
Investment scams that prey upon members of identifiable groups, such as religious communities, ethnic groups, or professional associations. The fraudster exploits the trust and friendship within these groups.
A confidence trick where an established business suddenly ceases operations and disappears with customers' money or cryptocurrency. Common in cryptocurrency exchanges and darknet markets.
An operation using high-pressure sales tactics, often involving cold calls, to sell questionable investments or fraudulent securities to unsuspecting victims.
A technique of fraudulently obtaining private information by disguising as a trustworthy entity in electronic communications. Can lead to identity theft and financial fraud.