Online fraud identification

← All our services

Online fraud identification

Check whether a profile, online merchant, email, contact or platform truly matches what it claims to be. The service covers the online fraud situations flagged by the NCSC: phishing attempts, fake merchant sites, suspicious profiles, identity theft, romance scams and fraud linked to online purchases or classified ads.

What this service can offer

  • Check whether profile photos have been stolen or repurposed (reverse image search).
  • Analyse the consistency of a suspicious profile: account age, activity, narrative inconsistencies, linguistic markers.
  • Look up a fraudster's digital footprint in public databases (email address, phone number, alias).
  • Examine the headers of a phishing email to identify the actual sending server and manipulation markers.
  • Cross-reference existing reports on victim forums, public fraud databases and official lists (FINMA, NCSC).
  • Analyse a fake merchant site or suspicious advert (marketplace, classified ads): WHOIS, domain age, hosting provider, mimicry of a legitimate company.
  • Trace infrastructure: related domains, other sites operated by the same actor, suspicious redirects.
  • Identify markers of phishing, romance scam, advance-fee fraud, CEO fraud, sextortion and fake tech support.

What the service cannot guarantee

  • Precisely identify the natural person behind the account or site.
  • Confirm an identity with absolute certainty when public traces are insufficient.
  • Access private data that is not public (bank account, private communications, locked accounts).
  • Recover money lost or block a transfer already made to a third party.
  • Guarantee that no residual risk remains after the analysis.

Process applied

1

Definition of context and receipt of a written mandate defining the exact scope of the investigation.

2

Collection of materials provided by the client: screenshots, emails, URLs, identifiers, dates.

3

Methodical OSINT analysis: reverse image search, WHOIS, public database cross-checks.

4

Timestamped documentation of every lead found, with cited sources.

5

Final report with timeline, sources, nuanced conclusion in plain language.