Common Scam Tactics: Fake Emails, Websites and Other Communications

by Clear Junction27 July, 2022Compliance

Here at Clear Junction, we take the safety and security of all of our clients extremely seriously. However, despite our best efforts, scammers and fraudsters around the world still regularly attempt to communicate with our clients, partners and members of the general public. We therefore wanted to make you aware of some of the most common scam tactics used by those claiming to be from Clear Junction.

If any of our clients and partners receive an email, letter, phone call or other form of communication where the sender is claiming to work for Clear Junction, it is vital that you consider the possibility that it might be a scam. We regularly see requests to our clients which use fake Clear Junction email addresses and documents pretending to have originated from us.

COMMON WAYS SCAMMERS WILL COMMUNICATE WITH YOU

Fraudsters and scammers contact their intended victims on behalf of our company using our logo or both fake and real employee names (that may have been taken from LinkedIn or other available sources). In many instances, fraudsters use a lot of detail in their fake documents – be it company branding, FCA logos, document stamps and signatures (which are often just italicised text).

Sometimes scammers will use the Russian language to communicate with an intended victim and in fake documents, people are often told that there is an account in their name that Clear Junction wants to transfer monies to, but before that can happen, they must transfer a fee themselves. Another technique is to set out time limits for payments in order to rush the intended victim in the hope this will increase their chances of successfully duping the recipient.

FAKE CLEAR JUNCTION EMAILS

We will only ever send emails from addresses ending in:

  • @clearjunction.com

We have measures in place to prevent fraudsters spoofing this email address, but they try to get around this by using similar email addresses to make them appear genuine.

We have received reports of fake emails from a variety of addresses and domains, including:

  • department@clearjunction.org
  • support@cjsolutions.help
  • support@clearjunctionbank.com
  • schultz@clearjunction.in
  • support@clearjunction.in
  • slegers@cjsolutions.help
  • clearjunction@ticket-support.net

Clear Junction only communicates with its clients via official channels and we only ever provider business-to-business payment services and solutions. We do not directly serve individuals and, if a person is not a client of ours, we cannot contact them directly. If the email you receive does not end in @clearjunction.com then it is not from us.

FAKE CALLS

Scammers can attempt to pretend Clear Junction is calling you and might even be so sophisticated as to have our company name appear in your called ID. However, you should never give out any personal information following an incoming call and never call these people back using the contact details they have provided.

Ofcom have put together a guide on how to avoid caller ID spoofing which should prove useful.

SOCIAL MEDIA ACCOUNTS

We have social media accounts on Twitter, Facebook and LinkedIn. The addresses for each can be found below:

We will never contact someone who is not our client via social media channels, so if you receive any contact from either Twitter, LinkedIn or Facebook you can be certain it is not from a member of our team.

If you ever have any concerns about any communication you receive, then please contact us via the contact form on our website and we will confirm whether it is from us or not. In addition, we have previously put together a guide on how to stay safe online and there are also instructions on how to file a complaint.

Thank you for taking the time to read through this and do remain vigilant at all times. There is little any of us can do to stop scammers and fraudsters trying their best to dupe us, but by staying strong and remaining vigilant we can try to ensure they are not successful in their attempts.