YOU MAY SHARE THIS PUBLIC DOCUMENT
SSS was appointed one week after the theft of products valued at R740,000.00 from Stoncor Africa.
Specialised Security Services receive numerous similar cases, and we would like to forewarn
legitimate companies that they are also targeted.
Stoncor Africa has confirmed with Harmony Gold Mine that the order numbers on the fraudulent invoices do not exist in their system. This confirmation validates the fraudulent nature of these orders.
However, the payment was never received after the product was released, and the merchandise is still missing.
FRAUDULENT INVOICES:
TRUCK TAKING THE PRODUCT FROM THE PREMISES OF STONCOR AFRICA:
KEY DETAILS OF THE INVESTIGATION INCLUDE:
Fraudulent Harmony Gold invoices were produced at Stoncor Africa.
Without proper due diligence, the products were handed out and collected by members of the involved syndicate.
A vehicle registration number and the name of a possible suspect were provided to the SSS investigator.
Further analysis of the fraudulent invoices and forensic investigations led to additional information on addresses and potential suspects.
Follow-ups were conducted on all identified addresses and suspects. However, the addresses were found to be false, and none of the suspects identified were legitimate.
Efforts are ongoing to gather more information from sources and contacts.
A SAPS case has been opened with the case number SAPS RABIE RIDGE CAS 203 /7/2024.
This investigation is ongoing.
ANYONE WITH RELEVANT INFORMATION MUST CONTACT OUR SSS SPECIALIST INVESTIGATOR:
Mr Cecil Benadé
Contact number: +27 79 527 8886
Email address: cecilb@mikebolhuis.co.za
ALL INFORMATION RECEIVED WILL BE TREATED IN THE STRICTEST CONFIDENTIALITY AND EVERY IDENTITY WILL BE PROTECTED.
MODUS OPERANDI FOR CRIMINALS WHO INFILTRATE LEGITIMATE BUSINESSES:
Scammers often use a range of sophisticated techniques to infiltrate companies and exploit their resources for fraud and theft.
Phishing attacks:
Scammers send deceptive emails or messages to company employees, tricking them into revealing sensitive information such as login credentials, email addresses, or other personal details.
Once they gain access, they can use this information to create fraudulent invoices or manipulate internal communications.
Social engineering:
Scammers learn about a company's operations and key personnel by gathering information from public sources or through direct interaction.
They might use this information to impersonate legitimate employees or contractors, making their fraudulent activities appear credible.
Hacking and data breaches:
Scammers may use hacking techniques to breach a company’s IT systems and steal sensitive data, including email addresses, financial records, and invoice templates.
Once inside, they can manipulate or create fraudulent documents to deceive the company.
Spoofing:
By spoofing email addresses or domains, scammers can send emails that appear to come from legitimate sources within the company.
This can trick employees into processing fraudulent orders or providing sensitive information.
Exploiting weak security measures:
Companies with inadequate security protocols or outdated systems are more vulnerable to fraud.
Scammers may exploit these weaknesses to gain unauthorised company data and systems access.
Impersonation:
Scammers might directly contact a company, posing as a trusted supplier or client, and request changes to payment details or orders.
By successfully impersonating a known contact, they can divert funds or products to their own accounts.
Using compromised email accounts:
If a scammer gains access to an employee's email account (through phishing or other means), they can send or receive fraudulent communications using the compromised account, including issuing fake invoices or redirecting payments.
Invoice manipulation:
Scammers may create fake invoices that mimic the company’s legitimate invoices.
They can use compromised email addresses to send these invoices to the company’s accounts department, often providing convincing details to ensure the fraud goes unnoticed.
Internal collusion:
In some cases, scammers may collaborate with a company insider who provides access to internal systems and sensitive information or facilitates the execution of the fraud.
Forgeries:
Scammers might forge official documents or invoices using stolen company logos, letterheads, and other identifying features to make their fraudulent documents look authentic.
Preventative measures for companies include robust cybersecurity practices, regular employee training
on recognising phishing and social engineering tactics, stringent verification processes for financial transactions, and continuous monitoring of system access and activities.
Specialised Security Services invites the public to the Mike Bolhuis Daily Projects WhatsApp Group.
This group is important in delivering insights into the latest crime trends, awareness, warnings and the exposure of criminals.
HOW TO JOIN THE MIKE BOLHUIS DAILY PROJECTS WHATSAPP GROUP:
Follow the link to our WhatsApp group:
"JOIN" to ensure you never miss our daily updates.
You will receive automatic notifications as soon as a new project is posted.
CONTACT MR MIKE BOLHUIS FOR SAFETY AND SECURITY MEASURES, PROTECTION, OR AN INVESTIGATION IF NEEDED.
Regards,
Mike Bolhuis
Specialist Investigators into
Serious Violent, Serious Economic Crimes & Serious Cybercrimes
PSIRA Reg. 1590364/421949
Mobile: +27 82 447 6116
E-mail: mike@mikebolhuis.co.za
Fax: 086 585 4924
Follow us on Facebook to view our projects -
EXTREMELY IMPORTANT: All potential clients need to be aware that owing to the nature of our work as specialist investigators there are people who have been caught on the wrong side of the law - who are trying to discredit me - Mike Bolhuis and my organisation Specialised Security Services - to get themselves off the hook. This retaliation happens on social media and creates doubt about our integrity and ability. Doubt created on social media platforms is both unwarranted and untrue. We strongly recommend that you make up your minds concerning me and our organisation only after considering all the factual information - to the exclusion of hearsay and assumptions. Furthermore, you are welcome to address your concerns directly with me should you still be unsatisfied with your conclusions. While the internet provides a lot of valuable information, it is also a platform that distributes a lot of false information. The distribution of false information, fake news, slander and hate speech constitutes a crime that can be prosecuted by law. Your own research discretion and discernment are imperative when choosing what and what not to believe.
STANDARD RULES APPLY: Upon appointment, we require a formal mandate with detailed instructions. Please take note that should you not make use of our services – you may not under any circumstance use my name or the name of my organisation as a means to achieve whatever end.
POPI ACT 4 of 2013 South Africa: Mike Bolhuis' "Specialised Security Services" falls under Section 6 of the act. Read more here: https://mikebh.link/fntdpv
SSS TASK TEAM:
Copyright © 2015- PRESENT | Mike Bolhuis Specialised Security Services | All rights reserved.
Our mailing address is:
Mike Bolhuis Specialised Security Services
PO Box 15075 Lynn East
Pretoria, Gauteng 0039
South Africa
Add us to your address book
THIS PUBLIC DOCUMENT WAS INTENDED TO BE SHARED, PLEASE DO SO.
Comments