Offshore Outsourcing & Scammer

Blog about offshore outsourcing and scammer in the outsourcing industry

Would you buy something in a shop, where the salesman is hiding himself behind a mask?

Guys with Mask

I think you would leave the shop immediately, because you would be afraid to get betrayed or robbed. Even I think you would try to leave the shop as quickly you can.

Why do you try in this case to make business with people on the Internet, which are not showing their real face? 

Someone, which hides himself, has a reason for it. The reason is mostly that he/she cannot show her face in public, because of their own intentions or because they have already someone betrayed and they are afraid that this one will find them again. 

Signs for a planned scam are:

  • A profile without a picture

  • A profile with a picture which does not show a person

  • A profile with a picture, which can get found by Google image search for a lot of different people.
    Be aware: Google lists the picture in the search result where ever it has been listed. For this the search result will list even the picture at connected friends from the social network pages.

  • A contact with the seller is only over Skype or a phone number possible

  • You have to pay an upfront fee (however this fee is called)

  • Every day or every few hours the same offer gets repeated

  • A provided domain name is registered by using an anonymization service or with incomplete address data
    An example of incomplete address data is:
    Registrant Name: Faisal Ansari
    Registrant Organization: Spectrum Outsourcing
    Registrant Street: Ahmedabad
    Registrant City: Ahmedabad
    Registrant State/Province: Gujarat
    Registrant Postal Code: 000000
    Registrant Country: IN
    Registrant Phone: +91.0000000
    Registrant Phone Ext:
    Registrant Fax:
    Registrant Fax Ext:
    Registry Admin ID:

As more of this possibilities are combined as higher is the risk to run into a scam. People, which are hiding themselves in anonymity have a reason for it. It is already hard to protect your laws by passing borders. It seems impossible if you have nothing than a graphic and a not existing address.

SO DON'T BE STUPID AND MAKE BUSINESS WITH SUCH CREATURES, SCAMMER AND FRAUDSTER. YOU'LL LOSE ONLY YOUR MONEY!!!

 

Facebook group "USA Business Opportunity Marketing" the group of the SCAMMERS

After verifying a few postings in the group "USA Business opportunity Marketing" by using scamadviser.com and the Open Source product Adguard for scam warnings, I got the following message from Johan V. Caem:

Johan V. Caem: I permanently banned you from the group "USA Business Opportunity Marketing" since you mentioned that our members are promoting scams. As long as a company pays it isn't a scam yet. I am the scam controller and I delete anyone who promotes a scam. Leave your colleagues alone, respect eachothers posts. If it is really a scam I permanently delete them, and I have the knowledge to decide over that. Enjoy your marketing experience Rudolf, just not in my group

Rudolf Faix: There is only SCAM!!!

Johan V. Caem: you should do some personal development on your brain Rudolf, like I said I have the knowledge to decide, you try to take it from a website
enjoy your day

It seems for me that Johan V. Caem does not know what is a complaint and a negative report at the web or he is the boss of the scammers there. Google lists a lot of such complaints!

I did not find one real business during the short time I have been visiting the group "USA Business opportunity Marketing".

 

There are companies in North of India who are spamming and collecting upfront

I have been thinking about that something is wrong, when I have seen so many outsourcing offers from India. Now I got it confirmed. A few friends from India have confirmed this information. It seems that this is the reason why I have found real outsourcing companies without any upfront only in Spain, UK and US .
 
The content of the Mail is:
Hi Rudolf
Hope this finds you well.
Very impressed with your work against spammers.We face this issue daily in our contact center here in India. These guys come up to us offering campaigns.
In fact we have had many friends who have paid these guys money before getting these imaginary projects on board and lost a load of money.There are companies up in the North of India who run big organisations which only do this.They have 100-200 agents just spamming and trying to collect upfront money and a lot of guys end up paying.
We should take a stand against this and come up with a clean platform where honest centers are able to pick up some good work.
Regards[I have only removed the name and the city for protecting my informer]

If you followed the other posts abut brokers and scammer, then you know already that each upfront is SCAM and the scammer are coming mostly from low wage countries. In this case you should be very careful by taking a business partner, which hides himself behind pictures of celebrities, symbols, animals etc. As long as you are not able to make a background check of your new business partner you shall not make business with him. The risk for getting scammed in this case is 99.99%.


Don't forget: Everything, which seems to be too good to be true is not true - it is only SCAM!!!
 
A comment from another person, living in India:
I Think, Rudolf Now a days it is almost a Universal Problem .In India also it is working & growing. Trained cheaters are enjoying by cheating others ,For some it is their Bread & Butter, some have base of this act in their Blood & DNA .Thief/cheaters work is successful only, till the owner is not aware or is in sleep .This Problem may grow, People are finding short cuts, boss style work. Due to low salaries, Unemployment, very high expectations,Media, Political leaders & Parties, So many things are contributing for this social evil . Wishers of Society welfare are always present in society by God grace. I wish/I want to see their success in all the Way. 
One more comment from a center owner in India:
I have heard few incidents
i know few centers in delhi (north india) who does have 15-20 odd people who call people for high flying projects
i told u right about my first exp where i lost almost 15000 euros
Step1 E Businesses Pvt Ltd is a big scam
 
     

 

NSA Planted Stuxnet-Type Malware Deep Within Hard Drive Firmware

The U.S. National Security Agency (NSA) may be hiding highly-sophisticated hacking payloads in the firmware of consumer hard drives over the last 15 to 20 years in a campaign, giving the agency the means to eavesdrop on thousands of targets’ computers, according to an analysis by Kaspersky labs and subsequent reports.

 

'EQUATION GROUP' BEHIND THE MALWARE

The team of malicious actors is dubbed the the "Equation Group" by researchers from Moscow-based Kaspersky Lab, and describes them as "probably one of the most sophisticated cyber attack groups in the world," and "the most advanced threat actor we have seen."

The security researchers have documented 500 infections by Equation Group and believes that the actual number of victims likely reaches into the tens of thousands because of a self-destruct mechanism built into the malware.

 

TOP MANUFACTURERS' HARD DRIVES ARE INFECTED

Russian security experts reportedly uncovered state-created spyware hidden in the hard drive firmware of more than dozen of the largest manufacturers brands in the industry, including Samsung, Western Digital, Seagate, Maxtor, Toshiba and Hitachi.

These infected hard drives would have given the cyber criminals persistence on victims' computers and allowed them to set up secret data stores on the machines, which is only accessible to the malicious hackers.

 

UNABLE TO REMOVE THE INFECTION

One of the most sophisticated features of these notorious piece of hacking tools is the ability to infect not just the files stored on a hard drive, but also the firmware controlling the hard drive itself. The malware is hidden deep within hard drives in such a way that it is difficult to detect or remove it.

If present, once the victim insert that infected storage (such as a CD or USB drive) into an internet-connected PC, the malicious code allows hackers to snoop victims' data and map their networks that would otherwise be inaccessible.

Because the malware isn't sitting in regular storage, so it is almost impossible for a victim to get rid of it or even detect it. Such an exploit could survive a complete hard drive wipe, or the re-installation of an operating system, and "exceeds anything we have ever seen before," the company's researchers wrote in a report.

 

MORE ADVANCED TECHNIQUES USED BY EQUATION GROUP

The firm recovered two modules belonging to Equation group, dubbed EquationDrug and GrayFish. Both were used to reprogram hard drives to give the malicious hackers ability to persistently control over a target machine.

GrayFish can install itself into computer's boot record — a software code that loads before the operating system itself — and stores all of its data inside a portion of the operating system known as the registry, where configuration data is normally stored.

 GrayFish architecture - Kaspersky Labs

EquationDrug, on the other hand, was designed to be used on older versions of Windows operating systems, and "some of the plugins were designed originally for use on Windows 95/98/ME" - very old versions of Windows OS that they offer a good indication of the Equation Group's age.

 

TARGETED COUNTRIES AND ORGANISATIONS

The campaign infected tens of thousands of personal computers with one or more of the spying programs in more than 30 countries, with most infections seen in Iran, followed by Russia, Pakistan, Afghanistan, China, Mali, Syria, Yemen and Algeria.

The targets included government and military institutions, telecommunication providers, banks and financial institutions, energy companies, nuclear researchers, mass media organisations, and Islamic activists among others.

Equation Group Victims Map - Kaspersky Labs 

'ANCESTOR' OF STUXNET & FLAME

Security researchers are calling the malware as the "ancestor" of Stuxnet and Flame, the most sophisticated and powerful threats that were specially designed to spy and sabotage ICS and SCADA systems.

 

LINKS TO NSA

Kaspersky declined to publicly name the country or agency behind the spying campaign, but said it was closely linked to Stuxnet — the NSA-led cyberweapon that was used to sabotage the Iran's uranium enrichment facility.

Also, the similarities when combined with previously published NSA hard drive exploits have led many to speculate that the campaign may be part of the NSA program. NSA is the agency responsible for global surveillance program uncovered by Whistleblower Edward Snowden.

Another reason is that most of the infections discovered by the Moscow-based security firm have occurred in countries that are frequently US spying targets, such as China, Iran, Pakistan and Russia.

Meanwhile, Reuters reported sources formerly working with the NSA confirmed the agency was responsible for the attacks and developed espionage techniques on this level.

 

NSA INVOLVEMENT COULD BE RISKY

In case, if NSA found to be involved, the malicious program would have given the NSA unprecedented access to the world's computers, even when the computers are disconnected from the outer web. Computer viruses typically get activated as soon as a device is plugged in, with no further action required, and this because the viruses are stored on a hard drive's firmware.

Back in July, independent security researchers discovered a similar exploit targeting USB firmware — dubbed BadUSB — however there was no indication of the bugs being developed and deployed by Equation Group at this scale.

The issue once again raises the questions about the device manufacturers' complicity in the program. They should take extensive and sustained reverse engineering in order to successfully rewrite a hard drive's firmware.

For its part, the NSA declined to comment on the report.

 

Can you suggest me some how should i proceed with outsourcing my processes?

Today Abdul Rab Rawani asked me at LinkedIn: "Can you suggest me some how should i proceed with outsourcing my processes?"

Someone, which likes to offer or sell something over the Internet need to build up trust. In such a case where it shall come to a business relationship the parties need to trust each other. For this purpose both parties need to show that they are trustful. This cannot be done, if one or both are hiding themselves in anonymity. 

For this my answer has been:

Hi Abdul 

You are in a better condition, because a lot of centers are searching for work and don't find a real one. 

The best way for finding a real center: 

  • Describe your project a good as possible 
  • Describe the kind of product 
  • Describe the time frame of the work 
  • Describe the center size you need 
  • Describe what you provide (data, training, script,etc) 
  • Describe the payment for the center (per hour, per sale, a combination of both, weekly payment, monthly payment, etc.) and if you have experience already in selling the product over the phone the average selling per agent 
  • Show that you are a true person. Don't hide yourself in the anonymity of the internet, because you need to build up trust. The same is valid for centers too. Don't give the work to centers, which are hiding themselves. You need to have trust in the work of the center too. 
  • Don't make a long time contract. Listen to the provided recordings. Tell to the center where you think that they made something wrong, that they are able to change it. 

 

I hope that I have nothing forgotten. 

Best regards 

Rudolf