LEXO PA REKLAMA!

SHKARKO APP

Amant Josif's fraud scheme / How he benefited from millions of euros with his "army".

2024-02-21 21:25:00, Kronika CNA
Amant Josif's fraud scheme / How he benefited from millions of euros with
Amant Joseph

Journalist Klodiana Lala in the show "On target" addressed the German file on the fraud scheme of the former adviser of the former minister Olta Xhaçka, Amant Josifi, and how together with his army they benefited from millions of euros from German citizens through call centers.

The company run by the Georgian with an Israeli passport, Mikheil Biniashvili, also known as Mishka and Amant Josifi, is involved in this scheme.

Mishka and Amant Josifi moved their army from Albania first to North Macedonia and then to Lithuania and Georgia, where they continued their fraudulent criminal activity.

From checking the emails of the citizen Irisa Puca, it turns out that this person is responsible for the ticket system, which is also used for other platforms.

In the accounts of SPOT MT alone, the German authorities were able to find millions of euros, which are believed to belong to European citizens defrauded by this platform. There were also similar platforms created by the 'Milton Group', thanks to the collaboration of Amant Josif and Biniashvili.

During the evaluation of this company, it was possible to discover an account in the name of 'Joshua Development LTD', where during the investigations related to 'Capital Markets Banc', also a fraud platform, it was ensured that approximately 16.9 million euros flow into this account.

Account, in which the money of the injured persons is thought to have been collected.

So far in relation to the platforms dedicated to the market in Germany, the total damage is estimated to be approximately 10 615 852 76 euros.

 

Second part:

Mishka and Amant Josifi moved their army from Albania first to North Macedonia and then to Lithuania and Georgia, where they continued their fraudulent criminal activity. Irisa Puca, otherwise known as Irisa Stone, turns out to be an important person in the group, who is responsible for securing the tickets. A check of her e-mail shows that Puca served in various countries on behalf of Mishka, developing software that was then used to defraud citizens in Europe.

German investigations

From checking the emails of the citizen Irisa Puca, it turns out that this person is responsible for the ticket system, which is also used for other platforms.

In his testimony, Eni/Hysen Speci says that she has some kind of position as a team leader.

It also turns out that Irisa Puca has a large number of chat groups that refer to CRM systems, different platforms, domains, IP addresses, etc. as well as other technical content in this context.

In the accounts of SPOT MT alone, the German authorities were able to find millions of euros, which are believed to belong to European citizens defrauded by this platform. There were also similar platforms created by the 'Milton Group', thanks to the collaboration of Amant Josif and Biniashvili.

German investigations

'Spot MT' is a call center (Call Centre), registered with NKR.

26. During the evaluation of this company, it was possible to discover an account in the name of 'Joshua Development LTD', where during the investigations regarding 'Capital Markets Banc', also a fraud platform, it was ensured that approximately 16.9 million euros flow into this account .

Account, in which the money of the injured persons is thought to have been collected.

While from 2017 to 2018, on account of 'Spot MT', through various transactions, it is thought that nearly 1.9 million euros were entered.

Based on the findings of the joint investigation team of 'Eurojust' and 'Europol', it is said that there was a wide spread of these fraudulent platforms, connected to a single server, with approximately 80 of them. Only 40 of them were dedicated to the German market. This shows the importance of the German market and the wealth of its citizens for the creators of these platforms.

German investigations

So far in relation to the platforms dedicated to the market in Germany, the total damage is estimated to be approximately 10 615 852 76 euros.

Where it is clear that Irisa Puca worked as a project manager for 'Puma TS', as well as creating users in the ticketing system for new employees of 'Milton Group'.

It follows that through her role at 'SM Company' and 'Puma TS', Puca actively contributed to the development of fraudulent platforms, distribution to the customer and then the provision of fraudulent financial products to German 'customers' via call centres. in countries like Georgia, Albania, Ukraine and North Macedonia.

Where he maintains regular contact with the owner of Puma TS, Mikheil Biniashvili, while the people added to the group chat, known as Team Zoe, were aware of the fact that software was being developed at Puma TS that were being used as platforms for the purpose of deceiving people around the world.

According to the investigations and discoveries made by the German prosecutors, it turns out that only 'Spot MT', a Call Center based in Albania, owned by Biniashvili, has sold similar fraudulent platforms to other similar Call Centers.

German investigations

'Spot MT' is a Call Center in Albania, from which similar fraudulent platforms 'CapitalMarketsBane' are sold.

A damage of 1 761 624 73 euros was generated from this platform and 43 citizens were injured.

Regarding 'Puma TS' it is a software solution, which was initially designed in Albania, Lithuania and recently in Georgia. Where the investigations revealed that they were preferentially sold to Call Centers. with the sole purpose of operating fraudulent platforms as well as to illegally finance the achieved property values.

From the above findings it can be proven that 'Puma TS' can be directly attributed to 93 platforms that are the subject of German criminal proceedings.

These platforms have generated a damage of 15 905 560 14 Euros and 509 victims, although the number of victims or the extent of the damage is not yet known for a large number of platforms.

One of the convictions that the people involved in this activity were aware of the nature of fraud offered by these platforms, are also the conversations they have developed in the chat groups they had opened, about the coordination of work and the technical operation of these software.

German investigators found these conversations infiltrating the group, and the testimony of one of the main people involved in this activity showed that they were aware of their actions. This person is serving as an associate of German justice in this case.

German investigations

The clues about the knowledge of the persons participating in the fraudulent actions come from the general transcription of the interrogation of the accused Hysen Speci as well as from the analysis of many group conversations on Skype, in which only illegal machinations are discussed.

Those who took part in this conversation were aware that 'Puma TS' is developing software that is used for platforms and that people around the world are being cheated.

At the head of 'Puma TS' is Mikheil Biniashvili, the pseudonym of Mikhael Benimini, from which it appears that Irisa Puca and Adrian Korriku have cooperated in fraud and caused millions of euros in damage, where only in the territory of the Federal Republic of Germany from this report currently there are 552 victims related to 94 platforms and a preliminary damage of 17 667 184 87 euros. An interesting aspect is the transfer of the fraud operation from Albania to Lithuania. There, the persons of the same, led by the Georgian Mishka, decided to extend their activity. Irisa Puca, questioned by the German authorities, has confessed the meeting that took place in Albania and the decision to expand the fraud through Call Centers in Lithuania as well.

Irisa Puca: At the beginning of 2017, I worked at the company 'Spot MT' in Albania, where my job was system manager and consisted of creating user accounts for employees. During this time, the company 'Spot MT' has had a manager of a foreign Ukrainian citizen. While as the general manager of this company we referred to a person called Mishka, who is Georgian or Israeli. But at that time I had no contact with him.

Irisa Puca further confessed to the German investigators that she not only increased in responsibility in 2019, already moving to the programming department, but during this year she was asked to move to Lithuania.

Irisa Puca: In January 2019, I was promoted, in the programming department where my position was manager of the 'Ticket System' project.

In this department, I had a direct superior, citizen Endri Bulku. During this month, another development project was added that Eni/Hysen Speci had started.

I remember that in a meeting held in Tirana, where Eni Speci, Mishka, Endri Bulku and Erlind Çekaj were present, Eni and Mishka visually showed us the 'CRM Development' project. My work on this project continued until 2022. Meanwhile, in May 2019 we went to Lithuania, where we were approximately 20 people from the programming office.

Interestingly, after opening the branch in Lithuania, they continued to scam various citizens in Western Europe. Irisa Puca further told the German investigators that they moved to Georgia, to the capital Tbilisi. This happened also thanks to the success they had achieved with the companies opened earlier in Albania, North Macedonia and Lithuania.

Irisa Puca: Our plan in Lithuania was to incorporate with the company 'Legal Guns', as they were also a programming company. In September 2019, I left Lithuania and went to Georgia, where in Tbilisi I worked at the company 'DMG LLC'. I was suggested to go to Georgia by Eni Speci and then by Mishka and Rezzo, who told me that a bigger company would be created in this country. I remember that 10 of us who were working in Lithuania, then went to Georgia. Where I stayed until January 2021.

Regarding the people who were managers and entrepreneurs of this fraud, Irisa Puca says that she has known Mishka among them, but she has never had contact with Amant Josif, who is considered the financial mastermind of this fraud. Josif is currently under arrest in Dubai and has an extradition request from the Spanish and Albanian authorities.

Irisa Puca: After returning to Albania in January 2021, I started working at the company of Georgia Dauti, which was a subcontracted company from the Georgian company 'DMG LLC', where my task was programming, and where I continued to contribute to the 'CRM' project, where even in this work my superior continued to be Eni/Hysen Speci. Regarding the citizen Amant Josifi, I know him only through news in the media, but I have had no communications with him. While I know the citizen Adrian Korriku as he has been my roommate since May 2019 and until now, where from this period onwards we have worked together in Lithuania, Georgia and Xorxhia Dauti in Albania in the role of programmers.

During her interview, Irisa Puca also gave interesting testimony about the acquaintance she had with Mikheil Biniashvili, who is known by the name Mishka. Also, she showed the middle names they used to get in touch with different clients. Once clients were put into the network, wallets were created for them and then they cheated them through these softwares.

Irisa Puca: Mishka, was superior to superiors. He was about 50 years old, with little hair, of average height, of normal build, of Israeli or Georgian descent, and lived in Georgia.

I saw Mishka for the first time in January 2019, when 'CRM' was discussed. Then I saw it more often in Georgia. During work, he was closest to Eni Speci.

I have had direct email communications with Mishka. When I started work in 2017 at 'Spot MT', Mira who was the manager of the 'Back Office' department, told me to choose a 'nick name'. And I chose Iris Stone from that time. While Endri Bulku had the second name Andree Bullak, Elind Çekaj bore the name Ryan Gossling.

Irisa Puca denied during the testimony that she had used her professional skills to deceive citizens in Europe through these platforms. She said that these skills could have been used for other purposes by the people she collaborated with. Citizen Adrian Korriku, who turns out to be Irisa Puca's roommate and one of the programmers of these softwares, was also asked about this fraud scheme.

Adrian Korriku: I saw Mishka for the first time while working in Georgia in the role of an important person, but I had no direct working contacts with them. During the time I worked in Lithuania I was the maintainer of the program 'CRM' and that 'Puma TS' was the name of the project of this program. I have worked on the 'CRM' part at first but not as a programmer for casinos or for crypto-exchange.

However, the law enforcement authorities have established their conviction that they are facing a cyber fraud of extraordinary proportions and that these people, even in the form of technical support, have put their knowledge to use to create platforms that basically had the extortion of European citizens.

German investigations

The Upper Austria Crimes Office is investigating facts of computer fraud for profit reasons.

The activity from which it is thought that a damage in the amount of 504 429 00 euros has been caused to various citizens in Austria and abroad.

From the investigations, it appears that through this criminal activity, these people were encouraged by the perpetrators to consider investing their assets in a profitable way, through advertisements on the Internet and in social networks.

Where then various sums of money that were allegedly invested by them, with stocks and cryptocurrencies, were embezzled.

According to the investigators who have been dealing with this work for a long time, the bait is first the trust that these brokers must gain from the client and then the conviction that they must create in them, so that the latter invest and trust their account numbers.

German investigations

Initially, victims are tempted to invest in small amounts with the promise that the 'broker/intermediary', the alleged investment site, would make a large profit by investing in stocks and cryptocurrencies.

During this process, in addition to passport photocopies, the victims sent the perpetrators receipts to prove residency and allowed access to their electronic devices through a remote maintenance software.

The purpose of data collection is to create user accounts on cryptocurrency exchange platforms.

After successfully registering on the exchange platform, victims were encouraged to transfer these amounts under false pretenses.

At this moment, the author communicates to the victim the IBAN of the cryptocurrency exchange platform previously selected, to make it reliable that the amounts paid will be forwarded to the operators of the investment platforms.

These customers did not get rich as they thought, but ended up being extorted to the point of no return, having to turn to law enforcement agencies in their respective countries for help. Amant Josifi, a key person in this story, was arrested in Dubai on September 6, 2023 after being wanted by the Spanish authorities for defrauding 17 thousand citizens from European Union countries.

However, he was later released, and his lawyer said there was no bail pending against him pending an extradition request from the La Seu court. The question remains whether he will be able to remain free, or whether Spain will make his extradition possible./ CNA

Lajmet e fundit nga