Advertisement · 728 × 90
#
Hashtag
#CyberScams
Advertisement · 728 × 90
Preview
Cambodian parliament passes landmark cybercrime law after scam centre scrutiny - Sight Magazine Cambodia's parliament passed the first law dedicated to targeting scam centres accused of bilking victims out of billions of dollars.

Cambodian parliament passes landmark cybercrime law after scam centre scrutiny @sightmagazine.bsky.social #Cambodia #cybercrime #scamcentres #cyberscams #KeutRith

sightmagazine.com.au/news/cambodi...

0 0 0 0
Preview
On the Frontlines: Fighting AI-Powered Scam & Fraud - 14/04/26 - 2:00PM UTC Wednesday March 25th 2026 - 8:00 AM (CET)

AI is actively being used to scale fraud and make scams harder to detect.

Join C4ADS Senior Director Mollie Zapata on April 14 as she joins peers from OpenAI, @Microsoft.com, and Google for a GASA webinar exploring how AI is being used by fraudsters.

Register 👇
buff.ly/XetVx2M

#AI #cyberscams

0 0 0 0
Post image

Fake “IT support” scams are on the rise 🚨
Attackers now impersonate help desks via phone, email, and Teams.

Watch how to spot the red flags and stay safe 👇
zurl.co/5uzpE

Pause. Verify. Stay safe.
#CyberScams #ITSecurity #StuTech

0 0 0 0
Preview
​Nearly 3,200 foreigners expelled from Cambodia in first 8 days of February​ ​Nearly 3,200 foreigners expelled from Cambodia in first 8 days of February​

Almost 3,200 foreigners (Chinese, Indians, Nigerian, Vietnamese et al) somehow related to #cyberscams expelled from #Cambodia in first week of February. Allegedly 110,000 since Jan. 1. www.phnompenhpost.com/national/nea...

0 0 0 0
Post image

Arrests Trigger Scam Worker Exodus
Read More: buff.ly/BTeiuHg

#ScamFarms #PigButchering #CyberCrime #HumanTrafficking #FinancialFraud #LawEnforcement #TransnationalCrime #CyberScams

0 0 0 0
Preview
AuraStealer Malware Uses Scam Yourself Tactics to Steal Sensitive Data  A recent investigation by Gen Digital’s Gen Threat Labs has brought attention to AuraStealer, a newly emerging malware-as-a-service offering that has begun circulating widely across underground cybercrime communities. First observed in mid-2025, the malware is being promoted as a powerful data-stealing tool capable of compromising a broad range of Windows operating systems. Despite its growing visibility, researchers caution that AuraStealer’s technical sophistication does not always match the claims made by its developers.  Unlike conventional malware campaigns that rely on covert infection techniques such as malicious email attachments or exploit kits, AuraStealer employs a strategy that places users at the center of their own compromise. This approach, described as “scam-yourself,” relies heavily on social engineering rather than stealth delivery. Threat actors distribute convincing video content on popular social platforms, particularly TikTok, presenting the malware execution process as a legitimate software activation tutorial.  These videos typically promise free access to paid software products. Viewers are guided through step-by-step instructions that require them to open an administrative PowerShell window and manually enter commands shown on screen. Instead of activating software, the commands quietly retrieve and execute AuraStealer, granting attackers access to the victim’s system without triggering traditional download-based defenses.  From an analysis perspective, AuraStealer incorporates multiple layers of obfuscation designed to complicate both manual and automated inspection. The malware disrupts straightforward code execution paths by dynamically calculating control flow at runtime, preventing analysts from easily tracing its behavior. It also leverages exception-based execution techniques, intentionally generating system errors that are intercepted by custom handlers to perform malicious actions. These tactics are intended to confuse security sandboxes and delay detection.  Functionally, AuraStealer targets a wide range of sensitive information. Researchers report that it is designed to harvest data from more than a hundred web browsers and dozens of desktop applications. Its focus includes credentials stored in both Chromium- and Gecko-based browsers, as well as data associated with cryptocurrency wallets maintained through browser extensions and standalone software.  One of the more concerning aspects of the malware is its attempt to circumvent modern browser protections such as Application-Bound Encryption. The malware tries to launch browser processes in a suspended state and inject code capable of extracting encryption keys. However, researchers observed that this technique is inconsistently implemented and fails across multiple environments, suggesting that the malware remains technically immature.  Despite being sold through subscription-based pricing that can reach several hundred dollars per month, AuraStealer contains notable weaknesses. Analysts found that its aggressive obfuscation introduces detectable patterns and that coding errors undermine its ability to remain stealthy. These shortcomings provide defenders with opportunities to identify and block infections before significant damage occurs.  While AuraStealer is actively evolving and backed by ongoing development, its emergence highlights a broader trend toward manipulation-driven cybercrime. Security professionals continue to emphasize that any online tutorial instructing users to paste commands into a system terminal in exchange for free software should be treated as a significant warning sign.

AuraStealer Malware Uses Scam Yourself Tactics to Steal Sensitive Data #CyberScams #DataBreach #DataLeak

0 0 0 0
Preview
Cyber Scams and Labor Trafficking: Why ASEAN Must Build People-Centered Digital Governance? Scam compounds in the Mekong region are transnational organized crime networks that operate as multinational corporations with internal management hierarchies, surveillance systems, and forced-labor regimes.

Read our Executive Director, Matt Yutthaworakool’s latest article for FACTS Asia on how cyber scams are linked to labour trafficking in Southeast Asia, and why ASEAN needs people-centred digital governance.

🔗 https://bit.ly/4qgvrpk

#DigitalGovernance #CyberScams #ASEAN

0 0 0 0
Preview
America's New Enemy: The Chinese Crypto Cartel Buying States A mysterious South African took over a sovereign nation, armed with a flood of untraceable wealth from scam compounds enslaving thousands. This is the story of how Chinese organized crime captured Tha...

What a story! A horror story!
#Cyberscams whalehunting.projectbrazen.com/americas-new...

0 0 0 0
Preview
Cyber scams: Notorious hub linked to Chinese mafia raided in Myanmar KK Park has been synonymous with online fraud, money laundering and human trafficking.

#CyberScams
#Notorious hub linked to #Chinese mafia raided in Myanmar

The #Myanmar military says it has captured one of the most notorious #Scam compounds on the border with #Thailand, as it reclaims key territory it lost in the ongoing civil war.
share.google/IYNo2Hg4M4N2...

0 0 0 0
Preview
Bitcoin worth $14bn seized in US-UK crackdown on alleged scammers The UK has also frozen assets linked to the alleged scammers, including a £100m London office building.

US government has seized more than $14bn in #bitcoin and charged Chen Zhi. founder of a #Cambodia business empire, the Prince Group, with allegedly masterminding a massive #cryptocurrency scam, which involved forced labour camps. #UK #cyberscams www.bbc.com/news/article...

0 0 0 0
Preview
For the best experience accessing Amazon Music we recommend using the latest version of Firefox, Chrome, Safari or Edge.

Amazon - music.amazon.com/podcasts/249...
Apple - podcasts.apple.com/us/podcast/t...

#CyberScams #CyberSecurity #CyberCrime #CyberInsurance #FraudPrevention #DigitalSafety #ScamAwareness #CyberAwareness #Phishing #OnlineSafety #DataProtection #Leadership #InformationSecurity

0 0 0 0
Post image Post image Post image Post image

អ្នកឃ្លាំមើលថា ឪកូនត្រកូលហ៊ុន គ្រាន់តែសម្ដែងធ្វើខ្លាំងលើហ្វេសប៊ុក ប៉ុន្តែមិនហ៊ានកម្ចាត់ក្រុមមេឧក្រិដ្ឋជន
👉 អានសេចក្ដីរាយការណ៍ពិស្ដារ៖ www.facebook.com/share/p/16Tx...
---
#AngkorEkDaily #MoneyLaundering #Cyberscams #CyberCrimes #HumanTrafficking #TransnationalCrime

0 0 0 0
Post image Post image Post image

អាមេរិកចាត់ថ្នាក់កម្ពុជាជាលើកដំបូង ថាជាប្រទេសឧបត្ថម្ភដល់ក្រុមជួញដូរមនុស្ស
👉 អានសេចក្ដីរាយការណ៍ពិស្ដារ៖ www.facebook.com/AngkorEkDail...
---
#MoneyLaundering #Cyberscams #CyberCrimes #HumanTrafficking

0 0 0 0
You NEED a Code Word
You NEED a Code Word YouTube video by magnify

#cyberscams #AIscams #scams

With scammers getting faster & more sophisticated, it's vital to establish a codeword with your close friends & family. Ideally, send them this video & then have a face-to-face conversation to settle on a word you can remember. 1/2
youtube.com/shorts/3jTje...

1 0 1 0
US Treasury Sanctions Asian Cyber Scam Networks Over $10 B Fraud

US Treasury Sanctions Asian Cyber Scam Networks Over $10 B Fraud

U.S. Treasury sanctions over two dozen Burma and Cambodia cyber‑scam groups, citing $10 billion in fraud losses to Americans last year. Read more: getnews.me/us-treasury-sanctions-as... #cyberscams #burma #cambodia

0 0 0 0
Video

Why Cyber Scams Against Seniors Are a Growing Family Crisis

Read all about it: cyberinsurancenews.org/scams-target...

Or a one-minute watch below 👇

#CyberScams #Deepfakes #ElderFraudAwareness #Cybersecuirty #Cyberinsurance

0 0 0 0
Post image

Cambodia’s Cyber Crackdown: 105 Indians Among 3,000+ Arrested

Cambodian authorities have detained over 3,000 suspects, including 105 Indians, in a massive 15-day operation targeting cybercrime hubs across 138 locations. 

#CambodiaCyberCrackdown #CyberScams #GlobalCrime #HumanTrafficking

0 0 0 0
Preview
The Rise of Digital Slavery in the Age of Global Cybercrime   A growing number of cybercriminals are becoming more sophisticated and dangerous in the hyperconnected digital world of today. These criminals use advanced methods to exploit individuals and organisations who are not expecting them. To lure victims into divulging confidential information, perpetrators often disguise themselves as legitimate individuals—posing as bank officials, customer service representatives, or company executives—to deceive them into disclosing confidential information voluntarily.  Social engineering is an effective way for fraudsters to manipulate emotions, exploit trust, and overcome even the most vigilant security measures. Once these fraudsters have gained access to critical information such as banking credentials, personal identification numbers, or login details, they begin stealing identities, engaging in financial fraud, and causing large-scale data breaches as a result. As a result, this cybercrime threat is particularly alarming because it is relentlessly adaptable.  Cyberfraud, in its current form, has evolved not only from isolated phishing attempts but has also developed into a worldwide threat that is well-organised and is constantly changing as time goes on. With the rise of digital platforms, both personal and professional, there has never been a greater urgency to recognise, detect, and fight cyber fraud.  Digital organised crime has begun to emerge as a new frontier in the digital world, where cyber slavery is emerging as a widespread and deeply concealed problem, which is an alarming development. Rather than being isolated incidents, this growing phenomenon is structured, transnational, and profit-driven, with credible investigations revealing that in so-called "scam compounds," thousands of people are held against their will.  They are often duped into accepting fake work offers and trafficked across borders, thus forcing them to carry out large-scale online fraud operations under inhumane conditions, ranging from phishing scams to cryptocurrency scams, which are implemented by politicians and businesses alike. Many of the spam messages or suspicious links that appear to the average user to be harmless are, in fact, the product of forced labour that is orchestrated by criminal syndicates.  In light of this troubling intersection between human trafficking and digital fraud, it is imperative that we raise global awareness, intervene with policy, and cooperate with each other so these hidden networks of exploitation will cease to operate. An opportunity that seems promising at first glance can, with a single click, plunge an unsuspecting applicant into captivity and brutal exploitation, even if it seems to offer a promising salary, flexible working schedules, and the allure of a new start abroad.  Currently, cyberslavery encompasses several groups of victims: those deceived by online scams, as well as those who are forced to run those very scams due to their trafficking, confinement, and exploitation. It is known that these individuals are enticed to work for counterfeit companies, transported across borders, stripped of their travel documents, and locked inside secure compounds where they are forced to engage in phishing scams, romance scams, and cryptocurrency scams under constant threat of violence, and that the rapid expansion of this phenomenon is directly connected to modern connectivity.  There was a time when limited bandwidth curtailed large-scale abuses, but today's high-speed internet, encrypted messaging apps, and global social media platforms serve as frictionless tools for traffickers to recruit, control, and conceal the forced labourers they are exploiting. A recent event underscores the scale of the problem: in Myawaddy, Myanmar, police turned over 540 Indians coerced into participating in scams after agents lured them into employment in Dubai, Bangkok, and Kuala Lumpur by promising jobs there.  A total of 40 Karnatakaians were rescued after a lengthy journey through several Southeast Asian hubs and clandestine boat transfers. After being imprisoned and forced to commit cyberfraud against victims worldwide, they were found guilty and sentenced to conduct it. In this ordeal, the stark reality is illustrated: a shadow industry spawned by the intersection of high-tech crime and human trafficking has flourished on broken promises and stolen identity, creating an urgency for international coordination and action that must be taken now.  There is no doubt that cyberslavery is becoming a major concern across Southeast Asia, with countries like Cambodia, Laos, Myanmar, and the Philippines emerging as key hotspots for this disturbing phenomenon. It has been reported that scam centres in these regions have become an epicentre of modern-day slavery and grave human rights violations, according to recent research findings.  It is common for victims to experience physical abuse, psychological manipulation, and extreme coercion, as well as being forced to carry out sophisticated online scams targeting individuals all over the world – they are often trafficked or kidnapped. Criminal syndicates orchestrate these illicit activities, and they are enabled by complicit business networks which take advantage of resources like capital, human labour, and digital infrastructure to sustain and expand their criminal operations.  As a result of the tremendous stakes involved, reports by international agencies have estimated that these scamcentress generate billions of dollars in illicit revenue every year. Nevertheless, it has been very difficult to dismantle this deeply embedded system, which is characterized by its transnational nature, complex organizational structures, and the presence of overlapping legal, political, and jurisdictional barriers. In addition to this crisis, cyber slavery is still widely misunderstood by the public, causing policymaking decisions to be influenced by public misconceptions, which limit public awareness and support for victims of cyber slavery. As these scam networks have evolved over the past decade, they have shown a further sign of their increasing sophistication as well. At first, such operations were based out of modest apartments, small villas, or rented hotels. The trend began to shift by the late 2010s, with large-scale compounds containing multiple criminal operations under one roof while employing thousands of coerced workers under the roof. This phenomenon became especially prevalent in the Cambodian city of Sihanoukville, which has become a central hub for such operations in the past few years, emphasising the necessity for coordinated regional and global responses to combat a growing industry of digital exploitation that has become largely hidden but has become more aggressive in recent years.  Currently, law enforcement agencies are grappling with the challenge of combating cyber slavery, a complex and ever-evolving problem, as it is characterised by transnational criminality, legal fragmentation, and legal instability across different jurisdictions. Cybercriminals are often based in countries with different laws governing cybercrime, regulatory frameworks, and definitions of digital exploitation, making international cooperation both complex and inconclusive. It can be exceedingly difficult to collect admissible evidence across borders, especially with the help of mechanisms like the Mutual Legal Assistance Treaty (MLAT), because they are extremely time-consuming and bureaucratic in nature, which can often delay vital investigative action. In addition to that difficulty, fraudsters and scam operators frequently mask themselves with false documents, virtual private networks (VPNs), and encrypted communication platforms, which makes their activities even more difficult.  Cyber slavery, in addition, is not limited to forced labour used in scam operations. As a result, some individuals are blackmailed or psychologically manipulated into participating in cybercrime, blurring the line between culpability and victimhood, as a result of which they are blackmailed or psychologically manipulated. As a key component of building a case, digital evidence presents its own set of challenges.  Since it is volatile, it must be preserved in the utmost way possible. Victims trapped in scam compounds, however, are often unable to communicate online or are unable to interact via tightly controlled channels, so they are limited in their ability to report abuse or cooperate with authorities. These restrictions highlight the urgent need for a multifaceted response to these crimes.To effectively address the threat of cyber slavery, several strategic approaches must be developed, including cross-border collaboration, cybercrime units, public-private partnerships, and proactive legal reforms. There needs to be a vigorous enforcement of domestic laws such as the Indian Emigration Act of 1983, in particular to crack down on illegal recruitment agents who are a significant part of the trafficking industry by masquerading as overseas employees.  Additionally, large-scale awareness campaigns can be conducted via traditional as well as digital media simultaneously to inform the public, especially vulnerable job seekers, regarding the risks that unregistered recruiters pose to them, as well as their deceptive tactics used to lure people into digital servitude. There is only one way to effectively curb the growing menace of cyber slavery, and that is by coordinating global efforts, reforming policies, and maintaining public involvement.  A rapid increase in cyber fraud is an indication that cyber fraud is becoming an increasingly dangerous threat within the digital ecosystem. It entails a variety of sophisticated tactics, along with a broad spectrum of damaging consequences resulting from cyber fraud. In its simplest sense, cyber fraud is a form of deception that manipulates victims into disclosing sensitive information or performing actions that serve the fraudsters' interests. To achieve this kind of manipulation, advanced technological means are often employed, including phishing schemes, malware deployment, and a variety of social engineering techniques. Cyber fraud is an alarming phenomenon in the sense that the perpetrators usually operate under a veil of anonymity online, which makes the task of tracing and prosecuting offenders incredibly difficult.  Cyber fraud has a global reach that is one of its most alarming aspects. It is different from traditional crime in that it transcends geographical boundaries, meaning that perpetrators can target victims on other continents and with minimal risk of detection. Further, there is an ever-evolving landscape of cyber fraud.  As fraudsters adjust their methods to counter the increased security measures that organisations and individuals face, individuals and  mustorganisations remain informed and proactive in adopting robust cybersecurity protocols, no matter what. Several forms of cyber fraud havebecomeg more popular in recent years.  Phishing attacks, for example, use phoney email messages, messages from phoney websites, or false links to steal login information and financial details. Identity theft is when individuals are impersonated by someone else in order to conduct unauthorised transactions by using their personal data. Online scams exploit trust to request payments or personal information under false pretences, while ransomware attacks block users from accessing their own data, requiring payment before they can get to it.  Data breaches, which occur when a secure system is breached by an unauthorised individual, expose large amounts of sensitive data with lasting consequences. Cyber fraud has profound and far-reaching effects on a company's bottom line. Financial losses are one of the most immediate and visible consequences, as victims may suffer theft of funds, unauthorised purchases, or costly efforts to recover their money.  In addition, businesses can suffer severe reputational damage, leading to reduced consumer trust, regulatory penalties, and the possibility of a lawsuit. Furthermore, cyber attacks can cause significant disruptions to vital services such as healthcare, transportation, and communications, which puts the public at risk.  Cyber fraud is a problem of a global scale that threatens trust in digital platforms and financial systems. The persistence of cyber fraud erodes trust in digital platforms and financial systems, which constitutes a significant obstacle to economic stability and growth in a world which is increasingly connected. The government, businesses, and ordinary citizens must adopt vigilance and responsibility to stem the escalating tide of cyber-enabled exploitation.  Lawmakers should close jurisdictional gaps by harmonising cybercrime statutes and streamlining evidence-sharing protocols, at the same time that enforcement agencies need to invest heavily in digital forensics capacity and the development of multilingual victim support channels to close cybercrime loopholes. Especially in the areas of finance, telecommunications, and social media, private firms need to implement a real-time fraud detection system and rigorously vet third-party recruiters who operate on their platforms. The first line of defence should remain establishing “zero-trust” digital habits at the individual level, which includes verifying unsolicited emails, using strong authentication, and immediately reporting suspicious activity. A multilayered, collaborative approach is the only way for the global community to dismantle the infrastructure of cyber slavery and fraud, protect vulnerable populations, and restore trust in the digital economy through the implementation of this multilayered, collaborative approach.

The Rise of Digital Slavery in the Age of Global Cybercrime #cryptocurrency #CyberFraud #CyberScams

0 0 0 0
Post image

Amnesty accuses Cambodia of ‘gross failure’ to stop rampant abuses in scam centers
👉 www.rfa.org/english/camb...
---
#RFAKhmer #Cambodia #HunManet #HunSen #Cyberscams #HumanTrafficking #MoneyLaundering #OnlineGambling

0 0 0 0
Protected: How to Thwart Internet Scams This content is password protected. To view it please enter your password below: Password: Nautilus Members enjoy an ad-free experience. Log in or Join now . The post Protected: How to Thwart Internet...

Protected: How to Thwart Internet Scams #Science #TechnologyandEngineering #InternetSafety #CyberScams #OnlineSecurity

0 0 0 0
Preview
WhatsApp Image Scam Uses Steganography to Steal User Data and Money  With over three billion users globally, including around 500 million in India, WhatsApp has become one of the most widely used communication platforms. While this immense popularity makes it convenient for users to stay connected, it also provides fertile ground for cybercriminals to launch increasingly sophisticated scams.  A recent alarming trend involves the use of steganography—a technique for hiding malicious code inside images—enabling attackers to compromise user devices and steal sensitive data. A case from Jabalpur, Madhya Pradesh, brought this threat into the spotlight. A 28-year-old man reportedly lost close to ₹2 lakh after downloading a seemingly harmless image received via WhatsApp. The image, however, was embedded with malware that secretly installed itself on his phone.  This new approach is particularly concerning because the file looked completely normal and harmless to the user. Unlike traditional scams involving suspicious links or messages, this method exploits a far subtler form of cyberattack. Steganography is the practice of embedding hidden information inside media files such as images, videos, or audio. In this scam, cybercriminals embed malicious code into the least significant bits of image data or in the file’s metadata—areas that do not impact the visible quality of the image but can carry executable instructions. These altered files are then distributed via WhatsApp, often as forwarded messages.  When a recipient downloads or opens the file, the embedded malware activates and begins to infiltrate the device. Once installed, the malware can harvest a wide range of personal data. It may extract saved passwords, intercept one-time passwords, and even facilitate unauthorized financial transactions. What makes this form of attack more dangerous than typical phishing attempts is its stealth. Because the malware is hidden within legitimate-looking files, it often bypasses detection by standard antivirus software, especially those designed for consumer use. Detecting and analyzing such threats typically requires specialized forensic tools and advanced behavioral monitoring.  In the Jabalpur case, after downloading the infected image, the malware gained control over the victim’s device, accessed his banking credentials, and enabled unauthorized fund transfers. Experts warn that this method could be replicated on a much larger scale, especially if users remain unaware of the risks posed by media files.  As platforms like WhatsApp continue working to enhance security, users must remain cautious and avoid downloading media from unfamiliar sources. In today’s digital age, even an innocent-looking image can become a tool for cyber theft.

WhatsApp Image Scam Uses Steganography to Steal User Data and Money #CyberFraud #CyberScams #cybercriminals

1 1 0 0
Preview
US Sanctions Cloud Provider 'Funnull' As Top Source of 'Pig Butchering' Scams An anonymous reader quotes a report from KrebsOnSecurity: The U.S. government today imposed economic sanctions on Funnull Technology Inc., a Philippines-based company that provides computer infrastructure...

US Sanctions Cloud Provider 'Funnull' As Top Source of 'Pig Butchering' Scams #Technology #Cybersecurity #Sanctions #CyberScams #FraudPrevention

0 0 0 0

The RSO committed to continued collaboration with Sri Lanka, supporting coordinated responses across Bali Process Member States and connecting South & SE Asia law enforcement more regularly. #Cyberscams #TIP

0 0 0 0

Panel highlights:
🛡️ Stronger law enforcement coordination, nationally and regionally
🧠 Expanded psychosocial & reintegration support for victims
🎓 Prevention initiatives for recent graduates and youth
🤖 Using AI to track online recruitment patterns
#CyberScams #TIP #SriLanka

0 0 0 0

💔 They thought it was love—until it became a nightmare.

This week on the podcast, we explore the global network of romance scams powered by big tech platforms and organized crime. 🎙️

#DigitalScams #RomanceFraud #TechPodcast #TrueCrime #OnlineSafety #CyberScams #PulitzerCenter

5 1 1 0
Preview
Billion-dollar cyberscam industry spreading globally, UN says - Sight Magazine Asian crime syndicates behind the multibillion-dollar cyberscam industry are expanding globally, the United Nations said.

Billion-dollar cyberscam industry spreading globally, UN says @sightmagazine.bsky.social #cyberscams #UNODC #organisedcrime #cyberfraud #Myanmar #Laos #Cambodia #SouthEastAsia

sightmagazine.com.au/news/billion...

0 0 0 0

UN warns of massive #cyberscams spreading across the world www.dw.com/en/un-warns-...

0 0 0 0
Preview
Episode 2: The Toll Scam Your Cyber Six Podcast · Episode

Interested in learning about and protecting yourself from these Toll Scams? #CyberScams #CyberSecurity

open.spotify.com/episode/326n...

5 0 1 0
Post image

Pacific governments warned of ‘threat’ from Cambodia’s Prince Group
👉 www.rfa.org/english/camb...
---
#RFAKhmer #Cambodia #ChenZhi #PrinceGroup #MoneyLaundering #Cyberscams #HumanTrafficking

0 0 0 0