We Resolve Legal Matters
How can we assist you?
Blogs
More-
If You Need Assistance With a Voice Phishing (Borrowed Account) Victim Relief Application
Why Is Recovery So Difficult in Borrowed-Account Voice Phishing Cases? Telecommunications financial fraud (commonly known as “voice phishing”) typically involves transferring funds through bank accounts opened under third parties’ names (so-called fraud-use accounts). Money transferred by the victim is quickly split across multiple accounts. Some funds are withdrawn in cash or converted into virtual assets, making tracing practically impossible. If the financial institution’s payment suspension procedure is delayed, meaningful recovery becomes extremely difficult. In organized schemes, roles are divided among recruiters, cash couriers, and managers, which makes identifying legally responsible parties time-consuming. Accordingly, borrowed-account voice phishing cases are not simple financial incidents. They are serious criminal matters requiring simultaneous consideration of both criminal and civil response. Immediate Actions After the Incident Immediately apply for victim relief through the financial institution after the transfer Report to the police and initiate a formal investigation Secure account flow data and organize call and message records If response is delayed at this stage, funds will rapidly dissipate. This matter must never be taken lightly. Even a few hours can determine the outcome. After payment suspension, a claim extinguishment procedure is conducted by the financial institution and the Financial Supervisory Service, followed by a decision regarding victim refund distribution. However, if an additional victim relief application is not submitted within two months from the public notice of the claim extinguishment procedure, the victim may lose eligibility for the refund (Article 6(1) of the Act on the Prevention of Loss Caused by Telecommunications-Based Financial Fraud and Refund for Loss). Borrowed-account voice phishing cases require not only prompt initial measures but also systematic follow-up management. Why Legal Assistance Is Necessary Victims must simultaneously manage multiple response channels, including the Financial Supervisory Service, police authorities, and commercial banks. Filing a simple report is not sufficient. If the perpetrator can be identified, a civil claim for damages should be pursued in parallel. If a joint offender structure is revealed, strategies to assert joint tort liability must also be considered. Where the principal offender cannot be apprehended, it may be necessary to examine whether the account holder who provided access media, while foreseeing the fraudulent use, may bear liability for damages under tort law. However, proving the account holder’s foreseeability is essential, and liability may be limited if contributory negligence of the victim is recognized. Careful case-by-case legal analysis is therefore required. Providing practical direction to clients facing such distressing circumstances is the role of legal counsel. Attempting to navigate these procedures alone, particularly in an emotionally shaken state, can be overwhelming and complex.
-
If You Are a Victim of Telegram Crypto Scams—Read This Carefully
1. How Telegram Crypto Scams Work & Common Tactics Telegram itself is merely a messaging app. The scams exploit anonymity, closed private groups, and bots to deceive victims and induce mistakes. In practice, perpetrators use false information or exaggerated profit promises to mislead victims into making incorrect decisions and then misappropriate their assets. They often rush decisions with phrases like “signal room,” “VIP,” “inside information,” “kimchi premium,” “airdrop,” or “high-yield staking,” following a recurring pattern: deposit inducement (deception) → withdrawal restrictions (retaining proceeds and concealing losses) → requests for additional payments (secondary deception) → disappearance (evidence destruction and flight). Legally, fraud can already be established at the moment of the initial deposit inducement. Subsequent stages may constitute a continuation of the offense or separate counts of fraud. Common scam types include: Signal-room schemes: Promising “multiple-X returns” or “stop-loss lines,” then charging membership or commission fees. Fake exchanges/apps: Luring users via links, showing fake profits, then blocking withdrawals. Advance withdrawal fee schemes: Demanding extra transfers for “fees,” “taxes,” or “KYC costs” before withdrawal. Wallet connection/signature scams: Inducing wallet connections or signatures under the guise of verification or airdrops to drain assets. OTC direct-deal scams: Promising USDT exchange or similar services, taking the transfer, then cutting contact. 2. Telegram Crypto Scam Red Flags The more of the following that apply, the higher the likelihood of deception: Guaranteed principal or profits. Pressure to decide quickly and discouragement of external verification. Claims that additional deposits are required to withdraw. Vague or unverifiable exchange/project information; difficulty confirming official channels. Requests to transfer funds to third-party accounts or personal wallet addresses. Instructions to delete chats, prohibit screenshots, or otherwise avoid leaving evidence. 3. What to Do Within 24 Hours & How to Secure Evidence First, stop all additional transfers immediately. Claims like “withdrawal will be released once you pay the fee” often lead to secondary losses. Preserve evidence: Telegram chats can be auto-deleted or removed by the other party. Immediately save screenshots, screen recordings, and exported chats for group rooms, DMs, announcements, and instructions. Collect evidence: Counterparty IDs, room links/names, inducement messages, deposit/withdrawal records, TXIDs, wallet addresses, timestamps and amounts, and KRW transfer records (recipient name and account). Create a timeline: Summarize on a single page “when–who–what was said–where–how much was sent.” Immediate actions: KRW transfers: Contact the relevant financial institution at once to request payment suspension for suspected scam accounts pursuant to the Electronic Financial Transactions Act. Upon report, the institution should promptly suspend payments where scam use is suspected. Crypto transfers: As virtual assets are not directly covered by the Act, contact the relevant exchange immediately to request withdrawal blocking under its terms, and file a report with investigative authorities to seek exchange cooperation and on-chain tracing. Parallel legal steps: Criminal complaint: File promptly for fraud (Criminal Act Art. 347) to enable investigation, suspect identification, and asset tracing. Civil action: If the perpetrator’s identity and assets can be identified, consider a damages claim (Civil Act Arts. 750, 751) and pre-judgment attachment to prevent asset dissipation. Recovery options: Consider compensation orders within criminal proceedings or applications for crime-victim relief funds, where applicable. 4. How Decent Law Firm Can Help Decent Law Firm structures the facts to identify key deception points and fund flows required for complaints and petitions. We systematize chat records, transaction histories, and wallet movements into evidentiary packages aligned with investigative tracing and recovery procedures, while assessing the practicality of civil measures such as attachments and damages claims to maximize cost-effectiveness. Above all, we focus on preventing secondary losses at the most vulnerable stage—additional payment inducements—by providing clear, timely guidance. If you have been affected, we encourage you to seek advice before it’s too late.