Inside a $100M Scam Agreement
Today i will take you Inside a $100M Scam Agreement.Over the years, I’ve seen my fair share of questionable financial deals — but lately, there’s been a surge in increasingly elaborate, professionally packaged scams targeting people in finance, crypto, private equity, and even legal circles.
They
- don’t come from some obvious prince in Nigeria.
- come dressed up as MT103 transfers, joint ventures, historic bond monetization deals, or “bank-to-bank server protocols.”
- use real banks’ names. They include fake passports, legal-looking annexes, and words that sound like they belong in a SWIFT terminal or Bloomberg screen.
And yet: it’s all fiction.
What follows is a complete breakdown of one such scam I just reviewed — a full 18-page “$100M MT103 Joint Venture Agreement” — and all the red flags that go with it.
If you’re in finance, compliance, fintech, or legal — read this. Then share it with someone who might be one email away from getting caught.
THE $100M “MT103 DIRECT TRANSFER” SCAM — FULL BREAKDOWN & BONUS FRAUD ALERTS
Over the past weeks, I’ve reviewed several suspicious “investment agreements.” One recently stood out: a 18-page contract claiming to be a $100M MT103 Direct Cash Transfer Joint Venture via HSBC.
At first glance, it looks professional — annexes, passport scans, fake SWIFT flowcharts — but here’s the truth:
❌ It’s 100% fraudulent.
This is not advanced finance. It’s recycled scam theatre dressed up in financial jargon.
🔍 Let’s Break It Down: What the Document Contains
1. 📄 The Setup
- The sender is listed as DC Debit Trading Ltd
- The bank is HSBC BANK PLC, with IBAN and SWIFT codes
- There’s a “Joint Venture” between sender and receiver
- The funds are claimed to be “off-ledger” and available for monetization
2. 🧪 The Fake SWIFT Procedure
Pages 3–4 describe a fabricated transfer process using:
- “MT103 Black Screen”, “Server Copy,” “Customer Copy”
- MT101 White Screen, MT199/MT799 S2S
- Iron Code, Final Code, and “Answer Back S2S”
⚠️ All of this is made up. SWIFT doesn’t use “screens,” “colors,” or “server-to-server” direct methods. These terms are fiction used to confuse.
3. 🧨 The Invented IT Protocol
Pages 16–18 outline a so-called Bank Server-to-Bank Server Protocol, with:
- Instructions for IT staff to log into a Windows Terminal Server
- Session start and finish timelines
- Unlocking fake “funds” via Final Code and Iron Code
💻 This pseudo-technical flow is pure science fiction. No bank moves money this way.
4. 🕵️ The Identity Theft Trap
The agreement asks for:
- Bank officer name, email, phone, and PIN (!)
- Full company registration
- Passport scans
- Bank coordinates from both sender and receiver
❗ This is how scammers collect sensitive info to run new frauds or impersonate you in other jurisdictions.
5. 🔥 The Legal Setup
- Clauses like “Receiver is solely responsible for any losses”
- Statements that “no further documentation is required”
- A 24-hour limit to complete transfer “in one session”
❌ These are pressure tactics and liability traps. No real financial institution uses this language.
🏦 Banks Frequently (Mis)Used in These Schemes
Scammers often name-drop Tier 1 banks to appear credible. None of these banks are involved — their names are inserted to deceive.
Frequently abused bank names include:
- HSBC (UK, HK, UAE)
- Deutsche Bank
- Barclays
- UBS
- BNP Paribas
- Standard Chartered
- Citibank
- Wells Fargo
- Bank of America
- Santander
- Credit Suisse
- ING
- OCBC / DBS (Singapore)
If a deal involves one of these banks but no formal communication from that institution — be skeptical. It’s likely a name-drop scam.
🧾 Terms That Signal a SCAM — Always
If a contract mentions any of these, you’re being conned:
- “MT103 Black Screen” / “Server Copy” / “Blue Screen”
- “S2S transfer” / “SWIFT Server-to-Server”
- “Payment Guarantee Letter (PGL)” with banker PINs
- “Off-ledger funds” or “monetization of dormant assets”
- “Final Code” / “Iron Code”
- “Private Platform Trade” with no risk
- “24-hour session deadline or funds blocked”
- “No KYC required” / “No bank officer involvement”
Hope this travel Inside a $100M Scam Agreement was helpful
🔴 BONUS SCAM: “CHILI BONDS” / CHINESE HISTORICAL BONDS & THE NEW USD RESET
Many of the same scammers run another fraud in parallel — the “Chinese bond redemption” scam.
They claim:
- You can get paid for holding pre-1949 Chinese government bonds
- These are referred to as “Chili Bonds” (from “Chihli” — old Romanized name for Hebei)
- The U.S. Treasury or Federal Reserve is allegedly buying them back
- The U.S. is about to “reset” the dollar into a gold-backed “New USD”
- Only secret insiders with these bonds can cash in
They often show:
- Fake Bloomberg terminal screenshots with “CHIL” or “CHILI”
- Fake U.S. Treasury memos or Zurich vault certificates
- Swiss trust documents or redemption protocols
💣 It’s 100% fake. These bonds are not recognized by China.
The U.S. is not redeeming them. Bloomberg is not tracking them.
There is no New Dollar coming.
These scams are designed to:
- Charge you “bond validation fees”
- Steal your identity documents
- Rope you into promoting the scam to others
If you see “Chili Bonds,” “new U.S. dollar,” or “Zurich redemption vaults” — shut it down.
✅ What Real Deals Look Like
- Funds are always on-ledger, not hidden or “dormant”
- SWIFT messages are standardized, logged, and verified by banks — no “colors,” “screens,” or “Iron Codes”
- Compliance is mandatory: KYC, AML, and regulatory review
- Real banks never ask for PINs or officer emails in contracts
- No legitimate party wires $100M off a PDF and a WhatsApp call
🧠 Final Advice
If you receive a contract like this:
- Don’t sign it
- Don’t send documents
- Don’t forward it to others thinking it’s a real deal
- Send it to someone who knows — and get a second opinion. Us for example at insight@fintechlex.com
💬 I’m happy to look at any offer you’re unsure about — and I’ll tell you straight. No fluff, no fear, just facts.
Stay sharp.
The font might be clean, the logos might be real — but the deal isn’t.
Visite our sister site www.fintechsetup.com

