The OpenPayd–Klickl Fraud Rail: New Victim Files Show Systematic Sweeps To Polish Crypto Provider

Spread financial intelligence

FinTelegram has reviewed a new batch of OpenPayd payment summaries gathered by victims of fake investment schemes. The pattern is brutal and consistent: victim deposits hit OpenPayd vIBANs and are immediately transferred to Klickl Europe Sp. z o.o. with the reference “Sweep to Primary Account.” In the readable files reviewed, hundred of thousands of Euros flowed through this OpenPayd–Klickl rail. This is no longer a single-victim case. It is a payment machine.


2-Minute Briefing

FinTelegram has reviewed a new batch of OpenPayd payment summaries received by victims after GDPR/DSAR requests. The documents show a repeated payment pattern: Payin from victim → immediate Transfer → Klickl Europe → “Sweep to Primary Account.”

FinTelegram analyzed the batch of victim payment files. The payment summaries show that each victim payment to OpenPayd was transferred to KLICKL EUROPE SP.z.o.o., BIC CFTEMTM1, receiver account MT82CFTE28004000000000004379006. This confirms the core FinTelegram finding: OpenPayd provided the vIBAN collection infrastructure; Klickl Europe received the swept victim funds.

OpenPayd’s own GDPR response to the victims confirmed the architecture. It states that OpenPayd provides services to corporate clients only, identifies Klickl Europe as the relevant client, explains that the IBAN was a named virtual IBAN linked to Klickl Europe’s payment account, and states that funds credited to that account became the property of Klickl Europe.

Peel Hunt warning against scammers and fraud apps

The new batch of victim files makes the case bigger. The pattern is no longer limited to KXTRA or one Peel Hunt / Peelhuntaicore victim. It points to a scalable fraud rail used against mainly German-speaking victims. The legitimate Peel Hunt has publicly warned that it does not use WhatsApp, downloadable apps or social media channels for regulated investment activity and says apps and WhatsApp channels using its name are not associated with the firm.

OCCRP’s Scam Empire reporting described how large investment-scam networks rely on payment providers and accounts to collect victim money. FinTelegram’s new OpenPayd/Klickl evidence fits that model.


Key Findings

  1. The new files show a systematic payment pattern.
    Victim Payins into OpenPayd vIBANs were immediately matched by outgoing transfers to Klickl Europe with the reference “Sweep to Primary Account.”
  2. The same Klickl account appears repeatedly.
    The receiver account in the readable files is consistently MT82CFTE28004000000000004379006, BIC CFTEMTM1, receiver Klickl Europe Sp. z o.o.
  3. The current verified batch already exceeds €665,000.
    FinTelegram’s conservative review of readable Excel files plus two PDF summaries shows at least €665,733.74 in victim-fund flows through this rail.
  4. The victims are predominantly German-speaking.
    In the readable Excel files, sender accounts are mainly German IBANs, with additional Austrian accounts. This aligns with the Peel Hunt / Peelhuntaicore and KXTRA victim pattern.
  5. OpenPayd’s GDPR response confirms the structure.
    OpenPayd says the vIBANs are generated as reconciliation tools for corporate clients and that the relevant account belonged to Klickl Europe. It also says funds credited to that account became Klickl Europe’s property.
  6. Klickl Europe is not a random payee.
    Klickl discloses that Klickl Europe is incorporated in Poland under KRS 0001053580 and registered under Polish virtual-asset registration RD WWW-930 for exchange, brokerage and virtual-asset account activities.
  7. This is a fraud-rail issue, not a paperwork issue.
    If multiple scam frontends routed victims through OpenPayd vIBANs into Klickl Europe, regulators should treat this as a suspected payment-enabled investment-fraud network.

Key Data Table

Entity / MechanismRoleJurisdictionEvidenceRed Flag
OpenPayd Financial Services MaltavIBAN infrastructure / payment facilitator
www.openpayd.com
MaltaGDPR response; payment summaries; BIC CFTEMTM1Victim deposits routed through OpenPayd infrastructure
Named OpenPayd vIBANsVictim-facing deposit identifiersMalta railOpenPayd says vIBANs are reconciliation tools linked to corporate clientsCreates personal-account appearance while funding corporate account
Klickl Europe Sp. z o.o.Sweep recipient / corporate account holderPolandRepeated receiver in summaries; OpenPayd GDPR responseCentral recipient of victim funds
Receiver accountKlickl Europe accountMalta IBAN railMT82CFTE28004000000000004379006Same account across multiple victims
ReferenceTransfer logicOpenPayd system“Sweep to Primary Account”Direct internal sweep pattern
Scam frontendsKXTRA, fake Peel Hunt / Peelhuntaicore, possibly moreUnknown operatorsVictim files and Peel Hunt warningMultiple brands, same suspected rail

Rail Map

Victim bank account → OpenPayd named vIBAN → immediate transfer / “Sweep to Primary Account” → Klickl Europe corporate payment account → crypto/on-ramp or settlement layer → unknown scam operators

Known scam frontends so far:

  • KXTRA / KKR Global Investment → OpenPayd vIBAN → Klickl Europe
  • Fake Peel Hunt / Peelhuntaicore → OpenPayd vIBAN → Klickl Europe

Working hypothesis:

Additional fake investment brands → same OpenPayd/Klickl rail


FinTelegram Assessment

Established Facts

OpenPayd’s GDPR response confirms that the relevant vIBAN was linked to Klickl Europe’s payment account and that funds credited to it became Klickl Europe’s property. The Humer payment summary confirms Payins totaling €100,500 followed by transfers to Klickl Europe with the reference “Sweep to Primary Account.” The newly reviewed Excel summaries show the same pattern across multiple additional victims.

Strong Inferences

The evidence points to a structured victim-fund collection rail. OpenPayd provided the vIBAN infrastructure. Klickl Europe received the funds. The same receiver account and same sweep reference appear repeatedly. That is not random payment noise.

Working Hypotheses

Klickl Europe may have acted as an on-ramp or settlement layer for the operators behind KXTRA, Peelhuntaicore and related scam brands. A stronger hypothesis is that Klickl Europe may have been closer to the fraud operation than a passive processor. That remains to be proven.

Open Questions

Who was Klickl’s customer behind these flows? Were funds converted into crypto? Which wallets, exchanges or OTC desks received the money next? Did OpenPayd and Klickl file SARs/STRs? When did OpenPayd detect the pattern? Why was the rail not stopped earlier?


Whistleblower / Victim Call

FinTelegram is collecting: OpenPayd GDPR responses, OpenPayd “Summary of payments” Excel files, vIBANs, sender bank receipts, app screenshots, WhatsApp chats, fake Peel Hunt / Peelhuntaicore materials, KXTRA screenshots, wallet addresses, transaction hashes, Klickl responses, police reports, and regulator complaints.

Victims should send files directly via Whistle42. If one victim collects files for others, written consent should be obtained.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Stay Connected

9,906FansLike
48FollowersFollow
2,130FollowersFollow
- Advertisement -spot_img

Latest Articles