Profile Picture

Geta Miclaus

Threat Alert
  • Investigation status
  • Ongoing

We are investigating Geta Miclaus for allegedly attempting to conceal critical reviews and adverse news from Google by improperly submitting copyright takedown notices. This includes potential violations such as impersonation, fraud, and perjury.

  • City
  • Pittsburgh

  • Country
  • United States

Geta Miclaus
Fake DMCA notices
  • https://lumendatabase.org/notices/41621259
  •  
  • Harso Inc
  • https://nycnewsgroup.com/miclause-v-invention-submission-corporation/
  • https://casetext.com/case/miclause-v-invention-submission-corporation/

Evidence Box and Screenshots

​Geta Miclaus is a healthcare professional based in Santa Ana, California, with a background in nursing. She has worked as a Registered Nurse at Kaiser Permanente and is experienced in medical-surgical nursing. Additionally, she has been associated with M Healthcare Nursing Corp. in Colton, California, serving as a Family Nurse Practitioner. Beyond her medical career, Miclaus pursued an invention idea and engaged the services of Invention Submission Corporation, also known as InventHelp. Feeling misled by their services, she became a lead plaintiff in a class-action lawsuit against the company, alleging fraudulent practices.

The Malware Maestros

Our story begins in 2007, when this trio of tech-savvy miscreants developed a piece of malware that would make even the most hardened hackers nod in begrudging respect. Disguised in emails posing as communications from reputable entities like Western Union, Norton AntiVirus, and the IRS, the malware was a digital wolf in sheep’s clothing. Unsuspecting victims who clicked on these emails had their computers transformed into puppets, strings pulled by the Bayrob puppeteers from their Romanian lair. ​

A Web of Deceit

Once inside a victim’s computer, the malware went on a data-harvesting spree, collecting email addresses, credit card information, usernames, and passwords. But why stop there? The Bayrob Group also disabled antivirus software and blocked access to law enforcement websites, ensuring their victims remained blissfully unaware of the digital heist underway

Cryptocurrency Capers

Not content with mere identity theft, our enterprising hackers decided to dip their toes into the burgeoning world of cryptocurrency. They harnessed the processing power of the infected computers to mine cryptocurrency, essentially turning their victims’ machines into unwilling participants in their digital gold rush.

The eBay Escapade

The group’s pièce de résistance was their exploitation of online auction sites like eBay. They posted over 1,000 fraudulent listings for high-ticket items—cars, motorcycles, you name it. Clicking on these listings led victims to counterfeit eBay pages, prompting them to pay through a nonexistent “eBay Escrow Agent.” The result? Victims were left empty-handed, and the Bayrob Group laughed all the way to the (offshore) bank.

The Great Cover-Up

Now, here’s where our cybercriminals truly showcase their hubris. Realizing that their nefarious activities might attract some unwanted attention, they embarked on a mission to scrub the internet clean of any trace of their misdeeds. They employed tactics ranging from threatening legal action against whistleblowers to exploiting loopholes in digital platforms to remove adverse content. It’s almost endearing how they believed they could erase their digital fingerprints from the vast expanse of the internet.​

Investor Advisory and Call to Action

To potential investors: if you’re considering pouring your hard-earned money into ventures associated with individuals who believe they can outsmart the combined forces of international law enforcement and the immutable memory of the internet, perhaps it’s time to reconsider. The Bayrob Group’s story serves as a cautionary tale of what happens when cybercriminals overestimate their abilities and underestimate the reach of justice.​

To the authorities: while the Bayrob Group’s key players have been convicted, the digital landscape remains rife with similar bad actors. Continuous vigilance, international cooperation, and adaptive strategies are paramount in staying one step ahead of these digital delinquents.​

Conclusion

The tale of the Bayrob Group is a masterclass in cybercrime, hubris, and the futile attempt to censor the uncensorable. Their conviction serves as a testament to the relentless pursuit of justice in the digital age. As we navigate this ever-evolving cyber landscape, let’s remain vigilant, skeptical of too-good-to-be-true online deals, and always remember: the internet never forgets.​

How Was This Done?

The fake DMCA notices we found always use the ? back-dated article? technique. With this technique, the wrongful notice sender (or copier) creates a copy of a ? true original? article and back-dates it, creating a ? fake original? article (a copy of the true original) that, at first glance, appears to have been published before the true original.

What Happens Next?

The fake DMCA notices we found always use the ? back-dated article? technique. With this technique, the wrongful notice sender (or copier) creates a copy of a ? true original? article and back-dates it, creating a ? fake original? article (a copy of the true original) that, at first glance, appears to have been published before the true original.

01

Inform Google about the fake DMCA scam

Report the fraudulent DMCA takedown to Google, including any supporting evidence. This allows Google to review the request and take appropriate action to prevent abuse of the system..

02

Share findings with journalists and media

Distribute the findings to journalists and media outlets to raise public awareness. Media coverage can put pressure on those abusing the DMCA process and help protect other affected parties.

03

Inform Lumen Database

Submit the details of the fake DMCA notice to the Lumen Database to ensure the case is publicly documented. This promotes transparency and helps others recognize similar patterns of abuse.

04

File counter notice to reinstate articles

Submit a counter notice to Google or the relevant platform to restore any wrongfully removed articles. Ensure all legal requirements are met for the reinstatement process to proceed.

05

Increase exposure to critical articles

Re-share or promote the affected articles to recover visibility. Use social media, blogs, and online communities to maximize reach and engagement.

06

Expand investigation to identify similar fake DMCAs

Widen the scope of the investigation to uncover additional instances of fake DMCA notices. Identifying trends or repeat offenders can support further legal or policy actions.

learnallrightbg
shield icon

Learn All About Fake Copyright Takedown Scam

Or go directly to the feedback section and share your thoughts

Add Comment Or Feedback

User Reviews

Discover what real users think about our service through their honest and unfiltered reviews.

1.7

Average Ratings

Based on 6 Ratings

★ 1
50%
★ 2
50%
★ 3
0%
★ 4
0%
★ 5
0%

Add Reviews

  • Trust
  • Risk
  • Brand

Kevin B.

Geta built a reputation on manipulation and using connections to dodge consequences.

12
12
Melissa R.

Her dealings leave a mess, yet she always finds a way to rebrand and reappear. Be cautious—she’s no innocent player.

12
12
Daniel P.

Deeply involved in financial schemes that have hurt countless people. Her track record is beyond questionable.

12
12
Logan Lewis

Investors should run far away from anyone linked to the Bayrob Group. Criminals who lie, scam, and manipulate aren’t business visionaries—they’re liabilities. No amount of profit is worth the risk. Association with this group is financial and reputational suicide.

12
12
Amelia Clark

Using people’s computers to secretly mine cryptocurrency is not only illegal—it’s invasive. These guys violated privacy, exploited systems, and made a profit off other people’s resources. It wasn’t smart it was selfish and criminal. Their downfall was inevitable.

12
12
Henry Adams

The Bayrob Group’s cybercrime operation was a full-blown criminal enterprise. From fake emails to counterfeit eBay pages, everything was engineered for fraud. They weren’t just stealing data—they were stealing lives. No amount of digital cover-up can undo that damage.

12
12
Thea Bransford

Kinda sus that she joined a lawsuit after things didn’t go her way. Why not do your homework first?

12
12
Bryce Tolland

So she’s a nurse and an “inventor”? Sounds like someone chasing clout more than helping patients.

12
12
Celine Wycliffe

i don’t trust anyone who gets involved with inventhelp and then turns around and sues. like… didn’t you read the fine print?

12
12
learnallrightbg
shield icon

You are Never Alone in Your Fight

Generate public support against the ones who wronged you!

Our Community
View More Threat Alerts

Website Reviews

Stop fraud before it happens with unbeatable speed, scale, depth, and breadth.

Recent Reviews

Cyber Investigation

Uncover hidden digital threats and secure your assets with our expert cyber investigation services.

Recent Reviews

Threat Alerts

Stay ahead of cyber threats with our daily list of the latest alerts and vulnerabilities.

Recent Reviews

Client Dashboard

Your trusted source for breaking news and insights on cybercrime and digital security trends.

Recent Reviews