Stock Market Cybercrime Definition, Cases and Perspectives

Total Page:16

File Type:pdf, Size:1020Kb

Stock Market Cybercrime Definition, Cases and Perspectives STOCK MARKET CYBERCRIME DEFINITION, CASES AND PERSPECTIVES ALEXANDRE NEYRET 1/68 Summary For several years, and the subject has often been referred to in the press, cybercrime has been invading our world. The financial sector and more especially the stock market sector are no exception. Every year, new stock market “cyberattacks” (insider trading by hacking confidential information, the dissemination of false financial information influencing the share price of a listed company by creating “fake” websites or fake rumours on social media, the manipulation of financial instrument prices by hacking trading terminals, etc.) continue to appear. It was therefore crucial to try to provide an overview of stock market cybercrime in order to better understand the modi operandi and the problems of potential stock market breaches with a “cyber” component, which the Autorité des Marchés Financiers (hereinafter referred to as the “AMF”) may have to deal with. After defining stock market cybercrime and obtaining an estimate of the cost of cybercrime (in general) and of the impact of a cyberattack on a listed company’s share price, we analysed the various cases available publicly, sometimes trying to anticipate the future of cyber insider trading, cyber price manipulation and cyber dissemination of false information. Finally, a summarised mapping accompanied by an analysis of the factors contributing to stock market cybercrime demonstrates its future importance and its impact on the entire stock market distribution chain. 1 / 68 CONTENTS 1. Introduction ............................................................................................................................................. 4 1.1. Cybercrime and Financial Cybercrime ............................................................................................... 4 1.2. Stock Market Cybercrime ................................................................................................................ 5 1.3. Review of Existing Literature ........................................................................................................... 8 1.4. Scope, Plan and Exclusions .............................................................................................................. 9 2. Cost of Cybercrime ................................................................................................................................. 10 2.1. Uncertainties ............................................................................................................................... 10 2.2. Macro estimates .......................................................................................................................... 11 2.3. Impacts on listed companies ......................................................................................................... 14 2.4. Cost of financial and stock market cybercrime ................................................................................ 16 3. Cyber Insider Trading .............................................................................................................................. 17 3.1. Cases .......................................................................................................................................... 17 3.1.1. Information Provider ................................................................................................................ 18 3.1.2. Bank ....................................................................................................................................... 20 3.1.3. Law Firm ................................................................................................................................. 20 3.1.4. Stock Market Regulator ............................................................................................................ 20 3.1.5. Stock Exchange ........................................................................................................................ 22 3.2. Perspectives ................................................................................................................................ 23 3.2.1. Dark Web and Insiders ............................................................................................................. 23 3.2.2. Cyberattacks as Inside Information ............................................................................................ 24 3.2.3. Data Leaks, a Future Hotbed of Cyberattacks .............................................................................. 24 3.2.4. Sensitive Economic Indices and Indicators .................................................................................. 25 3.2.5. New Entry Points ..................................................................................................................... 25 4. Cyber Price Manipulation ........................................................................................................................ 28 4.1. Cases .......................................................................................................................................... 28 4.1.1. Intrusion into Retail Trading Accounts ........................................................................................ 28 4.1.2. Theft of Personal Data and Dissemination of False Information .................................................... 29 4.1.3. Intrusion into Professional Trading Accounts .............................................................................. 30 4.1.4. Organised and Sophisticated Cybercriminal Groups..................................................................... 31 4.2. Perspectives ................................................................................................................................ 32 4.2.1. Intrusion into Trading Accounts and Mobile Applications ............................................................. 32 4.2.2. Algorithms .............................................................................................................................. 33 5. Cyber Dissemination of False Information ................................................................................................. 34 5.1. Cases .......................................................................................................................................... 34 5.1.1. The Vinci Galaxy ...................................................................................................................... 34 5.1.2. Dissemination of False Information by Twitter ............................................................................ 40 5.1.3. Dissemination of False Information by EDGAR ............................................................................ 43 2 / 68 5.2. Perspectives ................................................................................................................................ 44 5.2.1. Very Wide Scope...................................................................................................................... 44 5.2.2. Fake Data ................................................................................................................................ 45 5.2.3. Deepfake and Artificial Intelligence ........................................................................................... 45 6. Cyberattacks on Stock Exchanges ............................................................................................................. 47 7. Stock Market Cybercrime and its Aggravating and Mitigating Factors .......................................................... 49 8. Conclusion ............................................................................................................................................. 50 3 / 68 1. Introduction In the 13th edition of its report on global risks in 2018,1 the World Economic Forum ranks the two risks of cyberattacks and massive data theft/loss among the five major risks in terms of their likelihood of occurrence, alongside environmental risks such as natural disasters, extreme weather conditions and climate change risks, and in sixth place in terms of severity after weapons of mass destruction (sic!), environmental risks and water shortage crises. 1.1. Cybercrime and Financial Cybercrime More generally, the paradigm shift over the past two decades has been to no longer consider cyber risk as one specific risk among many (somewhere between IT risk and operational risk), but rather as a much more generic risk, or even as a metarisk.2 This is because, in today’s world, everything has become digital, connected, and therefore potentially subject to IT attacks. The digital age has, on the one hand, enabled the renewed use of existing fraudulent schemes and, on the other, paved the way for the emergence of new criminal modi operandi. The term “cyber” is frequently used, in particular to describe any type of crime, whether cyberfraud or cyberterrorism. There is no commonly accepted legal definition of cybercrime. Nevertheless, the definition3 borrowed from the inter-ministerial working group for combating cybercrime is suggested here: “Cybercrime consists of all criminal offences that are either attempted or committed against or by means of an information system and communication network,4 mainly online.” The scope is therefore (intentionally) vast. The aim here is not to adopt a legal approach to cybercrime, so we will not dwell on this definition, which varies from
Recommended publications
  • The Economics of Cryptocurrency Pump and Dump Schemes
    The Economics of Cryptocurrency Pump and Dump Schemes JT Hamrick, Farhang Rouhi, Arghya Mukherjee, Amir Feder, Neil Gandal, Tyler Moore, and Marie Vasek∗ Abstract The surge of interest in cryptocurrencies has been accompanied by a pro- liferation of fraud. This paper examines pump and dump schemes. The recent explosion of nearly 2,000 cryptocurrencies in an unregulated environment has expanded the scope for abuse. We quantify the scope of cryptocurrency pump and dump on Discord and Telegram, two popular group-messaging platforms. We joined all relevant Telegram and Discord groups/channels and identified nearly 5,000 different pumps. Our findings provide the first measure of the scope of pumps and suggest that this phenomenon is widespread and prices often rise significantly. We also examine which factors affect the pump's \suc- cess." 1 Introduction As mainstream finance invests in cryptocurrency assets and as some countries take steps toward legalizing bitcoin as a payment system, it is important to understand how susceptible cryptocurrency markets are to manipulation. This is especially true since cryptocurrency assets are no longer a niche market. The market capitaliza- tion of all cryptocurrencies exceeded $800 Billion at the end of 2017. Even after the huge fall in valuations, the market capitalization of these assets is currently around $140 Billion. This valuation is greater than the fifth largest U.S. commer- cial bank/commercial bank holding company in 2018, Morgan Stanley, which has a market capitalization of approximately $100 Billion.1 In this paper, we examine a particular type of price manipulation: the \pump and dump" scheme. These schemes inflate the price of an asset temporarily so a ∗Hamrick: University of Tulsa, [email protected].
    [Show full text]
  • Complete Guide for Trading Pump and Dump Stocks
    Complete Guide for Trading Pump and Dump Stocks Pump and dump stocks make me sick and just to be clear I do not trade these setups. When I look at a stock chart I normally see bulls and bears battling to see who will come out on top. However, when I look at a pump and dump stock it just saddens me. For those of you that watched the show Spartacus, it’s like when Gladiators have to fight outside of the arena and in dark alleys. As I see the sharp incline up and subsequent collapse, I think of all the poor souls that have lost IRA accounts, college savings and down payments for their homes. Well in this article, I’m going to cover 2 ways you can profit from these setups and clues a pump and dump scenario is taking place. Before we hit the two strategies, let’s first ground ourselves on the background of pump and dump stocks. What is a Pump and Dump Stock? These are stocks that shoot up like a rocket in a short period of time, only to crash down just as quickly shortly thereafter. The stocks often come out of nowhere and then the buzz on them reaches a feverish pitch. We can break the pump and dump down into three phases. Pump and Dump Phases Phase 1 – The Markup Every phase of the pump and dump scheme are challenging, but phase one is really tricky. The ring of thieves need to come up with an entire plan of attack to drum up excitement for the security but more importantly people pulling out their own cash.
    [Show full text]
  • View Final Report (PDF)
    TABLE OF CONTENTS TABLE OF CONTENTS I EXECUTIVE SUMMARY III INTRODUCTION 1 GENESIS OF THE PROJECT 1 RESEARCH QUESTIONS 1 INDUSTRY SITUATION 2 METHODOLOGY 3 GENERAL COMMENTS ON INTERVIEWS 5 APT1 (CHINA) 6 SUMMARY 7 THE GROUP 7 TIMELINE 7 TYPOLOGY OF ATTACKS 9 DISCLOSURE EVENTS 9 APT10 (CHINA) 13 INTRODUCTION 14 THE GROUP 14 TIMELINE 15 TYPOLOGY OF ATTACKS 16 DISCLOSURE EVENTS 18 COBALT (CRIMINAL GROUP) 22 INTRODUCTION 23 THE GROUP 23 TIMELINE 25 TYPOLOGY OF ATTACKS 27 DISCLOSURE EVENTS 30 APT33 (IRAN) 33 INTRODUCTION 34 THE GROUP 34 TIMELINE 35 TYPOLOGY OF ATTACKS 37 DISCLOSURE EVENTS 38 APT34 (IRAN) 41 INTRODUCTION 42 THE GROUP 42 SIPA Capstone 2020 i The Impact of Information Disclosures on APT Operations TIMELINE 43 TYPOLOGY OF ATTACKS 44 DISCLOSURE EVENTS 48 APT38 (NORTH KOREA) 52 INTRODUCTION 53 THE GROUP 53 TIMELINE 55 TYPOLOGY OF ATTACKS 59 DISCLOSURE EVENTS 61 APT28 (RUSSIA) 65 INTRODUCTION 66 THE GROUP 66 TIMELINE 66 TYPOLOGY OF ATTACKS 69 DISCLOSURE EVENTS 71 APT29 (RUSSIA) 74 INTRODUCTION 75 THE GROUP 75 TIMELINE 76 TYPOLOGY OF ATTACKS 79 DISCLOSURE EVENTS 81 COMPARISON AND ANALYSIS 84 DIFFERENCES BETWEEN ACTOR RESPONSE 84 CONTRIBUTING FACTORS TO SIMILARITIES AND DIFFERENCES 86 MEASURING THE SUCCESS OF DISCLOSURES 90 IMPLICATIONS OF OUR RESEARCH 92 FOR PERSISTENT ENGAGEMENT AND FORWARD DEFENSE 92 FOR PRIVATE CYBERSECURITY VENDORS 96 FOR THE FINANCIAL SECTOR 96 ROOM FOR FURTHER RESEARCH 97 ACKNOWLEDGEMENTS 98 ABOUT THE TEAM 99 SIPA Capstone 2020 ii The Impact of Information Disclosures on APT Operations EXECUTIVE SUMMARY This project was completed to fulfill the including the scope of the disclosure and capstone requirement for Columbia Uni- the disclosing actor.
    [Show full text]
  • Exploring Stakeholder Mobilization in the Instance of Corporate Fraud and Ponzi Schemes
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by OPUS: Open Uleth Scholarship - University of Lethbridge Research Repository University of Lethbridge Research Repository OPUS http://opus.uleth.ca Theses Business, Dhillon School of 2011 Get mad, stay mad : exploring stakeholder mobilization in the instance of corporate fraud and Ponzi schemes McCormick, Cameron Anthony Lethbridge, Alta. : University of Lethbridge, Faculty of Management, c2011 http://hdl.handle.net/10133/3248 Downloaded from University of Lethbridge Research Repository, OPUS GET MAD, STAY MAD: EXPLORING STAKEHOLDER MOBILIZATION IN THE INSTANCE OF CORPORATE FRAUD AND PONZI SCHEMES Cameron Anthony McCormick Bachelor of Commerce in Cooperative Education, University of Alberta, 2003 A Thesis Submitted to the School of Graduate Studies of the University of Lethbridge in Partial Fulfillment of the Requirements for the Degree MASTER OF SCIENCE IN MANAGEMENT Faculty of Management University of Lethbridge LETHBRIDGE, ALBERTA, CANADA © Cameron McCormick, 2011 Dedication This thesis is the result of an off the cuff remark she made on our very first date; therefore, I dedicate this to my darling wife: Krista. Without your love, kindness and support, I never would have started this journey, let alone finish it. I love you and thank- you for believing in me when no one else did. iii Abstract Using a multi-case study, three Ponzi schemes were investigated: Road2Gold, Bernie Madoff’s empire, and the Earl Jones affair. This grounded study used an inductive bottom-up methodology to observe and describe stakeholder mobilization in reaction to corporate fraud. This research on stakeholder behaviour in Ponzi schemes articulates new theory for describing stakeholder behaviour and possible determinants for successful mobilization to action.
    [Show full text]
  • The Cyber Threat to UK Business 2016/2017 Report Page 1
    The cyber threat to UK business 2016/2017 Report Page 1 Contents Foreword (Ciaran Martin - NCSC) ..................................................................................................................................... 2 Foreword (Donald Toon - NCA) ........................................................................................................................................ 3 Executive summary ........................................................................................................................................................... 4 What is the threat? ........................................................................................................................................................... 5 The year in review: pivotal incidents of 2016 ................................................................................................................ 10 Horizon scanning: future threats .................................................................................................................................... 13 Fighting back: what can business do? ............................................................................................................................ 15 Case studies illustrating UK LEA and industry joint protect work ................................................................................. 19 Debate: can we stop the Internet from being used for crime? .................................................................................... 20 Page 2 The
    [Show full text]
  • Who Is Knocking on the Telnet Port: a Large-Scale Empirical Study of Network Scanning
    Session 15: Network Security 2 ASIACCS’18, June 4–8, 2018, Incheon, Republic of Korea Who is Knocking on the Telnet Port: A Large-Scale Empirical Study of Network Scanning Hwanjo Heo Seungwon Shin KAIST KAIST ETRI [email protected] [email protected] ABSTRACT this information (i.e., who serves what) is absolutely imperative for Network scanning is the primary procedure preceding many net- attackers. Hence, attackers aggressively gather this information by work attacks. Until recently, network scanning has been widely directly searching target hosts or even employing already deployed studied to report a continued growth in volume and Internet-wide malware (e.g., botnet) for efficiency. trends including the underpinning of distributed scannings by lin- As such, since this network scanning is an indispensable process gering Internet worms. It is, nevertheless, imperative to keep us for cyber attacks, attention should still be paid to it, even though informed with the current state of network scanning, for factual it has been studied, investigated, and monitored for a long time. and comprehensive understanding of the security threats we are Indeed, researchers and practitioners have already deeply surveyed, facing, and new trends to serve as the presage of imminent threats. analyzed, and measured this behavior [3, 8, 26, 34, 35]. However, it In this paper, we analyze the up-to-date connection-level log should be kept in mind that the characteristics of network scanning data of a large-scale campus network to study the recent scanning (e.g., main target services and scan origins) are quite sensitive to the trends in breadth.
    [Show full text]
  • Profiles of Madoff Ponzi Scheme Victims Hossein Nouri Brian Kremenich*
    Journal of Forensic and Investigative Accounting Volume 11: Issue 2, Special Edition, 2019 Profiles of Madoff Ponzi Scheme Victims Hossein Nouri Brian Kremenich* Background Far too often, when news of devastation or major crime breaks, media headlines focus on negative outcomes and perpetrators, with the victims only receiving a cursory glance: Hijackers Crash Commercial Airliners into World Trade Center, Pentagon Hurricane Karina Bursts Levees, New Orleans Underwater Bernie Madoff’s Ponzi Scheme Defrauds Investors out of $65 Billion After the initial shock, investigations begin to piece together the details of the events that took place and learn how the disaster happened. The hijackers smuggled knives and threatened to blow up the planes in order to take control of the cockpit. Hurricane Katrina’s winds generated a storm surge that overwhelmed a strained levee system until it could no longer resist the perilous conditions. Bernie Madoff leveraged the trust gained during his financial career to recruit investors who did not see through his facade. Over time, stories of the individuals harmed by the crises rise to public attention. Surviving World Trade Center workers shared recollections of that fateful September morning. Newly homeless New Orleans families recalled the cherished memories made in their lost homes as they comb through their water-soaked belongings. Madoff victims wrote heartbreaking letters to the court detailing the scope of their financial calamity in supporting the maximum prison sentence for Madoff. History will remember Bernard “Bernie” Madoff for operating the largest-ever Ponzi scheme, a ploy in which fund investors receive a return based on the capital contributed by new investors rather than through returns on investment.
    [Show full text]
  • The Anatomy of a Cryptocurrency Pump-And-Dump Scheme
    The Anatomy of a Cryptocurrency Pump-and-Dump Scheme Jiahua Xu, École polytechnique fédérale de Lausanne (EPFL); Benjamin Livshits, Imperial College London https://www.usenix.org/conference/usenixsecurity19/presentation/xu-jiahua This paper is included in the Proceedings of the 28th USENIX Security Symposium. August 14–16, 2019 • Santa Clara, CA, USA 978-1-939133-06-9 Open access to the Proceedings of the 28th USENIX Security Symposium is sponsored by USENIX. The Anatomy of a Cryptocurrency Pump-and-Dump Scheme Jiahua Xu Benjamin Livshits École Polytechnique Fédérale de Lausanne (EPFL) Imperial College London Imperial College London UCL Centre for Blockchain Technologies Harvard University Brave Software Abstract Regulation: In February 2018, the CFTC (Commodity Fu- tures Trading Commission) issued warnings to consumers [8] While pump-and-dump schemes have attracted the atten- about the possibility of cryptocurrency pump-and-dump tion of cryptocurrency observers and regulators alike, this schemes. It also offered a substantial reward to whistle- paper represents the first detailed empirical query of pump- blowers around the same time [12]. and-dump activities in cryptocurrency markets. We present In October 2018, the SEC (Securities and Exchange Com- a case study of a recent pump-and-dump event, investigate mission) filed a subpoena enforcement against an investment 412 pump-and-dump activities organized in Telegram chan- company trust and trustee for an alleged pump-and-dump ICO nels from June 17, 2018 to February 26, 2019, and discover scheme [27]. patterns in crypto-markets associated with pump-and-dump Clearly, regulators are aiming to find perpetrators of pump- schemes.
    [Show full text]
  • Cyber Threats Facing America: an Overview of the Cybersecurity Threat Landscape
    S. Hrg. 115–298 CYBER THREATS FACING AMERICA: AN OVERVIEW OF THE CYBERSECURITY THREAT LANDSCAPE HEARING BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE ONE HUNDRED FIFTEENTH CONGRESS FIRST SESSION MAY 10, 2017 Available via the World Wide Web: http://www.fdsys.gov/ Printed for the use of the Committee on Homeland Security and Governmental Affairs ( U.S. GOVERNMENT PUBLISHING OFFICE 27–390 PDF WASHINGTON : 2018 COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS RON JOHNSON, Wisconsin, Chairman JOHN MCCAIN, Arizona CLAIRE MCCASKILL, Missouri ROB PORTMAN, Ohio THOMAS R. CARPER, Delaware RAND PAUL, Kentucky JON TESTER, Montana JAMES LANKFORD, Oklahoma HEIDI HEITKAMP, North Dakota MICHAEL B. ENZI, Wyoming GARY C. PETERS, Michigan JOHN HOEVEN, North Dakota MAGGIE HASSAN, New Hampshire STEVE DAINES, Montana KAMALA D. HARRIS, California CHRISTOPHER R. HIXON, Staff Director GABRIELLE D’ADAMO SINGER, Chief Counsel COLLEEN BERNY, Professional Staff Member MARGARET E. DAUM, Minority Staff Director JULIE KLEIN, Minority Professional Staff Member LAURA W. KILBRIDE, Chief Clerk BONNI DINERSTEIN, Hearing Clerk (II) C O N T E N T S Opening statements: Page Senator Johnson ............................................................................................... 1 Senator McCaskill ............................................................................................ 2 Senator Lankford .............................................................................................. 15 Senator Daines
    [Show full text]
  • Investment Swindles and Con Schemes I. Introduction
    INVESTMENT SWINDLES AND CON SCHEMES TABLE OF CONTENTS I. INTRODUCTION ........................................................................................................................................... 1 II. INVESTMENT SWINDLES AND CON SCHEMES OVERVIEW Who Are the Perpetrators and Victims of These Schemes? .............................................................................. 3 Why Do the Perpetrators Commit These Con Schemes? .................................................................................. 3 Why Do Consumers Become Victims to These Schemes? ................................................................................ 4 What Are the Red Flags That Characterize These Con Schemes? .................................................................... 4 How Are These Con Schemes Executed? ............................................................................................................. 5 Effects on Consumers .............................................................................................................................................. 6 Review Questions ..................................................................................................................................................... 7 III. INVESTMENT SCHEMES Introduction ............................................................................................................................................................... 8 Bonds ......................................................................................................................................................................
    [Show full text]
  • Download the Sample Pages
    Vice President, Publisher: Tim Moore Associate Publisher and Director of Marketing: Amy Neidlinger Executive Editor: Jeanne Glasser Editorial Assistant: Myesha Graham Development Editor: Russ Hall Operations Manager: Gina Kanouse Senior Marketing Manager: Julie Phifer Publicity Manager: Laura Czaja Assistant Marketing Manager: Megan Colvin Cover Designer: Chuti Prasertsith Managing Editor: Kristy Hart Project Editors: Jovana San Nicolas-Shirley and Alexandra Maurer Copy Editor: Language Logistics Proofreader: Seth Kerney Indexer: Rebecca Salerno Compositors: Gloria Schurick and Jake McFarland Manufacturing Buyer: Dan Uhrig © 2011 by Pearson Education, Inc. Publishing as FT Press Upper Saddle River, New Jersey 07458 FT Press offers excellent discounts on this book when ordered in quantity for bulk purchases or special sales. For more information, please contact U.S. Corporate and Government Sales, 1-800-382-3419, [email protected]. For sales outside the U.S., please contact International Sales at [email protected]. Company and product names mentioned herein are the trademarks or registered trademarks of their respective owners. All rights reserved. No part of this book may be reproduced, in any form or by any means, without permission in writing from the publisher. Printed in the United States of America First Printing December 2010 ISBN-10: 0-13-138556-9 ISBN-13: 978-0-13-138556-6 Pearson Education LTD. Pearson Education Australia PTY, Limited. Pearson Education Singapore, Pte. Ltd. Pearson Education North Asia, Ltd. Pearson Education Canada, Ltd. Pearson Educación de Mexico, S.A. de C.V. Pearson Education—Japan Pearson Education Malaysia, Pte. Ltd. Library of Congress Cataloging-in-Publication Data Springer, Kenneth S., 1953- Digging for disclosure : tactics for protecting your firm’s assets from swindlers, scammers, and imposters / Kenneth S.
    [Show full text]
  • Hack Para Big Time 2019 New Inazuma Eleven GO 2K19 Mini Forum, Answers, Tips, Tricks and Glitches
    hack para big time 2019 New Inazuma Eleven GO 2K19 Mini Forum, Answers, Tips, Tricks and Glitches. Ask a Question or Help other Players by Answering the Questions on the List Below: Rate this app: More details. For Android: 4.0 and up Guide: New Inazuma Eleven GO 2K19 cheats tutorial When updated: 2019-06-30 Star Rating: 4.1952863 Name: New Inazuma Eleven GO 2K19 hack for android Extension: Apk Author: NGmer File Name: inazuma.newtips.eleventips.soccerguide Current Version: 2.1 User Rating: Everyone Downloads: 1000- Version: mod, apk, unlock System: Android Type: Education. Share New Inazuma Eleven GO 2K19 Cheats Guides Hints And Tutorials - Best Tactics from Users below. New Inazuma Eleven GO 2K19 Tricks and Codes: Add your tips. Hints and Tips: Glitches: Codes: Guide: Easter Eggs: Advice for new users: Please wait 10 seconds. New Inazuma Eleven GO 2K19 Hack Cheats Codes Tips Tricks Advices for New Users and Q&A! Add your questions or answers. Q: How to get the best score? Q: What is your favourite trick in this game/app? Q: What is your strategy? Watch New Inazuma Eleven GO 2K19 videoreviews, gameplays, videoinstructions, tutorials, guides, tips and tricks recorded by users, pro players and testers. New Inazuma Eleven GO 2K19 Gameplay, Trailers and Related Videos. Watch Inazuma Eleven Go Strikers 2013 Raimon GO 2.0 Vs Inazuma Legend Japan Wii 1080p (Dolphin/Gameplay) video. Watch NBA 2K19 ► MY PRO PLAYER #19 - ON LES EXPLOOOOSE video. Watch Mashup || Inazuma Eleven GO opening 2 VS Sincara WWE || video. Watch Inazuma Eleven Go Strikers 2013 Part3 video.
    [Show full text]