Cypher fraud - explained by STH