Action Fraud: Social Media Used to Steal Charity Donations

The UK’s National Fraud Intelligence Bureau’s (NFIB) Proactive Intelligence Team have identified an emerging fraud where social media platforms are being used to attract members of the public to donate money to animal welfare charities overseas that do not exist.

The NFIB has discovered that criminal groups based in Spain or Cyprus and are using social media to target donors from the UK.

The money is then laundered from the UK to overseas and rather than be used to tackle animal cruelty it is simply used to support a criminal lifestyle in the sun.

They will canvass for contributions through their existing social networks which will expand over time, attracting more donors.

The NFIB were informed that the people committing this fraud are merely supplementing their income as they are always linked to organised crime groups in the UK and overseas.

Protection Advice

Sometimes the article or post on social media may indicate the payments are for charitable organisation or a “worthy cause”. Sadly, not in all instances are these genuine, and if any doubt please undertake your own due diligence.

Other Signs to look for Include:

  • Genuine charities are registered with the Charity Commission and print their registration details on all documentation, collection bags, envelopes, electronic communications etc. Check these details exist and also contact the Charity Commission to confirm they are authentic.
  • If the collection is for a charity you know is genuine, check the collection is authorised by asking the charity directly, using contact details from the phone book or a website that you know is genuine.
  • Watch out for poor grammar and spelling.
  • Send your donation to the charity directly. This may mean going to a little more trouble, but at least you can be sure your donation will get to where it’s intended.

If you have any concerns you can also get further information from Gov.uk.

ActionFraud:

UK Fraud Hits £1.1bn As Cyber Crime Soars:

« Georgia - A State Of Cybersecurity
Auditors Need To Know About Cyber Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Signal Sciences

Signal Sciences

Signal Sciences Web Protection Platform (WPP) provides comprehensive threat protection and security visibility for web applications, microservices, and APIs on any platform.

Exatel

Exatel

Exatel is Poland’s leading provider of ICT security services.

TitanHQ

TitanHQ

TitanHQ offers ultimate protection from internet based threats and powerful Web filtering functionalities to SMBs, Service Providers and Education sectors around the World.

Certis

Certis

Certis is a leading advanced integrated security organisation that develops and delivers multi-disciplinary security and integrated services.

Anglo African

Anglo African

Anglo African is an information technology firm providing end-to-end solutions to different industries, from IT Infrastructure to DataCom as well as Cloud & InfoSec services.

Safetica

Safetica

Safetica Technologies is a Czech software company that delivers data protection solutions for businesses of all types and sizes.

Envelop Risk

Envelop Risk

Envelop Risk is a global specialty cyber insurance firm, combining decades of insurance industry expertise with sophisticated cyber and artificial intelligence-based analytics.

Conatix

Conatix

Conatix was formed to apply recent advances in AI and other fields of technology to insider fraud, one of the most intractable problems in cybersecurity.

Loki Labs

Loki Labs

Loki Labs provides expert cyber security solutions and services, including vulnerability assessments & penetration testing, emergency incident response, and managed security.

Exterro

Exterro

Exterro is a leading provider of e-discovery and information governance software specifically designed for in-house legal, privacy and IT teams at Global 2000 and Am Law 200 organizations.

Institute for Pervasive Cybersecurity - Boise State University

Institute for Pervasive Cybersecurity - Boise State University

Boise State University’s Institute for Pervasive Cybersecurity is a leader of innovative cybersecurity research and advancement in Idaho and the region.

Grant Thornton

Grant Thornton

Grant Thornton is one of the world’s leading networks of independent assurance, tax and advisory firms.

Antigen Security

Antigen Security

Antigen Security is a Digital Forensics, Incident Response and Recovery Engineering firm helping businesses and service providers prepare for, respond to, and recover from cyber threats.

The Hacking Games

The Hacking Games

The Hacking Games' Mission is to inspire, educate and mobilise a generation of ethical hackers to make the world a safer place.

Pvotal Technologies

Pvotal Technologies

Pvotal Technologies engineer complex, automated processes aligned with best AIOps, BizDevOps, DevSecOps, CloudOps, and ITOps practices.

Hubble

Hubble

Hubble grew from the idea that legacy solutions were failing to provide organizations with the asset visibility they needed to effectively secure and operate their businesses.