Action Fraud: Social Media Used to Steal Charity Donations

The UK’s National Fraud Intelligence Bureau’s (NFIB) Proactive Intelligence Team have identified an emerging fraud where social media platforms are being used to attract members of the public to donate money to animal welfare charities overseas that do not exist.

The NFIB has discovered that criminal groups based in Spain or Cyprus and are using social media to target donors from the UK.

The money is then laundered from the UK to overseas and rather than be used to tackle animal cruelty it is simply used to support a criminal lifestyle in the sun.

They will canvass for contributions through their existing social networks which will expand over time, attracting more donors.

The NFIB were informed that the people committing this fraud are merely supplementing their income as they are always linked to organised crime groups in the UK and overseas.

Protection Advice

Sometimes the article or post on social media may indicate the payments are for charitable organisation or a “worthy cause”. Sadly, not in all instances are these genuine, and if any doubt please undertake your own due diligence.

Other Signs to look for Include:

  • Genuine charities are registered with the Charity Commission and print their registration details on all documentation, collection bags, envelopes, electronic communications etc. Check these details exist and also contact the Charity Commission to confirm they are authentic.
  • If the collection is for a charity you know is genuine, check the collection is authorised by asking the charity directly, using contact details from the phone book or a website that you know is genuine.
  • Watch out for poor grammar and spelling.
  • Send your donation to the charity directly. This may mean going to a little more trouble, but at least you can be sure your donation will get to where it’s intended.

If you have any concerns you can also get further information from Gov.uk.

ActionFraud:

UK Fraud Hits £1.1bn As Cyber Crime Soars:

« Georgia - A State Of Cybersecurity
Auditors Need To Know About Cyber Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Biscom

Biscom

Biscom offers solutions for secure file transfer, synchronization, file translation, and mobile devices, designed to deliver mission-critical reliability, streamline workflows and reduce costs.

RoboForm

RoboForm

RoboForm's industry-leading encryption technology securely stores your passwords, with one Master Password serving as your encryption key.

Thycotic

Thycotic

Thycotic prevents cyber attacks by securing passwords, protecting endpoints and controlling application access.

INCIBE-CERT

INCIBE-CERT

INCIBE-CERT is the reference security incident response center for citizens and private law entities in Spain

tietoEVRY

tietoEVRY

TietoEVRY creates digital advantage for businesses and society. We are a leading digital services and software company with local presence and global capabilities.

Clavister

Clavister

Clavister is a network security vendor delivering a full range of network security solutions for both physical and virtualized environments.

Ntrepid

Ntrepid

Ntrepid products provide protection from web threats and enable organizations to safely conduct their online activities.

ThreatAdvice

ThreatAdvice

ThreatAdvice is a provider of cybersecurity education, awareness and threat intelligence.

Forensic Pathways

Forensic Pathways

Forensic Pathways focus on the provision of digital forensic technologies, offering clients unique technologies in the management of mobile phone data, image analysis and ballistics analysis.

Tutamantic

Tutamantic

Tutamantic develops software that reduces security risks and weaknesses during the architectural and design stages.

Lightship Security

Lightship Security

Lightship Security is an accredited Common Criteria and FIPS 140-2 IT security testing laboratory that specializes in test conformance automation solutions and IT product security certifications.

Vulcan Cyber

Vulcan Cyber

At Vulcan, we’re modernizing the way enterprises reduce their cyber risk. From detection to resolution, we automate and orchestrate the vulnerability remediation process dynamically and at scale.

Wizard Cyber

Wizard Cyber

At Wizard Cyber, we simplify cyber security, delivering an advanced service that protects your high-risk assets from the complex threats that technology alone can miss, 24/7.

Cympire

Cympire

Cympire significantly increases an organisation’s Cyber Resilience through continuous Training and Assessment. Cyber Security Training Platform. Cloud-based and fully customizable Cyber Range.

Blok Cyber Security

Blok Cyber Security

Blok provide small businesses and sole traders, with affordable, managed Cyber Security Packages that offer immediate protection and peace of mind.

CyberUpgrade

CyberUpgrade

CyberUpgrade is on a mission to empower executives to gain control over their organization’s cybersecurity.