Fraud Online & On The Telephone

In 2021 alone, 3,625 people were victims of courier fraud, with loses totalling more than £15.2 million.

Typically, courier fraudsters target their victims by claiming to be a police officer or a member of staff from a victim’s bank. They often pressure people into making quick financial decisions to assist with fictitious investigations.  An analysis of data from the British National Fraud Intelligence Bureau (NFIB) has highlighted four modus operandi (MOs) which are now more commonly being used by fraudsters.

Four Common Methods Used By Courier Fraudsters

Bank card expiry: Fraudsters claim to be from the victim’s bank and say their card is no longer valid. They ask for the pin number and then send a “courier” to collect the card before using it for fraudulent purposes.

Purchasing high end items: The suspects pretend to be police officers and ask the victim to help with an undercover operation by purchasing expensive items like watches, jewellry and gold. Once the item is bought, the victim will hand over the item to the criminal.

Counterfeit cash/bank investigation: A person claiming to be a police or banking official informs the victim that they need to help with a banking corruption investigation. The victim is told to withdraw a large amount of money and the cash is picked up later by a courier to “check for fingerprints or to identify counterfeit bank notes”.

Computer takeover: The fraudster telephones the victim, purporting to be from their Internet Service Provider (ISP) saying that they have had an issue with their Internet connectivity and they are due compensation. 
The victim is persuaded to download a remote access application, giving the suspects access to their home computers. The fraudster persuades the victims into thinking that they have been paid too much compensation and the victims then withdraw cash to pay the money back, which is later collected by a courier.

Superintendent Edelle Michaels, from the Lead Force Operations Room at the City of London Police, said: 
“Fraudsters are callous individuals and courier fraud is no exception. They prey on some of the most vulnerable and most trustworthy members of society. 

Victims of courier fraud typically tend to be between the ages of 70 to 89 years old, with women more likely to be targeted than men.

“We would urge everyone who is involved in a caring or supportive role to people of these ages to start conversations about the tactics used and warning signs to look out for on courier fraud... Just having that conversation could be the difference on whether someone becomes a victim of this trust-eroding crime.”

Action Fraud:      Northants Police:    The Star:      N. Yorkshire Police:  

You Might Also Read: 

Remote Access Scams Open The Door To Thieves:

 

« General Motors Hack Exposes Car Owner Information
US Banks Hit By Russian Cyber Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

EfficientIP

EfficientIP

EfficientIP helps organizations drive business efficiency through agile, secure and reliable network infrastructures.

Applied Risk

Applied Risk

Applied Risk is an established leader in Industrial Control Systems security, focused on critical infrastructure security and combating security breaches that pose a significant threat.

Epati Information Technologies

Epati Information Technologies

ePati Information Technologies is a specialist in information technology and cyber security.

Red Sift

Red Sift

Red Sift is the only integrated cloud email and brand protection platform, supporting organizations to secure their communications.

Innovation Cybersecurity Ecosystem at BLOCK71 (ICE71)

Innovation Cybersecurity Ecosystem at BLOCK71 (ICE71)

Innovation Cybersecurity Ecosystem at BLOCK71 (ICE71) is Singapore's first cybersecurity entrepreneur hub.

Fly Ventures

Fly Ventures

Fly Ventures is a seed-stage venture capital fund for outstanding teams building Enterprise and Deep Tech startups in Europe.

Penten

Penten

Penten is an Australian-based cyber security company focused on innovation in secure mobility and applied AI (artificial intelligence).

Hyperwise Ventures

Hyperwise Ventures

Hyperwise Ventures lead seed investments in startups in the cyber security and enterprise software spaces.

Atakama

Atakama

With Atakama, data remains encrypted until the very moment it is used, and the ability to decrypt is based on zero trust architecture.

Palmchip

Palmchip

Palmchip is a Cyber Security, SOC and Software consulting company. We design and develop high performance and secure applications.

Soteria

Soteria

Soteria is a global leader in the development, integration and implementation of advanced cyber security, intelligence and IT solutions, delivering complete end-to-end solutions.

Canonic Security

Canonic Security

Canonic streamlines app review, continuously monitors apps, and reduces the risks involved in third-party access to your data.

Commvault

Commvault

Commvault's data protection and information management solutions help companies protect, access and use all of their data, anywhere and anytime.

Strivacity

Strivacity

Strivacity lets brands quickly add secure login and identity management capabilities to their customer-facing applications without tying up an army of developers or consultants to do it.

Highen Fintech

Highen Fintech

Highen is a blockchain software development company with offices in the United States and development centers in India.

Aberrant

Aberrant

A radically new approach to managing information security. Aberrant is the single pane of glass through which a security program can be viewed.