Investment Scams Are Increasing

Criminals used the Covid-19 pandemic to target victims online, through impersonation scams, romance fraud and investment scams.

The UK’s Financial Conduct Authority (FCA) is warning people to beware of people posing as investment advisers and offering to help them set up new schemes via online meeting platforms. “Scams are increasingly sophisticated. Fraudsters can be articulate and financially knowledgeable, with credible websites, testimonials and materials that are hard to distinguish from the real thing." says the FCA.

They ask their victim to share the screen and enable remote access, which hands over control of their device and potentially, their bank account. 

Data from Action Fraud reveals consumers reported losses of more than £78 million between January-December 2020. Throughout 2020, consumers reported average losses of £45,242 each on average when investing with fraudsters imitating genuine investment firms. 

The data has been released as part of the FCA’s ScamSmart campaign, alongside advice to help investors avoid fake firms and protect their hard-earned cash. Around 2,100 cases were reported to the FCA since July 2020 and over £25m was stolen in the 15 months from January 2021. The FCA said the number of screen-sharing scams it had seen had risen 86% to 683 in the six months from July to December 2021 compared with 367 for the same period the year before.

Screen-sharing has become a familiar part of work life, as people use popular online meeting programs in their jobs. Remote access software is a legitimate tool for services like IT support to troubleshoot problems without being in the room. But scammers are increasingly hijacking this familiarity to lure victims into granting access to more than just a picture of their screen.

Most investment scams involve one or more of the following three elements:  

  • Promoting an investment opportunity that does not actually exist – the scammer then keeps the money.
  • Promoting an investment opportunity that does exist – the scammer takes your money rather than investing it.
  • The scammer pretends to represent a legitimate investment group  

The targets are then persuaded to grant the fraudsters control of their computer, by either expanding permissions or downloading remote access software, giving them direct access to online bank accounts. This also means they can install their malware which gives them full access at any time.

The criminals do this under the guise of being helpful, offering to set up a new investment scheme and monitor it. Mark Steward, Executive Director of Enforcement at the FCA, has said to the BBC: "Investment scams can happen over many months, but sharing your screen without making the proper checks can change everything in an instant." If scammers gain control of your computer, it gives them "access to your sensitive banking and investment information, the freedom to browse at their leisure, and the ability to take whatever details they want", Steward added.

If you’ve given your bank account details to a firm you think may be operating a scam, tell your bank immediately. 

To protect yourself against scams, it’s always best to seek the advice of an expert adviser before investing your money. Investing a little bit of time and money into getting trustworthy, expert advice could save you in the long run.

FCA:        NCA:       BBC:       Lloyds Bank:      Unbiased:     UK Finance:     Fraud!:   

You Might Also Read: 

Crypto Currency Fraud Costs £Millions:

 

« Threat Hunting Solutions
Bitcoin Tanks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Zybert Computing

Zybert Computing

Zybert Computing provide server solutions with built-in security and information protection features for the SME market.

CoSoSys Endpoint Protector

CoSoSys Endpoint Protector

Endpoint Protector by CoSoSys is an advanced all-in-one DLP solution for Windows, macOS, and Linux, that puts an end to unintentional data leaks and protects from malicious data theft.

RIPS Technologies

RIPS Technologies

RIPS Technologies delivers automated security analysis for PHP applications as platform independent software or highly scalable cloud service.

Gilbert + Tobin

Gilbert + Tobin

Gilbert + Tobin is an Australian corporate law firm serving clients throughout Australia, and around the world, on a broad range of legal issues including cyber security.

CipherTrace

CipherTrace

CipherTrace develops cryptocurrency Anti-Money Laundering, cryptocurrency forensics, and blockchain threat intelligence solutions.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Fischer Identity

Fischer Identity

Fischer Identity provide identity & access management and identity governance administration solutions.

SAP National Security Services (NS2)

SAP National Security Services (NS2)

SAP NS2 are dedicated to delivering the best of SAP innovation, from cloud to predictive analytics; machine learning to data fusion.

Syber Technology

Syber Technology

Syber Technology is an IT project implementer empowering IT systems of Small to Medium Enterprises in the Middle East.

Wolverhampton Cyber Research Institute (WCRI)

Wolverhampton Cyber Research Institute (WCRI)

Wolverhampton Cyber Research Institute builds on the strength of its members in the area of network and communication security, artificial intelligence, big data and cyber physical systems.

Reflectiz

Reflectiz

Reflectiz empowers digital businesses to make all web applications safer by non-intrusively mitigating any website risks without a single line of code.

UM6P Ventures

UM6P Ventures

UM6P Ventures is an African based early-stage ventures firm operating two funds; a Digital Transformation fund and a Deeptech Ventures fund.

Eurotech

Eurotech

Eurotech provides Edge Computers and IoT solutions. We help to connect your assets and make them smarter through secure and agnostic hardware and software technologies.

Blockfence

Blockfence

Blockfence are a seasoned crew versed in enterprise-grade cybersecurity and crypto, on a mission to collaboratively shape the future of Web3 security.

ExactTrak

ExactTrak

ExactTrak provide embedded cyber security solutions for your digital devices – whenever and wherever you need them.

Tanzania Industrial Research and Development Organization (TIRDO)

Tanzania Industrial Research and Development Organization (TIRDO)

TIRDO is a multi-disciplinary research and development organization.