Lottery Fraud Costs Victims £1m

Criminals are experts at impersonating organisations and will mimic a number of well-known prize draws to take advantage of unsuspecting victims.

Between April and October 2021, Britain's online crime portal Action Fraud received 629 reports of lottery fraud, with 89 per cent of reports mentioning well-known prize draws. Impersonation of People’s Postcode Lottery accounted for almost half (49 per cent) of all reports.

Often criminals will contact unsuspecting victims saying they have won a lottery or prize draw. The victim is then told to pay an advance fee in order to receive their winnings. In reality, the winnings are non-existent and it is an attempt to steal the victims money and or financial information.

“Remember, you can’t win a draw that you haven’t entered so if you’re contacted out of the blue claiming you’ve won a prize draw but can only access these winnings by paying an advance fee: stop and think as it’s likely to be a scam. This could protect you and your money,” said Detective Chief Inspector Craig Mullish, of the City of London Police 

Almost three quarters of victims (70 per cent) were aged over 50, with those aged over 65 accounting for 40 per cent of reports.

Over half of the reports (59 per cent) mentioned being contacted via telephone. Other methods of contact reported by victims included email (21 per cent) and postal letter (10 per cent). Almost have of victims (41 per cent) said they were asked to pay the advance fee to release the alleged winnings by purchasing gift cards and relaying codes to the fraudster.

  • Fraudsters use gift cards as a form of payment as they can be easily redeemed and sold on. These criminals also don’t need the physical card to redeem the value and instead get victims to share the serial code on the back of the card with them.
  • In other instances, victims reported being asked for personal and financial information in order to obtain their alleged winnings. Some victims reported providing their bank details thinking they would be sent a small payment to verify the account. In reality, criminals will use these details to steal the victims money.

Another version of unexpected prize scams involves scammers gaining access to someone’s social media account and contacting extended family members (aunts, cousins etc) and telling them that they have all won money. The scammer then provides an email address through which they will receive instructions on how to claim their prize.

This is a particularly insidious version of the scam as it uses the trust between family members to succeed in scamming people out of their money.

Action Fraud:      Scamwatch

You Might Also Read: 

One Fifth Of British Adults Suffer Online Fraud:

 

« Wind Turbine Maker Shuts Down Computer Systems
Online Campaign To Influence Presidential Elections - Iranians Charged »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Cyfor

Cyfor

Cyfor provides digital forensics and eDiscovery in civil, criminal, intellectual property, litigation and dispute resolution investigations.

Aqua Security Software

Aqua Security Software

Aqua Security helps enterprises secure their cloud native applications from development to production, whether they run using containers, serverless, or virtual machines.

Reblaze Technologies

Reblaze Technologies

Reblaze provides the world’s best security technologies in a cloud-based website security platform.

ThreatBook

ThreatBook

ThreatBook is dedicated to providing real-time, accurate and actionable threat intelligence to block, detect and prevent attacks.

Vuntie

Vuntie

Vuntie blend European craftsmanship, performance and open-source technology to deliver cybersecurity services including penetration testing, incident response, training and consultancy.

CETIC

CETIC

CETIC is an applied research centre in the field of ICT. Key technologies include Big Data, Cloud Computing, the Internet of Things, software quality, and trust and security of IT systems.

ANSI National Accreditation Board (ANAB)

ANSI National Accreditation Board (ANAB)

ANAB is the largest accreditation body in North America. The directory of members provides details of organisations offering certification services for cybersecurity related standards.

Smart Protection

Smart Protection

Smart Protection are experts in brand and trademark protection - we fight against counterfeits and unauthorized usages of brands with machine learning technology.

Nextgen Group

Nextgen Group

Nextgen Group is a pioneering technology services group with innovative and unique services across enterprise software, cloud, data management, and cybersecurity solutions.

WheelHouse IT

WheelHouse IT

WheelHouse IT secures, manages, and advances businesses with innovative, cost-effective IT solutions.

Unit 42

Unit 42

Unit 42 brings together world-renowned threat researchers, incident responders and security consultants to create an intelligence-driven, response-ready organization.

CipherStash

CipherStash

CipherStash is a complete data governance and breach prevention platform.

Intertec Systems

Intertec Systems

Intertec Systems is an award-winning, global IT solutions and services provider that specializes in digital transformation, cybersecurity, sustainability, and cloud services.

InfoSecTrain

InfoSecTrain

InfoSecTrain are a leading training and consulting organization dedicated to providing top-tier IT security training and information security services to organizations and individuals across the globe

Cyberlocke

Cyberlocke

Cyberlocke is dedicated to finding inventive solutions to meet the distinct IT obstacles of each organization we support.

Coalition for Secure AI (CoSAI)

Coalition for Secure AI (CoSAI)

CoSAI is an open ecosystem of AI and security experts from industry leading organizations dedicated to sharing best practices for secure AI deployment and collaborating on AI security research.