Lottery Fraud Costs Victims £1m

Criminals are experts at impersonating organisations and will mimic a number of well-known prize draws to take advantage of unsuspecting victims.

Between April and October 2021, Britain's online crime portal Action Fraud received 629 reports of lottery fraud, with 89 per cent of reports mentioning well-known prize draws. Impersonation of People’s Postcode Lottery accounted for almost half (49 per cent) of all reports.

Often criminals will contact unsuspecting victims saying they have won a lottery or prize draw. The victim is then told to pay an advance fee in order to receive their winnings. In reality, the winnings are non-existent and it is an attempt to steal the victims money and or financial information.

“Remember, you can’t win a draw that you haven’t entered so if you’re contacted out of the blue claiming you’ve won a prize draw but can only access these winnings by paying an advance fee: stop and think as it’s likely to be a scam. This could protect you and your money,” said Detective Chief Inspector Craig Mullish, of the City of London Police 

Almost three quarters of victims (70 per cent) were aged over 50, with those aged over 65 accounting for 40 per cent of reports.

Over half of the reports (59 per cent) mentioned being contacted via telephone. Other methods of contact reported by victims included email (21 per cent) and postal letter (10 per cent). Almost have of victims (41 per cent) said they were asked to pay the advance fee to release the alleged winnings by purchasing gift cards and relaying codes to the fraudster.

  • Fraudsters use gift cards as a form of payment as they can be easily redeemed and sold on. These criminals also don’t need the physical card to redeem the value and instead get victims to share the serial code on the back of the card with them.
  • In other instances, victims reported being asked for personal and financial information in order to obtain their alleged winnings. Some victims reported providing their bank details thinking they would be sent a small payment to verify the account. In reality, criminals will use these details to steal the victims money.

Another version of unexpected prize scams involves scammers gaining access to someone’s social media account and contacting extended family members (aunts, cousins etc) and telling them that they have all won money. The scammer then provides an email address through which they will receive instructions on how to claim their prize.

This is a particularly insidious version of the scam as it uses the trust between family members to succeed in scamming people out of their money.

Action Fraud:      Scamwatch

You Might Also Read: 

One Fifth Of British Adults Suffer Online Fraud:

 

« Wind Turbine Maker Shuts Down Computer Systems
Online Campaign To Influence Presidential Elections - Iranians Charged »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Mielabelo

Mielabelo

Belgian consulting firm providing services in the security and compliance of information systems and IT service management.

Absolute Software

Absolute Software

Absolute provides persistent endpoint security and data risk management solutions for mobile devices - computers, tablets, and smartphones.

APrivacy

APrivacy

APrivacy provides information and communication security products for the financial services industry.

Medigate

Medigate

Medigate is a dedicated medical device security platform protecting all of the connected medical devices on health care provider networks.

CTERA Networks

CTERA Networks

CTERA provides cloud storage solutions that enable service providers and enterprises to launch managed storage, backup, file sharing and mobile collaboration services using a single platform.

MyDocSafe

MyDocSafe

MyDocSafe is an all-in-one document security and e-sign software.

North American International Cyber Summit

North American International Cyber Summit

The North American International Cyber Summit brings together experts from around the globe to provide timely content and address a variety of cybersecurity issues impacting the world.

Two Six Technologies

Two Six Technologies

Two Six Technologies delivers R&D, innovation, productization and implementation expertise in cyber, data science, mobile, microelectronics and information operations.

eMazzanti Technologies

eMazzanti Technologies

eMazzanti Technologies provides IT consulting services for businesses ranging from home offices to multinational corporations throughout the USA and internationally.

FortifyIQ

FortifyIQ

FortifyIQ's mission is to advance maximum security against side-channel attacks across the entire computing spectrum.

Buchanan & Edwards

Buchanan & Edwards

Buchanan & Edwards delivers forward-focused technology solutions that help our clients transform the way they perform their missions.

Quad9 Foundation

Quad9 Foundation

Quad9 is a free security solution that uses DNS to protect your system against the most common cyber threats. It improves your system's performance, plus, it preserves and protects your privacy.

Obrela Security Industries

Obrela Security Industries

Obrela provides security analytics and risk management services to identify, analyze, predict and prevent highly sophisticated security threats in real time.

Cyber Law Consulting

Cyber Law Consulting

Cyber Law Consulting is a Dynamic full service legal firm which offers complete services for Cyber Law, cyberlaw, Internet Law, Data Protection Act, Cyber Security, IPR, Drafting.

Frontier Technology Inc. (FTI)

Frontier Technology Inc. (FTI)

Frontier Technology Inc provides the technology and deep data expertise to drive the best defense and intelligence solutions.

DRTConfidence

DRTConfidence

DRTConfidence is the proven solution for today’s organizations needing to meet rigorous compliance standards across the enterprise.