Lottery Fraud Costs Victims £1m

Criminals are experts at impersonating organisations and will mimic a number of well-known prize draws to take advantage of unsuspecting victims.

Between April and October 2021, Britain's online crime portal Action Fraud received 629 reports of lottery fraud, with 89 per cent of reports mentioning well-known prize draws. Impersonation of People’s Postcode Lottery accounted for almost half (49 per cent) of all reports.

Often criminals will contact unsuspecting victims saying they have won a lottery or prize draw. The victim is then told to pay an advance fee in order to receive their winnings. In reality, the winnings are non-existent and it is an attempt to steal the victims money and or financial information.

“Remember, you can’t win a draw that you haven’t entered so if you’re contacted out of the blue claiming you’ve won a prize draw but can only access these winnings by paying an advance fee: stop and think as it’s likely to be a scam. This could protect you and your money,” said Detective Chief Inspector Craig Mullish, of the City of London Police 

Almost three quarters of victims (70 per cent) were aged over 50, with those aged over 65 accounting for 40 per cent of reports.

Over half of the reports (59 per cent) mentioned being contacted via telephone. Other methods of contact reported by victims included email (21 per cent) and postal letter (10 per cent). Almost have of victims (41 per cent) said they were asked to pay the advance fee to release the alleged winnings by purchasing gift cards and relaying codes to the fraudster.

  • Fraudsters use gift cards as a form of payment as they can be easily redeemed and sold on. These criminals also don’t need the physical card to redeem the value and instead get victims to share the serial code on the back of the card with them.
  • In other instances, victims reported being asked for personal and financial information in order to obtain their alleged winnings. Some victims reported providing their bank details thinking they would be sent a small payment to verify the account. In reality, criminals will use these details to steal the victims money.

Another version of unexpected prize scams involves scammers gaining access to someone’s social media account and contacting extended family members (aunts, cousins etc) and telling them that they have all won money. The scammer then provides an email address through which they will receive instructions on how to claim their prize.

This is a particularly insidious version of the scam as it uses the trust between family members to succeed in scamming people out of their money.

Action Fraud:      Scamwatch

You Might Also Read: 

One Fifth Of British Adults Suffer Online Fraud:

 

« Wind Turbine Maker Shuts Down Computer Systems
Online Campaign To Influence Presidential Elections - Iranians Charged »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Irdeto

Irdeto

Irdeto is the world leader in digital platform security, protecting platforms and applications for media & entertainment, gaming, connected transport and IoT connected industries.

Information and Communication Technology Authority (ICT Authority) - Kenya

Information and Communication Technology Authority (ICT Authority) - Kenya

The ICT Authority is responsible for enforcing ICT standards in Government and ensuring information security.

Cog Systems

Cog Systems

Cog Systems offer an embedded solution built on modularity, proactive security, trustworthiness, and adaptability to enable highly secure connected devices.

Elitecyber Group

Elitecyber Group

Elitecyber group is a team of Cyber Security recruitment experts who work for Cyber Security and Cyber Defence clients and candidates throughout Europe.

Red4Sec

Red4Sec

Red4Sec are experts in ethical hacking, audits of web and mobile applications, code audits, cryptocurrency audits, perimeter security and incident response.

CloudVector

CloudVector

CloudVector's API Detection & Response platform is the only API Threat Protection solution that goes beyond the gateway to provide Shadow API Prevention and Deep API Risk Monitoring and Remediation.

Blockchain Firm

Blockchain Firm

Blockchain Firm is a leading Blockchain based software solutions and service provider with our roots of expertise running deep into the technology.

cleverDome

cleverDome

cleverDome has created the first community built and proven model that redefines the standards for protecting the most confidential data and information of consumers in the cloud.

OptimEyes.ai

OptimEyes.ai

OptimEyes.ai is a unique AI-powered, on-demand SaaS solution for cyber-security, data privacy and compliance risk modeling.

Teleskope

Teleskope

Teleskope are on a mission to empower businesses to protect sensitive data by default.

AT&T Cybersecurity

AT&T Cybersecurity

AT&T Cybersecurity’s Edge-to-Edge technologies provide threat intelligence, collaborative defense, security without the seams, and solutions that fit your business.

SequelNet

SequelNet

SequelNet is an emerging MSP, providing 360° business IT solutions and consulting services.

NewsGuard Technologies

NewsGuard Technologies

NewsGuard provides transparent tools to counter misinformation for readers, brands, and democracies.

TerraEagle

TerraEagle

Terraeagle is a boutique cyber security services company providing tailor-made solutions. Our core competency is in SOCaaS, MDRaaS & and Incident Response Retainer Services.

Vault Cloud

Vault Cloud

Vault Cloud, Australia's National Cloud, is an Australian owned and operated company specialising in secure, sovereign, hyperscale cloud infrastructure.

CyberKinetics

CyberKinetics

CyberKinetics specializes in cloud-based services and solutions for federal agencies and commercial clients with compliance mandates.