New Exploits & Examples Of Online Fraud

If you have an issue with a company, complaining on social media can usually be an effective way to get your issue resolved more quickly.  Now, the consumer magazine Which? has found scammers on X / Twitter posing as real customer service agents for a number of well-known brands.  

Which? uncovered 37 fake accounts the looked like the fashion retailer Zara that were replying to customers' genuine queries on X in a bid to steal their personal data.  

The scam accounts we spotted were actively responding to customer complaints that had tagged Zara's genuine X account.  These fake accounts will often reply quickly, in the hope that customers won't notice they're being contacted by a fraudster.

Another criminal exploit are so-called courier scams on Facebook Marketplace and eBay  A buyer, might claim they’re too busy to collect an item and says they’ll use a courier who’ll bring you the cash, and all you need to do is give them your bank details to pay the insurance, which can put your money or identity under threat. 

A recent  example of a courier scam was when a London man was sentenced to five years in prison for tricking people into handing over their money.  He persuaded one victim to go to their bank and withdraw £5,000, which was then handed over to a courier, under the false premise of keeping it safe.  This sentencing comes as courier scams are on the rise - costing people £28.7 million last year, according to figures from  Action Fraud - with older people most likely to be targeted. 

During the first two weeks in May this year, the City of London Police’s Lead Force Operations Room recorded more than 100 referrals for courier fraud - and 85% of victims were between 60 and 90 years old.  

The latest variation of courier fraud involves requests for much larger sums of money and specifically targeting older people. An example is an unexpected phone call  from someone  purporting to be from the police or a local bank branch. The caller might know some of the target’s details, including their address or other personal data which are then used for identity theft and other criminal purposes .  

Recent cases have seen victims persuaded to hand over jewellery, gold coins or their bank card with its Pin to couriers, sometimes with a password given to make it seem more legitimate. These valuable items are then surrendered to the courier, all under the guise of these being ‘evidence’ in an ongoing investigation and the victim told they can reclaim the money, only to find it’s all a scam.   
 
Criminals are even impersonating solicitors to carry out conveyancing fraud, typically executed by a fraudster hacking into a solicitor’s or buyer’s email account and providing alternative bank details for deposits to be paid into. 

Lloyds Bank has warned that it received 29% more reports of conveyancing fraud in the second half of last year compared with the first half.  It also found that victims lost an average of £47,000 and around 45% of victims were aged 39 or under, signalling that first-time buyers may be most at risk.

Image: Mikhail Nilov

You Might Also Read: 

Cyber Crime Hothouses In Myanmar:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

 

« Iran Pays $Mulitmillion Ransom To Protect Its Banks
International Agreement To Regulate Artificial Intelligence »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

National Cyber Security Centre (NKSC) - Lithuania

National Cyber Security Centre (NKSC) - Lithuania

NKSC is the main Lithuanian cyber security institution, responsible for unified management of cyber incidents, monitoring and control of the implementation of cyber security requirements.

Cleafy

Cleafy

Cleafy are a team of fraud hunters, cybersecurity experts, data scientists, and software engineers. Our purpose is to make people’s life easier and free from the threats in the digital ecosystem.

INCIBE-CERT

INCIBE-CERT

INCIBE-CERT is the reference security incident response center for citizens and private law entities in Spain

Cyber Future Foundation (CFF)

Cyber Future Foundation (CFF)

CFF was established to create a cyberspace where digital commerce and innovation can thrive based on trust and respect to individual privacy.

Modux

Modux

Modux focus on a number of core competencies across cyber security including; cyber intelligence & analytics, penetration testing and training.

Temasoft

Temasoft

TEMASOFT is a software company focused on developing security and infrastructure products.

STM

STM

STM provides system engineering, technical support, project management, technology transfer and logistics support services for the Turkish Armed Forces.

Redborder

Redborder

Redborder is an Open Source network visibility, data analytics, and cybersecurity Big Data solution that is scalable up to the needs of enterprise networks and service providers.

Red Sift

Red Sift

Red Sift is the only integrated cloud email and brand protection platform, supporting organizations to secure their communications.

Unlimited Technology

Unlimited Technology

Unlimited Technology offers a wide range of talent and experience, from assessing your requirements to implementing technologically advanced security solutions to best fit your needs.

HiScout

HiScout

HiScout is your integrated management system for IT governance, risk & compliance.

du

du

du is a telecommunications service provider providing UAE businesses with a vast range of ICT and managed services.

Grove Group

Grove Group

Grove provides businesses with the tools that work best for their unique operations, through cybersecurity and cloud services, custom software development and our big data analytics expertise.

Dynamic Networks

Dynamic Networks

Dynamic Networks provide Managed Cloud Services; Unified Communications; Security & Compliance Services and Network & Infrastructure Services for both Public Sector and Private sector businesses.

Resonance Security

Resonance Security

Resonance offers powerful cybersecurity aggregation software that makes protecting against full spectrum cybersecurity threats effortless no matter what your technical level, budget, or scope.

The Aerospace Corporation

The Aerospace Corporation

The Aerospace Corporation is playing a key role in advancing space cybersecurity through innovative prototypes that can quickly detect and mitigate cyber threats.