New Exploits & Examples Of Online Fraud

If you have an issue with a company, complaining on social media can usually be an effective way to get your issue resolved more quickly.  Now, the consumer magazine Which? has found scammers on X / Twitter posing as real customer service agents for a number of well-known brands.  

Which? uncovered 37 fake accounts the looked like the fashion retailer Zara that were replying to customers' genuine queries on X in a bid to steal their personal data.  

The scam accounts we spotted were actively responding to customer complaints that had tagged Zara's genuine X account.  These fake accounts will often reply quickly, in the hope that customers won't notice they're being contacted by a fraudster.

Another criminal exploit are so-called courier scams on Facebook Marketplace and eBay  A buyer, might claim they’re too busy to collect an item and says they’ll use a courier who’ll bring you the cash, and all you need to do is give them your bank details to pay the insurance, which can put your money or identity under threat. 

A recent  example of a courier scam was when a London man was sentenced to five years in prison for tricking people into handing over their money.  He persuaded one victim to go to their bank and withdraw £5,000, which was then handed over to a courier, under the false premise of keeping it safe.  This sentencing comes as courier scams are on the rise - costing people £28.7 million last year, according to figures from  Action Fraud - with older people most likely to be targeted. 

During the first two weeks in May this year, the City of London Police’s Lead Force Operations Room recorded more than 100 referrals for courier fraud - and 85% of victims were between 60 and 90 years old.  

The latest variation of courier fraud involves requests for much larger sums of money and specifically targeting older people. An example is an unexpected phone call  from someone  purporting to be from the police or a local bank branch. The caller might know some of the target’s details, including their address or other personal data which are then used for identity theft and other criminal purposes .  

Recent cases have seen victims persuaded to hand over jewellery, gold coins or their bank card with its Pin to couriers, sometimes with a password given to make it seem more legitimate. These valuable items are then surrendered to the courier, all under the guise of these being ‘evidence’ in an ongoing investigation and the victim told they can reclaim the money, only to find it’s all a scam.   
 
Criminals are even impersonating solicitors to carry out conveyancing fraud, typically executed by a fraudster hacking into a solicitor’s or buyer’s email account and providing alternative bank details for deposits to be paid into. 

Lloyds Bank has warned that it received 29% more reports of conveyancing fraud in the second half of last year compared with the first half.  It also found that victims lost an average of £47,000 and around 45% of victims were aged 39 or under, signalling that first-time buyers may be most at risk.

Image: Mikhail Nilov

You Might Also Read: 

Cyber Crime Hothouses In Myanmar:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

 

« Iran Pays $Mulitmillion Ransom To Protect Its Banks
International Agreement To Regulate Artificial Intelligence »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CISPA Helmholtz Center for Information Security

CISPA Helmholtz Center for Information Security

The CISPA Helmholtz Center for Information Security is a German national Big Science Institution within the Helmholtz Association. Our research encompasses all aspects of Information Security.

LEPL Cyber ​​Security Bureau - Georgia

LEPL Cyber ​​Security Bureau - Georgia

The aim of the LEPL Cyber Security Bureau is to create and strengthen stable, efficient and secure systems of information and communications technologies.

SEEK

SEEK

SEEK create world-class technology solutions to address the needs of job seekers and hirers across multiple sectors including cybersecurity.

InfoExpress

InfoExpress

InfoExpress provides network security solutions that enhance productivity and security through better visibility, improved security, and automating device and mobile access to the network.

Pixm

Pixm

Pixm’s computer vision based approach offers a truly unique and effective means to protect organizations from web-based phishing attacks.

Sprint Networks

Sprint Networks

Sprint Networks is a trusted compliance and risk program advisor which deliver cost-effective technology to reduce enterprise-wide risk.

PreCog Security

PreCog Security

PreCog Security is a US based cybersecurity risk mitigation company. We specialize in helping you find, minimize and manage vulnerability risk within your product, network and process.

GovernmentCIO

GovernmentCIO

GovernmentCIO was founded with a single purpose: to transform government IT. We are thought leaders in data analytics, machine learning, cybersecurity and IT transformation.

Suridata

Suridata

Suridata’s SaaS Security platform enables organizations to secure the use of SaaS applications.

Seemplicity

Seemplicity

Seemplicity revolutionizes the way security teams work by automating, optimizing and scaling all risk reduction workflows in one workspace.

Intelligent CloudCare

Intelligent CloudCare

Intelligent CloudCare, a division of IPS, is a full IT Services provider serving the needs of SMBs in the metropolitan New York City region.

Brennan IT

Brennan IT

For over 25 years, Brennan’s expert team has helped businesses achieve real success through innovative and secure technology solutions.

Unified National Networks (UNN)

Unified National Networks (UNN)

UNN’s mission is to unify the national networks and create a modern and cost efficient digital platform connecting the entire country.

Fortreum

Fortreum

Fortreum aim to simplify cybersecurity in the marketplace to accelerate your business outcomes.

Sri Lanka CERT

Sri Lanka CERT

Sri Lanka CERT is the National Centre for Cyber Security, which has the national responsibility of protecting the nation’s cyberspace from cyber threats.

American Binary

American Binary

American Binary is a Quantum Safe Networking (TM) and post-quantum encryption company.