New Exploits & Examples Of Online Fraud

If you have an issue with a company, complaining on social media can usually be an effective way to get your issue resolved more quickly.  Now, the consumer magazine Which? has found scammers on X / Twitter posing as real customer service agents for a number of well-known brands.  

Which? uncovered 37 fake accounts the looked like the fashion retailer Zara that were replying to customers' genuine queries on X in a bid to steal their personal data.  

The scam accounts we spotted were actively responding to customer complaints that had tagged Zara's genuine X account.  These fake accounts will often reply quickly, in the hope that customers won't notice they're being contacted by a fraudster.

Another criminal exploit are so-called courier scams on Facebook Marketplace and eBay  A buyer, might claim they’re too busy to collect an item and says they’ll use a courier who’ll bring you the cash, and all you need to do is give them your bank details to pay the insurance, which can put your money or identity under threat. 

A recent  example of a courier scam was when a London man was sentenced to five years in prison for tricking people into handing over their money.  He persuaded one victim to go to their bank and withdraw £5,000, which was then handed over to a courier, under the false premise of keeping it safe.  This sentencing comes as courier scams are on the rise - costing people £28.7 million last year, according to figures from  Action Fraud - with older people most likely to be targeted. 

During the first two weeks in May this year, the City of London Police’s Lead Force Operations Room recorded more than 100 referrals for courier fraud - and 85% of victims were between 60 and 90 years old.  

The latest variation of courier fraud involves requests for much larger sums of money and specifically targeting older people. An example is an unexpected phone call  from someone  purporting to be from the police or a local bank branch. The caller might know some of the target’s details, including their address or other personal data which are then used for identity theft and other criminal purposes .  

Recent cases have seen victims persuaded to hand over jewellery, gold coins or their bank card with its Pin to couriers, sometimes with a password given to make it seem more legitimate. These valuable items are then surrendered to the courier, all under the guise of these being ‘evidence’ in an ongoing investigation and the victim told they can reclaim the money, only to find it’s all a scam.   
 
Criminals are even impersonating solicitors to carry out conveyancing fraud, typically executed by a fraudster hacking into a solicitor’s or buyer’s email account and providing alternative bank details for deposits to be paid into. 

Lloyds Bank has warned that it received 29% more reports of conveyancing fraud in the second half of last year compared with the first half.  It also found that victims lost an average of £47,000 and around 45% of victims were aged 39 or under, signalling that first-time buyers may be most at risk.

Image: Mikhail Nilov

You Might Also Read: 

Cyber Crime Hothouses In Myanmar:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

 

« Iran Pays $Mulitmillion Ransom To Protect Its Banks
International Agreement To Regulate Artificial Intelligence »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Payload Security

Payload Security

Payload Security's VxStream Sandbox is a fully automated malware analysis system.

CERT-PY

CERT-PY

CERT-PY is the national Computer Emergency Response Team for Paraguay.

OSIRIS Lab - NYU Tandon

OSIRIS Lab - NYU Tandon

The Offensive Security, Incident Response & Internet Security Lab (OSIRIS) is a security research environment where students analyze and understand how attackers take advantage of real systems.

Cybernetic Global Intelligence (CGI)

Cybernetic Global Intelligence (CGI)

CGI is a global IT Security firm that helps companies protect their data and minimize their vulnerability to cyber threats through a range of services such as Security Audits and Managed Services.

CyberForce Program - US Department of Energy

CyberForce Program - US Department of Energy

The Department of Energy’s (DOE) CyberForce Program is a workforce development program that seeks to inspire and develop the next generation of cyber defenders for the energy sector.

Cybertonica

Cybertonica

Cybertonica is a FinTech company which detects and prevents fraudulent transactions and reduces risk for financial services organisations.

Outsource UK

Outsource UK

Outsource UK is an independent recruitment company supplying highly-skilled technology, change and engineering talent to clients within a range of specialist sectors including Cyber Security.

Cycode

Cycode

Cycode is the industry’s first source code control, detection, and response platform.

World Congress on Industrial Control Systems Security (WCICSS)

World Congress on Industrial Control Systems Security (WCICSS)

The World Congress on Industrial Control Systems Security (WCICSS) is focused on emerging trends in protection of industrial control systems.

Cybersec Infohub

Cybersec Infohub

Cybersec Infohub is a Hong Kong government programme to enhance the exchange of cyber security information with industry and enterprises to jointly defend against cyber attacks.

Blackpoint Cyber

Blackpoint Cyber

Blackpoint’s mission is to provide effective, affordable real-time threat detection and response to organizations of all sizes around the world.

Real Protect

Real Protect

Real Protect is a Brazilian provider of managed security (MSS) and cyber defense services.

FourthRev

FourthRev

FourthRev is an education-technology start-up with a mission to solve the skills crisis of the Fourth Industrial Revolution.

Hackurity.io

Hackurity.io

Hackurity.io is a high energy IT security start-up founded in 2021 out of the frustration that IT Security is highly fragmented and reactive.

Tryaq

Tryaq

Tryaq are a group of cybersecurity experts and enthusiasts who share the mission to make the world feel safer online.

Cassini

Cassini

Cassini Cyber Threat Intelligence (CTI) helps protect your organisation from cyber attacks using threat intelligence from trusted New Zealand agencies.