New Exploits & Examples Of Online Fraud

If you have an issue with a company, complaining on social media can usually be an effective way to get your issue resolved more quickly.  Now, the consumer magazine Which? has found scammers on X / Twitter posing as real customer service agents for a number of well-known brands.  

Which? uncovered 37 fake accounts the looked like the fashion retailer Zara that were replying to customers' genuine queries on X in a bid to steal their personal data.  

The scam accounts we spotted were actively responding to customer complaints that had tagged Zara's genuine X account.  These fake accounts will often reply quickly, in the hope that customers won't notice they're being contacted by a fraudster.

Another criminal exploit are so-called courier scams on Facebook Marketplace and eBay  A buyer, might claim they’re too busy to collect an item and says they’ll use a courier who’ll bring you the cash, and all you need to do is give them your bank details to pay the insurance, which can put your money or identity under threat. 

A recent  example of a courier scam was when a London man was sentenced to five years in prison for tricking people into handing over their money.  He persuaded one victim to go to their bank and withdraw £5,000, which was then handed over to a courier, under the false premise of keeping it safe.  This sentencing comes as courier scams are on the rise - costing people £28.7 million last year, according to figures from  Action Fraud - with older people most likely to be targeted. 

During the first two weeks in May this year, the City of London Police’s Lead Force Operations Room recorded more than 100 referrals for courier fraud - and 85% of victims were between 60 and 90 years old.  

The latest variation of courier fraud involves requests for much larger sums of money and specifically targeting older people. An example is an unexpected phone call  from someone  purporting to be from the police or a local bank branch. The caller might know some of the target’s details, including their address or other personal data which are then used for identity theft and other criminal purposes .  

Recent cases have seen victims persuaded to hand over jewellery, gold coins or their bank card with its Pin to couriers, sometimes with a password given to make it seem more legitimate. These valuable items are then surrendered to the courier, all under the guise of these being ‘evidence’ in an ongoing investigation and the victim told they can reclaim the money, only to find it’s all a scam.   
 
Criminals are even impersonating solicitors to carry out conveyancing fraud, typically executed by a fraudster hacking into a solicitor’s or buyer’s email account and providing alternative bank details for deposits to be paid into. 

Lloyds Bank has warned that it received 29% more reports of conveyancing fraud in the second half of last year compared with the first half.  It also found that victims lost an average of £47,000 and around 45% of victims were aged 39 or under, signalling that first-time buyers may be most at risk.

Image: Mikhail Nilov

You Might Also Read: 

Cyber Crime Hothouses In Myanmar:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

 

« Iran Pays $Mulitmillion Ransom To Protect Its Banks
International Agreement To Regulate Artificial Intelligence »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Lumeta

Lumeta

Lumeta’s cyber situational awareness platform is the unmatched source for enterprise network infrastructure analytics and security monitoring for breach detection.

Kaymera Technologies

Kaymera Technologies

Kaymera’s comprehensive mobile enterprise security solution defends against all mobile threat and attack vectors.

APERIO

APERIO

APERIO, the global leader in industrial data integrity, helps its customers drive profitability and sustainability while mitigating risk in their industrial operations.

Zymbit

Zymbit

Zymbit provides hardware security modules (HSM) for IoT devices, including Raspberry Pi and other single board computers.

Stratus Cyber

Stratus Cyber

Stratus Cyber is a premier Cyber Security company specializing in Managed Security Services. Our services include Blockchain Security, Pentesting, and Compliance Assessments.

Cyber Pathways

Cyber Pathways

Cyber Pathways brings together the next generation of Cyber professionals along with delegates who are looking to cross train and enter the cyber market.

swIDCH

swIDCH

swIDch is a technology company that aims to eliminate CNP (card not present) Fraud.

CWSI

CWSI

CWSI provide a full suite of enterprise mobility, security and productivity solutions to many of Ireland and the UK’s most respected organisations across a wide range of industry and public sectors.

Pivot Technology School

Pivot Technology School

Pivot Tech offers Data Analytics, Software Development and Cyber Security training in boot camp style cohorts.

Viettel Cyber Security

Viettel Cyber Security

Viettel Cyber Security is an organization under the Military Telecommunication Industry Group, conducting research and developing information security solutions for domestic and foreign customers.

Sealing Technologies (SealingTech)

Sealing Technologies (SealingTech)

SealingTech is a leader in cutting edge research, products, engineering, and integration services in the Internet of Things, Edge, Machine Learning, Artificial Intelligence, and Cloud.

Execweb

Execweb

Execweb are a cybersecurity executive network, comprised of 400+ security practitioners who work at Fortune 500 and SME companies.

Cognisys Group

Cognisys Group

Cognisys provides cyber security penetration testing and compliance services from its offices in Leeds and Manchester.

Seraphic Security

Seraphic Security

Seraphic Security provides attack protection to enable safe browsing for employees or contractors, as well as advanced governance controls to enforce enterprise policies across devices.

Exiger

Exiger

Exiger is revolutionizing the way corporations, government agencies and banks navigate risk and compliance in their third-parties, supply chains and customers.

ABPSecurite

ABPSecurite

ABPSecurite is a leading value-added distributor and a network performance solutions provider.