Action Fraud: Social Media Used to Steal Charity Donations

The UK’s National Fraud Intelligence Bureau’s (NFIB) Proactive Intelligence Team have identified an emerging fraud where social media platforms are being used to attract members of the public to donate money to animal welfare charities overseas that do not exist.

The NFIB has discovered that criminal groups based in Spain or Cyprus and are using social media to target donors from the UK.

The money is then laundered from the UK to overseas and rather than be used to tackle animal cruelty it is simply used to support a criminal lifestyle in the sun.

They will canvass for contributions through their existing social networks which will expand over time, attracting more donors.

The NFIB were informed that the people committing this fraud are merely supplementing their income as they are always linked to organised crime groups in the UK and overseas.

Protection Advice

Sometimes the article or post on social media may indicate the payments are for charitable organisation or a “worthy cause”. Sadly, not in all instances are these genuine, and if any doubt please undertake your own due diligence.

Other Signs to look for Include:

  • Genuine charities are registered with the Charity Commission and print their registration details on all documentation, collection bags, envelopes, electronic communications etc. Check these details exist and also contact the Charity Commission to confirm they are authentic.
  • If the collection is for a charity you know is genuine, check the collection is authorised by asking the charity directly, using contact details from the phone book or a website that you know is genuine.
  • Watch out for poor grammar and spelling.
  • Send your donation to the charity directly. This may mean going to a little more trouble, but at least you can be sure your donation will get to where it’s intended.

If you have any concerns you can also get further information from Gov.uk.

ActionFraud:

UK Fraud Hits £1.1bn As Cyber Crime Soars:

« Georgia - A State Of Cybersecurity
Auditors Need To Know About Cyber Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ON-DEMAND WEBINAR: Navigating cloud security: The importance of posture management tools

ON-DEMAND WEBINAR: Navigating cloud security: The importance of posture management tools

Watch this webinar to see how cloud security posture management (CSPM) tools can fit into your cloud security strategy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Cyber Exec

Cyber Exec

Cyber Exec is an executive search firm dedicated to global talent acquisition in Cyber Security, Information Technology, Defense...

Telecommunications Industry Association (TIA)

Telecommunications Industry Association (TIA)

TIA works to secure trust in networks by advocating public policy positions on the security of ICT equipment and services related to critical infrastructure, supply chain and information sharing.

Redshift Consulting

Redshift Consulting

Redshift is an information management and information security consulting company offering a full range of services from infrastructure design to security assessments and network monitoring.

Cyber Security Malta

Cyber Security Malta

Cyber Security Malta is part of Malta's National Cyber Security Strategy which aims to combat cybercrime, strengthen national cyber defence and provide cyber security awareness and education.

Barbara IoT

Barbara IoT

Barbara is an industrial device platform specifically designed for IoT deployments.

CipherBlade

CipherBlade

CipherBlade specializes in blockchain forensics, data science and transaction tracking.

Cord3

Cord3

Cord3 delivers data protection, even from trusted administrators – or hackers posing as administrators – with high privilege.

Pentest Limited

Pentest Limited

Pentest Limited provide information security consultation, penetration testing & red teaming services to companies across the globe.

6clicks

6clicks

6clicks is an easy way to implement your risk and compliance program or achieve compliance with ISO 27001, SOC 2, PCI-DSS, HIPAA, NIST, FedRAMP and many other standards.

CyberconIQ

CyberconIQ

CyberconIQ provide an integrated Human Defense Platform that reduces the probability and/or the cost of a cybersecurity breach by measurably improving our clients risk posture and compliance culture.

MyTurn Career LLC

MyTurn Career LLC

Looking for a rewarding career in cybersecurity? Explore a wide range of cybersecurity jobs and opportunities in this rapidly evolving field.

Fescaro

Fescaro

FESCARO is a trusted cybersecurity partner for global automakers and their partners, helping them transition to software-defined vehicles (SDVs) with tailored automotive software solutions.

63 Moons Technologies (63MT)

63 Moons Technologies (63MT)

63 Moons Technologies is a world leader in providing next-generation technology ventures, innovations, platforms, and solutions.

DHCO IT

DHCO IT

The DHCO IT team are experts in IT support, cyber security, cloud support and disaster recovery, and are Microsoft 365 partners.

Scality

Scality

Scality storage unifies data management from edge to core to cloud. Our market-leading file and object storage software protects data on-premises and in hybrid and multi-cloud environments.

HTX (Home Team Science & Technology Agency)

HTX (Home Team Science & Technology Agency)

HTX brings together science and engineering capabilities to transform the homeland security landscape and keep Singapore safe.