Action Fraud: Social Media Used to Steal Charity Donations

The UK’s National Fraud Intelligence Bureau’s (NFIB) Proactive Intelligence Team have identified an emerging fraud where social media platforms are being used to attract members of the public to donate money to animal welfare charities overseas that do not exist.

The NFIB has discovered that criminal groups based in Spain or Cyprus and are using social media to target donors from the UK.

The money is then laundered from the UK to overseas and rather than be used to tackle animal cruelty it is simply used to support a criminal lifestyle in the sun.

They will canvass for contributions through their existing social networks which will expand over time, attracting more donors.

The NFIB were informed that the people committing this fraud are merely supplementing their income as they are always linked to organised crime groups in the UK and overseas.

Protection Advice

Sometimes the article or post on social media may indicate the payments are for charitable organisation or a “worthy cause”. Sadly, not in all instances are these genuine, and if any doubt please undertake your own due diligence.

Other Signs to look for Include:

  • Genuine charities are registered with the Charity Commission and print their registration details on all documentation, collection bags, envelopes, electronic communications etc. Check these details exist and also contact the Charity Commission to confirm they are authentic.
  • If the collection is for a charity you know is genuine, check the collection is authorised by asking the charity directly, using contact details from the phone book or a website that you know is genuine.
  • Watch out for poor grammar and spelling.
  • Send your donation to the charity directly. This may mean going to a little more trouble, but at least you can be sure your donation will get to where it’s intended.

If you have any concerns you can also get further information from Gov.uk.

ActionFraud:

UK Fraud Hits £1.1bn As Cyber Crime Soars:

« Georgia - A State Of Cybersecurity
Auditors Need To Know About Cyber Security »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Secure Source

Secure Source

Secure Source specialise in search and recruitment for Cyber Security and Security Cleared markets.

IS Decisions

IS Decisions

IS Decisions builds affordable and easy-to-use Access Management software solutions, allowing IT teams to effectively secure access to Active Directory infrastructures, SaaS apps and data within.

Slovak Security Policy Institute (SSPI)

Slovak Security Policy Institute (SSPI)

Slovak Security Policy Institute is an independent non-governmental organization that focuses on research and analysis of security challenges including defence and cyber security.

CyberForce Program - US Department of Energy

CyberForce Program - US Department of Energy

The Department of Energy’s (DOE) CyberForce Program is a workforce development program that seeks to inspire and develop the next generation of cyber defenders for the energy sector.

Echosec Systems

Echosec Systems

Echosec Systems is a data discovery company delivering social media and dark web threat intelligence. Our web based security software delivers critical information for situational awareness.

Zercurity

Zercurity

Zercurity is on a mission to build the ultimate cybersecurity operations platform for businesses. To help protect against a growing number of internal and external threats.

Whistic

Whistic

Whistic is a cloud-based platform that uses a unique approach to address the challenges of third-party risk management.

Suresecure

Suresecure

Suresecure are a specialised consulting company providing Strategic IT security consulting, Managed Security Services, and Incident Response Management.

Dr Web

Dr Web

Since 1992 the Russian anti-virus Dr.Web has been helping companies to keep their digital assets protected and operate in a secure digital environment.

11:11 Systems

11:11 Systems

11:11 Systems synchronizes every aspect of network services for your business. Build your network with the industry’s most trusted expert skills.

PhishFirewall

PhishFirewall

PhishFirewall is an advanced AI-driven CyberSecurity Awareness Education, Threat Emulation, and Human Security Analytics Platform.

Descope

Descope

Descope is a service that helps every developer build secure, frictionless authentication and user journeys for any application.

Astute Technology Management

Astute Technology Management

Astute Technology Management helps businesses take control of their technology and work with greater confidence.

Gleam Cloud Security Solutions (GCSS)

Gleam Cloud Security Solutions (GCSS)

GCSS Security is an information security firm providing cyber security protection with a highly skilled and experienced team focused on technology that creates best-in-class customer experiences.

Grey Market Labs

Grey Market Labs

Grey Market Labs is a special place. It is a data privacy and security skunkworks.

Concertium

Concertium

Concertium is a complete cybersecurity partner equipped with the expertise and services to deliver end-to-end visibility and protection from evolving cyber threats.