Fraud Online & On The Telephone

In 2021 alone, 3,625 people were victims of courier fraud, with loses totalling more than £15.2 million.

Typically, courier fraudsters target their victims by claiming to be a police officer or a member of staff from a victim’s bank. They often pressure people into making quick financial decisions to assist with fictitious investigations.  An analysis of data from the British National Fraud Intelligence Bureau (NFIB) has highlighted four modus operandi (MOs) which are now more commonly being used by fraudsters.

Four Common Methods Used By Courier Fraudsters

Bank card expiry: Fraudsters claim to be from the victim’s bank and say their card is no longer valid. They ask for the pin number and then send a “courier” to collect the card before using it for fraudulent purposes.

Purchasing high end items: The suspects pretend to be police officers and ask the victim to help with an undercover operation by purchasing expensive items like watches, jewellry and gold. Once the item is bought, the victim will hand over the item to the criminal.

Counterfeit cash/bank investigation: A person claiming to be a police or banking official informs the victim that they need to help with a banking corruption investigation. The victim is told to withdraw a large amount of money and the cash is picked up later by a courier to “check for fingerprints or to identify counterfeit bank notes”.

Computer takeover: The fraudster telephones the victim, purporting to be from their Internet Service Provider (ISP) saying that they have had an issue with their Internet connectivity and they are due compensation. 
The victim is persuaded to download a remote access application, giving the suspects access to their home computers. The fraudster persuades the victims into thinking that they have been paid too much compensation and the victims then withdraw cash to pay the money back, which is later collected by a courier.

Superintendent Edelle Michaels, from the Lead Force Operations Room at the City of London Police, said: 
“Fraudsters are callous individuals and courier fraud is no exception. They prey on some of the most vulnerable and most trustworthy members of society. 

Victims of courier fraud typically tend to be between the ages of 70 to 89 years old, with women more likely to be targeted than men.

“We would urge everyone who is involved in a caring or supportive role to people of these ages to start conversations about the tactics used and warning signs to look out for on courier fraud... Just having that conversation could be the difference on whether someone becomes a victim of this trust-eroding crime.”

Action Fraud:      Northants Police:    The Star:      N. Yorkshire Police:  

You Might Also Read: 

Remote Access Scams Open The Door To Thieves:

 

« General Motors Hack Exposes Car Owner Information
US Banks Hit By Russian Cyber Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ON-DEMAND WEBINAR: Navigating cloud security: The importance of posture management tools

ON-DEMAND WEBINAR: Navigating cloud security: The importance of posture management tools

Watch this webinar to see how cloud security posture management (CSPM) tools can fit into your cloud security strategy.

Lantronix

Lantronix

Lantronix is a global provider of secure data access and management solutions for Internet of Things (IoT) and information technology assets.

Commissum

Commissum

Commissum specialise in information assurance and security testing services.

Kenexis

Kenexis

Kenexis is a consulting engineering firm providing services for process hazards analysis, fire and gas mapping, and industrial cybersecurity.

Secardeo

Secardeo

Secardeo is a provider of corporate solutions using digital signatures and certificates. Our solutions enable the user transparent end-to-end encryption of e-mails between organizations.

Oak Ridge National Laboratory (ORNL)

Oak Ridge National Laboratory (ORNL)

ORNL conducts basic and applied research and development in key areas of science for energy, advanced materials, supercomputing and national security including cybersecurity.

New Zealand Internet Task Force (NZITF)

New Zealand Internet Task Force (NZITF)

The New Zealand Internet Task Force (NZITF) is a non-profit with the mission of improving the cyber security posture of New Zealand.

Sopher Networks

Sopher Networks

Sopher is a secure communication and collaboration platform for business and personal use.

Carbide

Carbide

Carbide (formerly Securicy) breaks down enterprise-class security and privacy requirements and makes them accessible to, and achievable by, companies of all sizes.

SimSpace

SimSpace

SimSpace is the visionary yet practical platform for measuring how your security system responds under actual, sustained attack.

Tego Cyber

Tego Cyber

Tego Cyber delivers a state-of-the-art threat intelligence platform that helps enterprises deploy the proper resolution to an identified threat before the enterprise is compromised.

GoVanguard

GoVanguard

GoVanguard is an boutique information security team delivering robust, business-focused information security solutions.

xorlab

xorlab

xorlab is a Swiss cybersecurity company providing specialized, machine-intelligent defense against highly engineered, sophisticated and targeted email attacks.

Buzz Cybersecurity

Buzz Cybersecurity

Buzz Cybersecurity systems and services are designed to proactively guard against common and uncommon cyber threats.

Opal Security

Opal Security

Opal is an identity and access management platform that offers a consolidated view and control of your whole ecosystem from on-prem to cloud and SaaS.

Geobridge

Geobridge

Geobridge was one of the first information security solutions providers to support cryptography and payment applications for payment processors, financial institutions and retail organizations.

Trium Cyber

Trium Cyber

Trium Cyber - Expert Cyber Underwriting and Claims Management. Based in the US and UK. Backed by Lloyd’s of London.