Fraud Online & On The Telephone

In 2021 alone, 3,625 people were victims of courier fraud, with loses totalling more than £15.2 million.

Typically, courier fraudsters target their victims by claiming to be a police officer or a member of staff from a victim’s bank. They often pressure people into making quick financial decisions to assist with fictitious investigations.  An analysis of data from the British National Fraud Intelligence Bureau (NFIB) has highlighted four modus operandi (MOs) which are now more commonly being used by fraudsters.

Four Common Methods Used By Courier Fraudsters

Bank card expiry: Fraudsters claim to be from the victim’s bank and say their card is no longer valid. They ask for the pin number and then send a “courier” to collect the card before using it for fraudulent purposes.

Purchasing high end items: The suspects pretend to be police officers and ask the victim to help with an undercover operation by purchasing expensive items like watches, jewellry and gold. Once the item is bought, the victim will hand over the item to the criminal.

Counterfeit cash/bank investigation: A person claiming to be a police or banking official informs the victim that they need to help with a banking corruption investigation. The victim is told to withdraw a large amount of money and the cash is picked up later by a courier to “check for fingerprints or to identify counterfeit bank notes”.

Computer takeover: The fraudster telephones the victim, purporting to be from their Internet Service Provider (ISP) saying that they have had an issue with their Internet connectivity and they are due compensation. 
The victim is persuaded to download a remote access application, giving the suspects access to their home computers. The fraudster persuades the victims into thinking that they have been paid too much compensation and the victims then withdraw cash to pay the money back, which is later collected by a courier.

Superintendent Edelle Michaels, from the Lead Force Operations Room at the City of London Police, said: 
“Fraudsters are callous individuals and courier fraud is no exception. They prey on some of the most vulnerable and most trustworthy members of society. 

Victims of courier fraud typically tend to be between the ages of 70 to 89 years old, with women more likely to be targeted than men.

“We would urge everyone who is involved in a caring or supportive role to people of these ages to start conversations about the tactics used and warning signs to look out for on courier fraud... Just having that conversation could be the difference on whether someone becomes a victim of this trust-eroding crime.”

Action Fraud:      Northants Police:    The Star:      N. Yorkshire Police:  

You Might Also Read: 

Remote Access Scams Open The Door To Thieves:

 

« General Motors Hack Exposes Car Owner Information
US Banks Hit By Russian Cyber Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Evok

Evok

EVOK is an IT Service provider specialized in installing, maintaining and supporting IT infrastructures for SMB's in Switzerland.

Oracle Cloud Security

Oracle Cloud Security

Oracle’s cloud security solutions enable organizations to implement and manage consistent security policies across the hybrid data center.

8MAN

8MAN

8MAN is a leading Access Rights Management (ARM) solution in Microsoft and virtual server environments.

OIC-CERT

OIC-CERT

OIC-CERT is the Computer Emergency Response Team for Organisation of Islamic Cooperation (OIC) member countries.

Appvisory

Appvisory

Appvisory by MediaTest Digital is the leading Mobile Application Management-Software in Europe and enables enterprises to work secure on smartphones and tablets.

Lynx

Lynx

Lynx provides high added value services in the area of information systems security and ICT infrastructure building.

Micro Strategies Inc.

Micro Strategies Inc.

Micro Strategies provides IT solutions that help businesses tackle digital transformation in style.

DANAK

DANAK

DANAK is the national accreditation body for Denmark. The directory of members provides details of organisations offering certification services for ISO 27001.

CM Blockchain Security Center

CM Blockchain Security Center

We are dedicated to building a healthier blockchain ecosystem, providing solutions to security technology, and helping those who practice in the area of blockchain to get insight into industry trends.

Dataprovider.com

Dataprovider.com

Our Brand Protection Suite gives you the tools to discover trademark infringement on the Internet, such as websites selling counterfeit products, even when this is not immediately noticeable.

CloudSphere

CloudSphere

CloudSphere’s flagship Cloud Governance Platform enables enterprises and cloud service providers to simplify and optimize cloud migration, management, and governance.

Unit21

Unit21

Unit21 helps protect businesses against adversaries through a simple API and dashboard for detecting and managing money laundering, fraud, and other sophisticated risks across multiple industries.

Foretrace

Foretrace

Foretrace aims to prevent, assess, and contain the exposure of customer accounts, domains, and systems to malicious actors.

Hex-Rays

Hex-Rays

Founded in 2005, privately held, Belgium based, Hex-Rays SA focuses on the development of fast, stable, and robust binary analysis tools for the IT security market.

Onyxia

Onyxia

Onyxia's unique dynamic cybersecurity platform identifies gaps and prioritizes recommendations for proactive cybersecurity strategy, performance, remediation and management.

PCCW Global

PCCW Global

PCCW Global is a leading communications service provider, offering mobility, voice and data solutions to multinational enterprises, telecomms partners, cloud and application service providers.