Fraud Online & On The Telephone

In 2021 alone, 3,625 people were victims of courier fraud, with loses totalling more than £15.2 million.

Typically, courier fraudsters target their victims by claiming to be a police officer or a member of staff from a victim’s bank. They often pressure people into making quick financial decisions to assist with fictitious investigations.  An analysis of data from the British National Fraud Intelligence Bureau (NFIB) has highlighted four modus operandi (MOs) which are now more commonly being used by fraudsters.

Four Common Methods Used By Courier Fraudsters

Bank card expiry: Fraudsters claim to be from the victim’s bank and say their card is no longer valid. They ask for the pin number and then send a “courier” to collect the card before using it for fraudulent purposes.

Purchasing high end items: The suspects pretend to be police officers and ask the victim to help with an undercover operation by purchasing expensive items like watches, jewellry and gold. Once the item is bought, the victim will hand over the item to the criminal.

Counterfeit cash/bank investigation: A person claiming to be a police or banking official informs the victim that they need to help with a banking corruption investigation. The victim is told to withdraw a large amount of money and the cash is picked up later by a courier to “check for fingerprints or to identify counterfeit bank notes”.

Computer takeover: The fraudster telephones the victim, purporting to be from their Internet Service Provider (ISP) saying that they have had an issue with their Internet connectivity and they are due compensation. 
The victim is persuaded to download a remote access application, giving the suspects access to their home computers. The fraudster persuades the victims into thinking that they have been paid too much compensation and the victims then withdraw cash to pay the money back, which is later collected by a courier.

Superintendent Edelle Michaels, from the Lead Force Operations Room at the City of London Police, said: 
“Fraudsters are callous individuals and courier fraud is no exception. They prey on some of the most vulnerable and most trustworthy members of society. 

Victims of courier fraud typically tend to be between the ages of 70 to 89 years old, with women more likely to be targeted than men.

“We would urge everyone who is involved in a caring or supportive role to people of these ages to start conversations about the tactics used and warning signs to look out for on courier fraud... Just having that conversation could be the difference on whether someone becomes a victim of this trust-eroding crime.”

Action Fraud:      Northants Police:    The Star:      N. Yorkshire Police:  

You Might Also Read: 

Remote Access Scams Open The Door To Thieves:

 

« General Motors Hack Exposes Car Owner Information
US Banks Hit By Russian Cyber Attacks »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

National Agency for Information & Communication Technologies (ANTIC) - Cameroon

National Agency for Information & Communication Technologies (ANTIC) - Cameroon

ANTIC is responsible for regulating the activities of electronic security and regulation of the Internet in Cameroon.

App-Ray

App-Ray

App-Ray provides fully automated security analysis of mobile applications to find security issues, privacy breaches and data leaking potentials.

Blockchain R&D Hub

Blockchain R&D Hub

Blockchain R&D Hub's mission is to serve the needs of blockchain ecosystem as the center of excellence for technology research and development.

European Healthcare Fraud & Corruption Network (EHFCN)

European Healthcare Fraud & Corruption Network (EHFCN)

EHFCN is the only organisation dedicated to combating fraud, corruption and waste in the healthcare sector across Europe.

AmWINS Group

AmWINS Group

AmWINS are a global specialty insurance distributor with expertise in property, casualty and professional lines including cyber liability.

Cyber Gate Defense (CyberGate)

Cyber Gate Defense (CyberGate)

CyberGate is an Emirati establishment founded with an objective to provide cyber security services that would improve the overarching cyber security posture of the UAE.

Cyber Dacians

Cyber Dacians

Cyber Dacians offers Information and Cyber Security Consulting Services. We help you to test the effectiveness of your security defenses and build a secure infrastructure.

Moro Hub

Moro Hub

Moro Hub, a subsidiary of Digital DEWA, is a UAE-based digital data hub focused on digital transformation and operational services.

iVision

iVision

iVision is a technology integration and management firm that engineers success for clients through objective recommendations, process and technology expertise and best-of-breed guidance.

ShieldIO

ShieldIO

ShieldIO Real-Time Homomorphic Encryption™ enables your organization to reach regulatory compliance without compromising data availability.

Orbis Cyber Security

Orbis Cyber Security

Orbis is one of the leading cybersecurity company in USA. Our cybersecurity specialist defends your data, combat threat, and modernize your compliance.

Saidot

Saidot

Saidot is a Finnish AI governance and alignment company committed to helping businesses safely and transparently integrate AI into their operations.

Invictus International Consulting

Invictus International Consulting

Invictus International Consulting are a recognized leader in full-spectrum cyber technology solutions designed to protect the security of our nation's global defense and critical infrastructure.

Astreya

Astreya

Astreya is the leading IT solutions provider for some of the world's most recognizable and innovative organizations.

Forensic IT

Forensic IT

Forensic IT is a specialised cyber security firm with expertise in Digital Forensics and Incident Response (DFIR).

Nordic Defender

Nordic Defender

Nordic Defender is the first crowd-powered modern cybersecurity solution provider in the Nordic region.