Lottery Fraud Costs Victims £1m

Criminals are experts at impersonating organisations and will mimic a number of well-known prize draws to take advantage of unsuspecting victims.

Between April and October 2021, Britain's online crime portal Action Fraud received 629 reports of lottery fraud, with 89 per cent of reports mentioning well-known prize draws. Impersonation of People’s Postcode Lottery accounted for almost half (49 per cent) of all reports.

Often criminals will contact unsuspecting victims saying they have won a lottery or prize draw. The victim is then told to pay an advance fee in order to receive their winnings. In reality, the winnings are non-existent and it is an attempt to steal the victims money and or financial information.

“Remember, you can’t win a draw that you haven’t entered so if you’re contacted out of the blue claiming you’ve won a prize draw but can only access these winnings by paying an advance fee: stop and think as it’s likely to be a scam. This could protect you and your money,” said Detective Chief Inspector Craig Mullish, of the City of London Police 

Almost three quarters of victims (70 per cent) were aged over 50, with those aged over 65 accounting for 40 per cent of reports.

Over half of the reports (59 per cent) mentioned being contacted via telephone. Other methods of contact reported by victims included email (21 per cent) and postal letter (10 per cent). Almost have of victims (41 per cent) said they were asked to pay the advance fee to release the alleged winnings by purchasing gift cards and relaying codes to the fraudster.

  • Fraudsters use gift cards as a form of payment as they can be easily redeemed and sold on. These criminals also don’t need the physical card to redeem the value and instead get victims to share the serial code on the back of the card with them.
  • In other instances, victims reported being asked for personal and financial information in order to obtain their alleged winnings. Some victims reported providing their bank details thinking they would be sent a small payment to verify the account. In reality, criminals will use these details to steal the victims money.

Another version of unexpected prize scams involves scammers gaining access to someone’s social media account and contacting extended family members (aunts, cousins etc) and telling them that they have all won money. The scammer then provides an email address through which they will receive instructions on how to claim their prize.

This is a particularly insidious version of the scam as it uses the trust between family members to succeed in scamming people out of their money.

Action Fraud:      Scamwatch

You Might Also Read: 

One Fifth Of British Adults Suffer Online Fraud:

 

« Wind Turbine Maker Shuts Down Computer Systems
Online Campaign To Influence Presidential Elections - Iranians Charged »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Dark Reading

Dark Reading

Dark Reading is the most trusted online community for security professionals.

Opengear

Opengear

Opengear designs, manufactures and delivers the most feature-rich, cost-effective, flexible solutions for secure remote infrastructure management. Wit

CyberDefcon

CyberDefcon

CyberDefcon is an independent organization dedicated to the pursuit of making the internet a safer place.

Information System Authority (RIA) - Estonia

Information System Authority (RIA) - Estonia

RIA ensures the interoperability of the state’s information system, organises activities related to information security, and handles security incidents in Estonian computer networks.

Xperien

Xperien

Xperien is a leading South African Information Technology Asset Disposition (ITAD) company.

Italtel

Italtel

Italtel is a multinational ICT company that combines networks and communications services with the ability to innovate and develop solutions for digital transformation.

Ultratec

Ultratec

Ultratec provide a range of data centric services and solutions including data recovery, data erasure, data destruction and full IT Asset Disposal (ITAD).

Allied Telesis

Allied Telesis

Allied Telesis delivers the secure, flexible, and agile solutions needed to meet the expectations of any industry’s critical mission.

Valence Security

Valence Security

Valence manages and secures your Business Application Mesh by delivering visibility, reducing unauthorized access and preventing data loss.

RKVST

RKVST

RKVST is a powerful tool that builds trust in multi-party processes when it’s critical to have high assurance in data for confident decisions.

Ministry of Electronics & Information Technology (MeitY)

Ministry of Electronics & Information Technology (MeitY)

The Ministry of Electronics & Information Technology is an executive agency responsible for IT policy, strategy and development of the electronics industry.

Orpheus Cyber

Orpheus Cyber

Orpheus Cyber provides predictive and actionable intelligence to our clients - enabling them to anticipate, prepare for and respond to the cyber threats they face.

Mitigo Group

Mitigo Group

Mitigo offers a well considered and effective approach to keeping businesses completely secure from any digital attacks.

ANSSI Burkina Faso

ANSSI Burkina Faso

ANSSI is responsible for managing the security of information systems and cyberspace in Burkina Faso.

Allstate Identity Protection

Allstate Identity Protection

Allstate make it easy to provide complete identity protection, so everyone can live more confidently online.

Cloud Software Group

Cloud Software Group

Cloud Software Group provides mission-critical software to enterprises at scale.