New Exploits & Examples Of Online Fraud

If you have an issue with a company, complaining on social media can usually be an effective way to get your issue resolved more quickly.  Now, the consumer magazine Which? has found scammers on X / Twitter posing as real customer service agents for a number of well-known brands.  

Which? uncovered 37 fake accounts the looked like the fashion retailer Zara that were replying to customers' genuine queries on X in a bid to steal their personal data.  

The scam accounts we spotted were actively responding to customer complaints that had tagged Zara's genuine X account.  These fake accounts will often reply quickly, in the hope that customers won't notice they're being contacted by a fraudster.

Another criminal exploit are so-called courier scams on Facebook Marketplace and eBay  A buyer, might claim they’re too busy to collect an item and says they’ll use a courier who’ll bring you the cash, and all you need to do is give them your bank details to pay the insurance, which can put your money or identity under threat. 

A recent  example of a courier scam was when a London man was sentenced to five years in prison for tricking people into handing over their money.  He persuaded one victim to go to their bank and withdraw £5,000, which was then handed over to a courier, under the false premise of keeping it safe.  This sentencing comes as courier scams are on the rise - costing people £28.7 million last year, according to figures from  Action Fraud - with older people most likely to be targeted. 

During the first two weeks in May this year, the City of London Police’s Lead Force Operations Room recorded more than 100 referrals for courier fraud - and 85% of victims were between 60 and 90 years old.  

The latest variation of courier fraud involves requests for much larger sums of money and specifically targeting older people. An example is an unexpected phone call  from someone  purporting to be from the police or a local bank branch. The caller might know some of the target’s details, including their address or other personal data which are then used for identity theft and other criminal purposes .  

Recent cases have seen victims persuaded to hand over jewellery, gold coins or their bank card with its Pin to couriers, sometimes with a password given to make it seem more legitimate. These valuable items are then surrendered to the courier, all under the guise of these being ‘evidence’ in an ongoing investigation and the victim told they can reclaim the money, only to find it’s all a scam.   
 
Criminals are even impersonating solicitors to carry out conveyancing fraud, typically executed by a fraudster hacking into a solicitor’s or buyer’s email account and providing alternative bank details for deposits to be paid into. 

Lloyds Bank has warned that it received 29% more reports of conveyancing fraud in the second half of last year compared with the first half.  It also found that victims lost an average of £47,000 and around 45% of victims were aged 39 or under, signalling that first-time buyers may be most at risk.

Image: Mikhail Nilov

You Might Also Read: 

Cyber Crime Hothouses In Myanmar:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

 

« Iran Pays $Mulitmillion Ransom To Protect Its Banks
International Agreement To Regulate Artificial Intelligence »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

C3IA Solutions

C3IA Solutions

C3IA Solutions is an NCSC-certified Cyber Consultancy providing assured, tailored advice to keep your information secure and data protected.

Intertek Group

Intertek Group

Intertek Group provides Assurance, Testing, Inspection and Certification services. Activities include cybersecurity testing and certification.

Silverskin Information Security

Silverskin Information Security

Silverskin is a cyber attack company that specializes in having knowledge of the attacker's mindset to identify vulnerabilities and build effective and persistent defences.

Resilience First

Resilience First

Resilience First is a not-for-profit organisation, led and funded by business to strengthen collective business resilience in all areas, including cyber security.

Netrix

Netrix

Netrix is a Mexican company specialized in IT Security, with more than 18 years of experience in Managed Services, Professional Services and Turnkey Solutions related to Security.

DOS

DOS

DOS is an Ecuadorian company with 3 decades of presence in the market and extensive experience in the planning, management and execution of IT Service Integration Projects.

Beryllium InfoSec Collaborative

Beryllium InfoSec Collaborative

Beryllium InfoSec Collaborative is an information security and cyber security company with 40-plus years of experience across industry & government.

Duality Technologies

Duality Technologies

Duality Technologies combine Advanced Cryptography with Data Science to deliver High-Performance Privacy-Protecting Computing to Regulated Industries.

KDM Analytics

KDM Analytics

KDM Analytics software products automate the NIST risk management framework (RMF) assessment for operational technology (OT) systems.

Anterix

Anterix

Anterix is focused on empowering the modernization of critical infrastructure and enterprise businesses by enabling private broadband connectivity.

Protect AI

Protect AI

Protect AI is a cybersecurity company focused on AI & ML systems. Through innovative security products and thought leadership in MLSecOps, we help our customers build a safer AI powered world.

Trustaira

Trustaira

Trustaira is the first deep tech solution and service company in Bangladesh.

Triskele Labs

Triskele Labs

Triskele Labs deliver services including Penetration Testing, Compliance and Risk Management through to 24*7*365 Security Operations and outsourced Cybersecurity Managers.

Accompio

Accompio

Accompio offer comprehensive support in the digitalisation of your business processes.

System Two Security

System Two Security

System Two Security automates detection engineering and threat hunting.

AVIANET

AVIANET

AVIANET's goal is to empower enterprises and corporations worldwide and manage their digital transformation journey with confidence.