Feeds

Lottery fraudsters exploit 070 personal numbers

You have to be in it to win it

Protecting against web application threats using SSL

Crooks running email lottery scams are exploiting 070 personal numbers in a bid to trick users into thinking they are dealing with people in the UK.

Lottery scams, a low-rent variant of advanced fee frauds made notorious by Nigerian email fraudsters, typically promise a recipient is in line to receive a large cash prize, in a bid to either trick people into disclosing private bank details or handing over fees to secure non-existent rewards. The latest scam emails, detected by net security firm Sophos, contain a contact phone number.

British 070 numbers are the second most commonly used telephone numbers in these scams, behind US-based telephone numbers. These 070 numbers appear like mobile phone numbers but are easily redirected to any number anywhere in the world. In addition, 070 numbers can be acquired for free, as higher charges are paid by the caller to use them.

The numbers have numerous legitimate users but for fraudsters they represent a way to quickly and cheaply acquire multiple phone numbers, all of which redirect to the same mobile phone or landline.

"Internet scammers are scooping up these free 070 personal phone numbers, redirecting them overseas and posing as British lottery officials. They can easily cycle through a bunch of these "throw-away" numbers, using them to con innocent victims into revealing confidential information that can then be used to empty bank accounts and commit identity theft," Sophos senior technology consultant Graham Cluley said.

Nobody wins a lottery before paying to participate so users should be extremely suspicious of any email that tells them otherwise, he added. ®

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Jihadi terrorists DIDN'T encrypt their comms 'cos of Snowden leaks
Intel bods' analysis concludes 'no significant change' after whistle was blown
Home Depot: 56 million bank cards pwned by malware in our tills
That's about 50 per cent bigger than the Target tills mega-hack
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
UK.gov lobs another fistful of change at SME infosec nightmares
Senior Lib Dem in 'trying to be relevant' shocker. It's only taxpayers' money, after all
Critical Adobe Reader and Acrobat patches FINALLY make it out
Eight vulns healed, including XSS and DoS paths
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.