A sophisticated gang that reportedly fraudulently gathered £12 million was also targeting Plymouth University.

The Fraud Gang

A sophisticated gang that fraudulently gathered £12 million dollars before they were sent to 10-years in prison was also targeting Plymouth University. The gang also attempted to conspire and defraud NHS councils, hospitals and the Guernsey government- around 21 public bodies. It also targeted companies and bank accounts in Poland, Nigeria and Dubai.

In all these cases, the fraud gang sent an email, letter or fax pretending to be a legitimate company that is already working on contracts for the targeted organization. The letter gave new bank account information for the organization to send its contracted fees to, which of course did not belong to those companies but to the criminals.

Plymouth was reportedly one of those targeted organizations, but had never acted on the fake email. Not all members of the gang have been publically identified yet.

Its Other Fraud Cases

One of the cases in which the criminals were successful was NHS Trust in 2011. The criminals managed to trick the staff to divert £1.28 million, which was supposed to be used to build a mental health facility in St George Hospital. This was then noticed by an employee from Costain who realized the company’s logo was misplaced, and the signatures were sketchy and the reference number was fake.

The police were notified of the cyber attack, triggering a long investigation which prompted the help of Dubai and Polish law enforcement.

The RCA was also targeted in September of that year for £1.26 million. However, employees noticed the mistake and had the money returned.

The Guernsey government was also tricked into giving away £2.6 million.

Other Recent Cyber Attacks

Last month also hosted a series of unprecedented cyber attacks against many companies all over the world, including NHS trust. BBC recently reported that British officials had linked these attacks to a group of hackers called Lazarus from North Korea.

An international investigation was carried out by the UK National Cuber Security Center (NCSC) and detectives found that there were significant overlaps between the code known to be developed by the group and the code found in the virus that was used to hack these companies.

Adrian Nish, the leader of the intelligence team, said: “It seems to tie back to the same code-base and the same authors. The code-overlaps are significant.” He also called the bank attacks “one of the biggest bank heists of all time in physical space or in cyberspace.”


Please enter your comment!
Please enter your name here