Crime Sometimes Pays: $1.1M Recovered from U.K. Phishing Scammer 2 Years After Being Caught

Grant_WestWe don’t often hear enough stories of cybercriminals being caught and paying back what they’ve stolen, but in the case of scammer Grant West, that’s exactly what has happened. 
Back in 2015, West was the author of a simple and yet sophisticated phishing scam purporting to be the food delivery service Just Eat asking U.K. customers to complete a survey in exchange for £10. Using a Just Eat spoofed logon page, West was able to collect usernames and passwords. Victims took the “survey” and were asked to provide banking details to receive their compensation. 
According to recent details, the police found plenty of proof that West had been either collecting or leveraging victim’s personal or financial details – when arrested, West had financial data on 100,000 individuals, 78M sets of usernames and passwords, and 63,000 credit or debit card details. 
Arrested in 2017 and convicted this year, West was compelled by the British court to give back over $1M, securely stored as cryptocurrency, in exchange for a reduction in his overall sentence.
It obviously feels good to hear about a scammer getting their just reward, but it should serve as a warning to organizations of just how easy it is to get into the phishing scam business, obtain and sell personal details on the dark web, and to actually fool individuals into falling for well-designed scams.
It’s no longer sufficient for organizations to merely warn users of specific scam or attack tactics; organizations must create a security culture using Security Awareness Training to ensure everyday non-IT users remain vigilant against attacks such as West’s survey scam.

Free Phishing Security Test

Would your users fall for convincing phishing attacks? Take the first step now and find out before bad actors do. Plus, see how you stack up against your peers with phishing Industry Benchmarks. The Phish-prone percentage is usually higher than you expect and is great ammo to get budget.

PST ResultsHere's how it works:

  • Immediately start your test for up to 100 users (no need to talk to anyone)
  • Select from 20+ languages and customize the phishing test template based on your environment
  • Choose the landing page your users see after they click
  • Show users which red flags they missed, or a 404 page
  • Get a PDF emailed to you in 24 hours with your Phish-prone % and charts to share with management
  • See how your organization compares to others in your industry

Go Phishing Now!

PS: Don't like to click on redirected buttons? Cut & Paste this link in your browser:

Subscribe To Our Blog

Ransomware Hostage Rescue Manual

Get the latest about social engineering

Subscribe to CyberheistNews