Cyber Criminals Carrying out Phishing Activities against HMRC

Web security company M86 Security Labs, which is now part of TrustWave SpiderLabs has been found to give a helping hand to the hijackers to carry out phishing activities against HM Revenue & Customs.

Cyber criminals use phishing emails where they impersonate a third party that may have a credible reason for interacting with your bank, such as a tax department.Then the victims are attracted to a landing page via spam where they are asked to choose their bank from a selection. Then a fake login page is shown for that bank. This increases the chance of a Phisher matching a bank to a potential victim.

The imitation of emails was used in the ongoing attack and they looked practically the same as many preceding HMRC phishing email. The content within the email body was being served directly from the M86 Security Labs website so the victims were less likely to have suspicion.

The victim is taken to an HMRC when he clicks on the image in the phishing email. This initially induces the victim to enter their email address, full name and date of birth, before a subsequent page asks for even more information, including the victim’s postal address and card details.

Netcraft blocked 1,150 HMRC phishing sites last month alone, and particulary found one hosted under the trusted domain in 2009.According to Netcraft they playfully embedded the image in their poisoned messages to make them look authentic. They could just run the scam by including that URL in their messages.

TrustWave seems to have dislodged the image on the day Netcraft stated the problem.

Netcraft figured out that it has caught 1,150 attempts to phish HMRC in February alone, so must also feel it has the potency to stop phishers abusing the image it now hosts.

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

Security Against Hacks: A Simple Game of Economics

One of the cold hard truths behind cybersecurity is that it's impossible to prevent a hack 100% of the time. It only takes one...

Certain Things That You Must Know About Microsoft MS-500 Exam and Its Practice Tests

If you want to be a Microsoft 365 security administrator, then there would be a number of responsibilities that will fall on your shoulders,...

Quick Ways to Avoid Being Watched by the NSA’s PRISM Program

Big brother is on the watch online. Today, a week hardly passes without news of government spying, whistleblowers, cell phone hacking, or even private photos...

Android Post Exploitation: Exploit ADB using Ghost Framework in Kali Linux

This article is the part of Android Hacking tutorial; it covers step by step guide to exploit Android ADB to get the persistent connection...


Then sign up for FREE to the ehacking’s exclusive group. You will get the exclusive tips/tricks, tutorials, webinars & courses that I ONLY share with my fellow on this exclusive newsletter.