Cyber Criminals Carrying out Phishing Activities against HMRC

Web security company M86 Security Labs, which is now part of TrustWave SpiderLabs has been found to give a helping hand to the hijackers to carry out phishing activities against HM Revenue & Customs.

Cyber criminals use phishing emails where they impersonate a third party that may have a credible reason for interacting with your bank, such as a tax department.Then the victims are attracted to a landing page via spam where they are asked to choose their bank from a selection. Then a fake login page is shown for that bank. This increases the chance of a Phisher matching a bank to a potential victim.

The imitation of emails was used in the ongoing attack and they looked practically the same as many preceding HMRC phishing email. The content within the email body was being served directly from the M86 Security Labs website so the victims were less likely to have suspicion.

The victim is taken to an HMRC when he clicks on the image in the phishing email. This initially induces the victim to enter their email address, full name and date of birth, before a subsequent page asks for even more information, including the victim’s postal address and card details.

Netcraft blocked 1,150 HMRC phishing sites last month alone, and particulary found one hosted under the trusted gov.uk domain in 2009.According to Netcraft they playfully embedded the image in their poisoned messages to make them look authentic. They could just run the scam by including that URL in their messages.

TrustWave seems to have dislodged the image on the day Netcraft stated the problem.

Netcraft figured out that it has caught 1,150 attempts to phish HMRC in February alone, so must also feel it has the potency to stop phishers abusing the image it now hosts.

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...