Cybersprint’s Enterprise Research Team has succesfully detected and tracked a multi-bank malware campaign which used the l33bo phishing kit to steal credentials from users of several banks.
The victims were presented with a fake Gov.UK screen which, after a short questionaire, asked for payment through the selected bank.
The following banks were targetted in this attack:
- Halifax Online
- CB Online
- Lloyd’s bank
- Co-operative bank
- Metro bank
- RBS Digital
- Santander UK
- Tesco Bank
HMRC may sometimes send text messages, however they will never ask for personal or financial information. If you get a text message claiming to be from HMRC offering a ‘tax refund’ in exchange for personal or financial details you shouldn’t reply. Don’t open any links in the message.
Detailed Information on this attack is available upon request and has been delivered to relevant autorities.
This attack was detected using Cybersprint’s Digital Risk Monitoring platform.