Multi-bank phishing campaign detected by Cybersprint

by | 13-04-2018 | Blog

Cybersprint’s Enterprise Research Team has succesfully detected and tracked a multi-bank malware campaign which used the l33bo phishing kit to steal credentials from users of several banks.

The victims were presented with a fake Gov.UK screen which, after a short questionaire, asked for payment through the selected bank.

The following banks were targetted in this attack:

  • Halifax Online
  • CB Online
  • HSBC
  • NWOLB
  • Lloyd’s bank
  • TSB
  • Co-operative bank
  • Metro bank
  • RBS Digital
  • Santander UK
  • Tesco Bank
  • Barclays

HMRC may sometimes send text messages, however they will never ask for personal or financial information. If you get a text message claiming to be from HMRC offering a ‘tax refund’ in exchange for personal or financial details you shouldn’t reply. Don’t open any links in the message.

Detailed Information on this attack is available upon request and has been delivered to relevant autorities.

This attack was detected using Cybersprint’s Digital Risk Monitoring platform.

[iub-cookie-policy]

[/iub-cookie-policy]

Meet Cybersprint at StrategieTage IT Security

On 12 and 13 February 2019, Cybersprint will be present at the ‘StrategieTage IT Security’ congress in Cologne, Germany. The congress features presentations, prearranged meetings, workshops, and the opportunity to network with over 150 potential business partners in IT Security.

read more

Cybersprint Newsletter

All insights, No spam

Cybersprint Newsletter

All insights,
No spam

Cybersprint respects your privacy, read our privacy statement

Cybersprint respects your privacy,
read our privacy statement

Do you have a question?

Our specialists have the answers