Multi-bank phishing campaign detected by Cybersprint
Cybersprint’s Enterprise Research Team has succesfully detected and tracked a multi-bank malware campaign which used the l33bo phishing kit to steal credentials from users of several banks.
The victims were presented with a fake Gov.UK screen which, after a short questionaire, asked for payment through the selected bank.
The following banks were targetted in this attack:
- Halifax Online
- CB Online
- Lloyd’s bank
- Co-operative bank
- Metro bank
- RBS Digital
- Santander UK
- Tesco Bank
HMRC may sometimes send text messages, however they will never ask for personal or financial information. If you get a text message claiming to be from HMRC offering a ‘tax refund’ in exchange for personal or financial details you shouldn’t reply. Don’t open any links in the message.
Detailed Information on this attack is available upon request and has been delivered to relevant autorities.
This attack was detected using Cybersprint’s Digital Risk Monitoring platform.
On 12 and 13 February 2019, Cybersprint will be present at the ‘StrategieTage IT Security’ congress in Cologne, Germany. The congress features presentations, prearranged meetings, workshops, and the opportunity to network with over 150 potential business partners in IT Security.read more
The Ukrainian police have arrested two groups of hackers who carried out DDoS attacks against news agencies and stole money from Ukrainian citizens.read more
Starting 1 February 2019, DNS will be updated, possibly affecting certain domains and IP-addresses. Is your domain ready? Check it here.read more
Do you have a question?