Multi-bank phishing campaign detected by Cybersprint

by | 13-04-2018 | Blog

Cybersprint’s Enterprise Research Team has succesfully detected and tracked a multi-bank malware campaign which used the l33bo phishing kit to steal credentials from users of several banks.

The victims were presented with a fake Gov.UK screen which, after a short questionaire, asked for payment through the selected bank.

The following banks were targetted in this attack:

  • Halifax Online
  • CB Online
  • HSBC
  • NWOLB
  • Lloyd’s bank
  • TSB
  • Co-operative bank
  • Metro bank
  • RBS Digital
  • Santander UK
  • Tesco Bank
  • Barclays

HMRC may sometimes send text messages, however they will never ask for personal or financial information. If you get a text message claiming to be from HMRC offering a ‘tax refund’ in exchange for personal or financial details you shouldn’t reply. Don’t open any links in the message.

Detailed Information on this attack is available upon request and has been delivered to relevant autorities.

This attack was detected using Cybersprint’s Digital Risk Monitoring platform.

[iub-cookie-policy]

[/iub-cookie-policy]

US youngsters learn how to use coding & hacking skills

20 young people including 10 American youngsters from Albuquerque and the Navajo Nation in New Mexico will be welcomed in The Hague by Cybersprint on 21 March 2019. The young coding talents will learn how to use their coding and hacking skills in a positive way and to make the digital world safer. They will also see real life examples of how they could use these skills to increase their career opportunities. The programme is part of the CyberHeroes-week which is set up by Cyberworkplace in Rotterdam and the American Embassy in The Hague.

read more

Cybersprint Newsletter

All insights, No spam

Cybersprint Newsletter

All insights,
No spam

Cybersprint respects your privacy, read our privacy statement

Cybersprint respects your privacy,
read our privacy statement

Do you have a question?

Our specialists have the answers