Minimize your digital risk by detecting data loss, securing your online brand, and reducing your attack surface.
A powerful, easy-to-use search engine that combines structured technical data with content from the open, deep, and dark web.
Digital Risk Protection
With financially-sensitive information constantly owing through company emails, these inboxes are lucrative targets for attackers.
New report recognizes Digital Shadows for strongest current offering, strategy, and market presence of 14 vendors profiled
Read Full Report
Over the last week we’ve been tracking several emails impersonating UK services such as “TV Licensing” and “Vehicle Road Tax”. While the volumes seen have been a lot lower than other scams we’ve investigated, the lures used by these scams are all too real.
The TV License payment update scam has already hit the media with people reporting losses of up to £10,000. While a lot of scams are high volume, low quality scams, this campaign appears to be low volume but much higher in quality. It starts with a simple yet effective email:
Figure 1: Example of TV License scam email
The victim is prompted to follow the link to a cloned version of the legitimate TV License website, hosting a realistic personal information-harvesting page. While this page looks genuine, the website address looks very suspect – though the attacker has attempted to legitimize it by creating a subdomain using the real website. This shows that if this domain was compromised, the DNS management account had also been compromised – giving the attacker the ability to create new subdomains to mimic that of the cloned website.
Figure 2: Personal information-harvesting page hosted on subdomain located on genuine TV Licensing website
The information collected – which includes dates of birth, phone numbers and mother’s maiden name – would provide an attacker enough information to get through some security questions for various services. This information alone can be sold or used to launch more advanced phishing campaigns.
To make matters worse, the following information harvesting page asks victims to enter their payment details, including both payment card information and bank account numbers.
Figure 3: Payment details-harvesting page
Once the details are all collected, they are likely sent via email to an email account controlled by the attacker, where the details organized and processed accordingly.
The UK vehicle tax email is not as clean but still has a legitimate sounding lure, with a clear sense of urgency.
Figure 4: Vehicle Road Tax lure threatening large fines if email is not responded to
The email contains a link to yet another cloned site using the same techniques as the UK TV License fraud. The form will first request a real vehicle’s registration. Why would a scam ask for that information? While this information could be useful, it may also serve to provide more validity to the attempt.
Figure 5: Cloned page requests victim enter vehicle registration details
Once again, we are prompted with a similar request for information, and a single page is used to harvest both personal information and payment information.
Figure 6: Malicious payment and personal information harvesting form
While both scams have similarities, there are subtleties that suggest there are separate attackers running these campaigns. For example, the TV License email was cleaner; however, it did spoof the victim email, which would reduce the likelihood of successful delivery. These emails were also seen being sent through misconfigured SMTP servers, using open relays to deliver them. The vehicle tax scam, on the other hand, appeared to use randomly generated or compromised email accounts.
Both TV License and vehicle tax scams used a similar subdomain trick to add some additional credibility, suggesting the domains were either owned by the attackers or at least fully under their control.
While these services are UK-specific, some of the target email addresses seen were from various top-level domains (TLD), including .nl TLDs, indicating that there was no country specific targeting.
As always with these scams, the same advice remains true:
To stay up to date with the latest digital risk and threat intelligence news, subscribe to our threat intelligence emails here.