Hackers target Three customers with "sophisticated" phishing scam

Cyber criminals use elements from Three’s style and links out to its website

Three UK

Cyber criminals are posing as UK mobile network operator Three as part of a sophisticated phishing campaign designed to extract the financial details of its customers.

Related Resource

Cyber security for accountants

3 ways to protect yourself and your clients online

Download now

The attack relies on a well-spoofed HTML document that entices Three customers to hand over everything from their password and personal details to credit card and payment information. 

The opportunistic phishing attack campaign, spotted by the Cofense Phishing Defence Centre, appears to be exploiting a sudden rise in demand for data services amid the global coronavirus pandemic. 

The volume of cyber crime exploiting the confusion and economic uncertainty around the crisis has generally increased, with attacks targeting businesses, hospitals and even the World Health Organisation (WHO).

Users are first informed of a bill payment that couldn’t be processed by their bank before they’re invited to download the HTML file ‘3GUK[.]html’ to edit billing information to avoid service disruption.

The attached file then requests login credentials, along with personal and payment information. Alarmingly, the file has cloned actual Three HTML code, and has pulled styling elements from the Three website to appear genuine.

The ‘smoking gun’, according to the researchers, lies in the action attribute of the HTML form element, confirming that any information provided is processed by the ‘processing.php’ script found at a compromised third-party web domain.

The metadata examined by Cofense suggests the email address ‘online@three[.]co[.]uk’ is the apparent source, though on closer inspection it appears far from legitimate. 

“The SPF check shows this was the address provided in the SMTP MAIL FROM command,” the researchers said. “We also see a SoftFail result for the originating IP 86.47.56.231; this means the domain of three.co.uk discourages, but does not explicitly rule out, this IP address as a permitted sender.”

“In other words, the SPF records for the domain of three[.]co[.]uk contain the ~all mechanism, which flags but ultimately lets the email through. 

The phishing campaign is the latest in a string of opportunistic attacks that tend to exploit the zeitgeist. In this instance, Vodafone revealed last week that demand for its data services has surged by at least 50%, an increase likely also seen by its competitors. 

Featured Resources

How to be an MSP: Seven steps to success

Building your business from the ground up

Download now

The smart buyer’s guide to flash

Find out whether flash storage is right for your business

Download now

How MSPs build outperforming sales teams

The definitive guide to sales

Download now

The business guide to ransomware

Everything you need to know to keep your company afloat

Download now

Recommended

Cyber attacks on manufacturing up 300% in a year
Security

Cyber attacks on manufacturing up 300% in a year

11 May 2021
eBay, Apple, Microsoft, Facebook, and Google were phishers’ top targets in 2020
phishing

eBay, Apple, Microsoft, Facebook, and Google were phishers’ top targets in 2020

20 Apr 2021
Report finds ransomware hitting manufacturers hardest
hacking

Report finds ransomware hitting manufacturers hardest

13 May 2021
Over two-thirds of companies still run software with WannaCry flaw
WannaCry

Over two-thirds of companies still run software with WannaCry flaw

12 May 2021

Most Popular

KPMG offers staff 'four-day fortnight' in hybrid work plans
flexible working

KPMG offers staff 'four-day fortnight' in hybrid work plans

6 May 2021
Dell XPS 17 (2021) review: A big laptop for big jobs
Laptops

Dell XPS 17 (2021) review: A big laptop for big jobs

10 May 2021
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

29 Apr 2021