January 15, 2019 By Douglas Bonderud 2 min read

Researchers identified a new email scam using seemingly legitimate BBC News webpages to reroute user clicks and generate bitcoin.

According to My Online Security, the spoofing attack emerged just after the holidays in the U.K. Malicious actors created what appeared to be legitimate emails containing a “Display Message” button, which in turn directed users to fake BBC webpages. Clicking anywhere on these scam pages rerouted users to an affiliate site that generated bitcoin for scammers based on page views.

It’s worth noting that the “Display Message” button doesn’t appear for Outlook users, and Mac users may find themselves redirected to fake login pages rather than spoofed BBC sites.

Not-So-Flattering Imitations

Spoofing is a common technique used by scammers to assuage user doubts and grab login credentials. Financial institutions are among the most popular targets in this kind of email scam. In some cases, spoofers misspell the names of legitimate websites (typosquatting), and in others they attach words to the original site address to keep the format but change the destination.

The BBC email scam opted for the second method, redirecting users to https://business-news.bbc-1.site/landers/bbc-business-news/#forward. The site looks legitimate at first glance, but upon further inspection, all articles and links relate to bitcoin, making money quickly or “invest now” finance opportunities.

As My Online Security points out, scammers are also sending messages from familiar contacts. In one case, a user received what appeared to be an expected invoice from a roofing company, but was instead the bitcoin redirect link. Further investigation revealed that the fake site was hosted by Cloudflare — once notified, the cloud provider set up an interstitial scam warning page to alert other users.

How to Defend Your Organization From Email Scams

The lucrative nature of click-driven spoofing means enterprises should expect more of the same in the foreseeable future. But it’s not all bad news: By employing physical safeguards such as verifying suspicious emails via a separate channel — phone calls, text messages or in person — organizations can lower their risk.

Security experts also suggest developing cyberattack frameworks that identify common attack vectors and deploy relevant countermeasures. For example, if spoofing emails are on the rise, a layered approach to email security can help weed out potential fakes. In addition, experts recommend regular re-evaluation of basic cybersecurity hygiene such as deleting redundant accounts, backing up critical data and application whitelisting — to reduce the chance of becoming a victim of an email scam.

More from

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Communication platforms play a major role in data breach risks

4 min read - Every online activity or task brings at least some level of cybersecurity risk, but some have more risk than others. Kiteworks Sensitive Content Communications Report found that this is especially true when it comes to using communication tools.When it comes to cybersecurity, communicating means more than just talking to another person; it includes any activity where you are transferring data from one point online to another. Companies use a wide range of different types of tools to communicate, including email,…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today