Researchers identified a new email scam using seemingly legitimate BBC News webpages to reroute user clicks and generate bitcoin.

According to My Online Security, the spoofing attack emerged just after the holidays in the U.K. Malicious actors created what appeared to be legitimate emails containing a “Display Message” button, which in turn directed users to fake BBC webpages. Clicking anywhere on these scam pages rerouted users to an affiliate site that generated bitcoin for scammers based on page views.

It’s worth noting that the “Display Message” button doesn’t appear for Outlook users, and Mac users may find themselves redirected to fake login pages rather than spoofed BBC sites.

Not-So-Flattering Imitations

Spoofing is a common technique used by scammers to assuage user doubts and grab login credentials. Financial institutions are among the most popular targets in this kind of email scam. In some cases, spoofers misspell the names of legitimate websites (typosquatting), and in others they attach words to the original site address to keep the format but change the destination.

The BBC email scam opted for the second method, redirecting users to The site looks legitimate at first glance, but upon further inspection, all articles and links relate to bitcoin, making money quickly or “invest now” finance opportunities.

As My Online Security points out, scammers are also sending messages from familiar contacts. In one case, a user received what appeared to be an expected invoice from a roofing company, but was instead the bitcoin redirect link. Further investigation revealed that the fake site was hosted by Cloudflare — once notified, the cloud provider set up an interstitial scam warning page to alert other users.

How to Defend Your Organization From Email Scams

The lucrative nature of click-driven spoofing means enterprises should expect more of the same in the foreseeable future. But it’s not all bad news: By employing physical safeguards such as verifying suspicious emails via a separate channel — phone calls, text messages or in person — organizations can lower their risk.

Security experts also suggest developing cyberattack frameworks that identify common attack vectors and deploy relevant countermeasures. For example, if spoofing emails are on the rise, a layered approach to email security can help weed out potential fakes. In addition, experts recommend regular re-evaluation of basic cybersecurity hygiene such as deleting redundant accounts, backing up critical data and application whitelisting — to reduce the chance of becoming a victim of an email scam.

More from

CEO, CIO or CFO: Who Should Your CISO Report To?

As we move deeper into a digitally dependent future, the growing concern of data breaches and other cyber threats has led to the rise of the Chief Information Security Officer (CISO). This position is essential in almost every company that relies on digital information. They are responsible for developing and implementing strategies to harden the organization's defenses against cyberattacks. However, while many organizations don't question the value of a CISO, there should be more debate over who this important role…

Malware-as-a-Service Flaunts Its Tally of Users and Victims

As time passes, the security landscape keeps getting stranger and scarier. How long did the “not if, but when” mentality towards cyberattacks last — a few years, maybe? Now, security pros think in terms of how often will their organization be attacked and at what cost. Or they consider how the difference between legitimate Software-as-a-Service (SaaS) brands and Malware-as-a-Service (MaaS) gangs keeps getting blurrier. MaaS operators provide web-based services, slick UX, tiered subscriptions, newsletters and Telegram channels that keep users…

How the Silk Road Affair Changed Law Enforcement

The Silk Road was the first modern dark web marketplace, an online place for anonymously buying and selling illegal products and services using Bitcoin. Ross Ulbricht created The Silk Road in 2011 and operated it until 2013 when the FBI shut it down. Its creator was eventually arrested and sentenced to life in prison. But in a plot twist right out of a spy novel, a cyber attacker stole thousands of bitcoins from Silk Road and hid them away. It…

Data Privacy: How the Growing Field of Regulations Impacts Businesses

The proposed rules over artificial intelligence (AI) in the European Union (EU) are a harbinger of things to come. Data privacy laws are becoming more complex and growing in number and relevance. So, businesses that seek to become — and stay — compliant must find a solution that can do more than just respond to current challenges. Take a look at upcoming trends when it comes to data privacy regulations and how to follow them. Today's AI Solutions On April…