Feeds

HMRC warns over tax email scams

Death and taxes and crime

Protecting users from Firesheep and other Sidejacking attacks with SSL

The Treasury has taken the unusual step of warning UK taxpayers of a phishing scam doing the rounds, which looks to ensnare frantic last-minute tax return filers.

Bogus email warnings designed to trick citizens into handing over sensitive personal details are circulating in the run-up to the 31 January Self Assessment tax deadline. The scam messages claim that recipients are entitled to a tax refund and ask for bank or credit card details so that the fictitious refund can be paid out. The emails come from spoofed email addresses so that they might appear to come from tax authorities.

HMRC is working with the authorities to take sites associated with the scam offline. Phishing sites hosted in Austria, Mexico, USA, Thailand and Japan have already been pulled down.

In addition, some fraudsters are going to the additional trouble of phoning up prospective marks, similarly posing as tax officials arranging rebate payments. Punters who fall for either variant of the scam risk having their bank accounts emptied or credit cards maxed out, HMRC warns.

HM Revenue & Customs warns that further scam emails along the same lines might be expected even after the deadline passes at the end of the month. Genuine tax officials will only contact people by letter, it adds.

"This is the most sophisticated and prolific phishing scam that we have encountered," said Lesley Strathie, HMRC Chief Executive, in a statement. "We only ever contact customers who are due a refund in writing by post. We never use emails, telephone calls or external companies in these circumstances.

"I would strongly encourage anyone receiving such an email to send it to us for investigation."

Since April 2008 HMRC has received over 11,000 reports of fraudulent repayment emails. HMRC's general advice on the issue can be found here.

Net security firm McAfee adds: "We have seen over 20 different HRMC phishing scams since October and six different examples since 2 January alone. It's a very topical phishing scam, as people are seeing TV adverts and receiving letters reminding them of the approaching deadline." ®

The next step in data security

More from The Register

next story
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
Infosec geniuses hack a Canon PRINTER and install DOOM
Internet of Stuff securo-cockups strike yet again
THREE QUARTERS of Android mobes open to web page spy bug
Metasploit module gobbles KitKat SOP slop
'Speargun' program is fantasy, says cable operator
We just might notice if you cut our cables
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.