Week 9: Threatening emails supposedly sent by the NCSC and real-time phishing

07.03.2023 - The number of reports received by the NCSC increased again in the ninth week of 2023, with 871 reports, the highest number received this year and the fourth highest in its history. Threatening emails purportedly from authorities accusing the recipient of a criminal offence accounted for the largest share. Now, the NCSC is often being given as the sender of these scam emails. Reports of phishing have also increased in the last three months. This week, a case of real-time phishing was discovered, which seeks to exploit second-factor authentication.

Numerous fake extortion emails also supposedly sent by the NCSC

Threatening emails purportedly from authorities accusing the recipient of a criminal offence related to child pornography were again reported in large numbers last week. Almost 40% (345) of the reports received were due to this phenomenon. It is no longer only prosecution authorities that are used as the email senders: a large proportion is now being sent in the name of the NCSC. In these cases, the attackers use the correct NCSC name, but the logo is taken from our colleagues at the UK National Cyber Security Centre.

As citizens regularly send us such emails, the NCSC receives a lot of feedback from concerned individuals via email and the reporting form. We would like to emphasise that neither the NCSC nor the prosecution authorities send information on ongoing proceedings via email. Any such emails are bogus. Ignore such fake extortion emails and do not allow yourself to be intimidated.

Threatening email purportedly sent in the name of the NCSC accusing the recipient of a criminal offence
Threatening email purportedly sent in the name of the NCSC accusing the recipient of a criminal offence

Real-time phishing attacks on Swiss banks

In the last three months, reports of phishing attempts have been steadily increasing. While in December 2022, the NCSC received 434 reports in the phishing category via its reporting form, in January 2023 this number had already risen to 541 reports, and in February the figure rose again to 676. As mentioned in last week's review, numerous new phishing variants are in circulation and the attackers are testing various variants. Last week, the NCSC primarily observed well-known real-time phishing attempts against financial institutions. In contrast to most phishing attempts, these cases did not involve credit card details; instead, they concerned access to online banking accounts. To do this, the attackers need to obtain the second factor, i.e. the one-time password, in addition to the username and password.

In a first step, the user is asked for their username and password as usual
In a first step, the user is asked for their username and password as usual

This phishing variant also starts with a request for the victim's "username" and "password" on a classical phishing page. However, at the same time in the background, the attackers use these credentials to log into the victim's account on the real online banking page. During this time, the victim is made to wait in a queue and is led to believe that the page is loading.

After entering their username and password, the victim is made to wait in a queue and is led to believe that the page is loading
After entering their username and password, the victim is made to wait in a queue and is led to believe that the page is loading

Once the username and password have been entered, a number – the "challenge" – is displayed on the online banking portal, and this has to be entered into a card reader. The second factor can be generated solely with the corresponding bank card and the card password, which in turn must be entered on the online banking page. Since the attackers are not in possession of the bank card, they have to get the victim to generate the second factor for them.

To do this, they hide the queue and reload the victim's phishing website where they publish the challenge they received when logging in, together with a request to enter the code into the card reader and then enter the result on the phishing page. If the victim also provides this code, the attackers can access the online banking account and initiate fraudulent payments. Finally, the attackers then ask for their mobile phone number. This allows them to communicate with the victim and to persuade them to provide the second factor at a later time or to make other rash moves.

At the end, the phone number is also requested. In this way, the attackers can also communicate with the victim at a later time and trick them into giving the one-time password.
At the end, the phone number is also requested. In this way, the attackers can also communicate with the victim at a later time and trick them into giving the one-time password.

How phishing emails fool the spam filter

The phishing email itself also contains a well-known trick. Additional text that is unrelated to the email is inserted under the actual phishing email. Whereas in previous cases the attackers inserted previous correspondence, in this case they made it easy and copied the Wikipedia entry for the city of Cologne. The attackers use this method to try to bypass spam filters. By inserting legitimate content, it is more likely that the fraudulent content will carry less weight in the spam rating.

Phishing email which contains a Wikipedia entry for the city of Cologne at the bottom. This is intended to deceive the spam filter.
Phishing email which contains a Wikipedia entry for the city of Cologne at the bottom. This is intended to deceive the spam filter.

Recommendations:

  • Wherever possible, use two-factor authentication. This offers an additional layer of protection to prevent your account from being hacked.
  • No bank or credit card company will ever send you an email requesting that you change your password or verify your credit card details.
  • Never divulge personal data such as passwords or credit card details on a website that you have accessed by clicking on a link in an email or text message.
  • Bear in mind that email sender IDs can easily be spoofed.
  • Be sceptical if you receive emails that require action from you and otherwise threaten with consequences (loss of money, criminal charges or legal proceedings, account or card blocking, missed opportunity, misfortune).

Last modification 07.03.2023

Top of page

https://www.ncsc.admin.ch/content/ncsc/en/home/aktuell/im-fokus/2023/wochenrueckblick_9.html