Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Data Breach
  • NHS warns of scam COVID-19 text messages
  • Data Breach

NHS warns of scam COVID-19 text messages

4 years ago Graham Cluley
NHS warns of scam COVID-19 text messages

The UK’s National Health Service (NHS) has warned the public about a spate of fake messages, sent out as SMS text messages, fraudulently telling recipients that they have been exposed to the Omicron variant of COVID-19.

In a tweet, the NHS said that it had seen reports of text messages that claimed to come from the NHS, telling recipients that they had been in close contact with someone who had a confirmed COVID-19 infection, and that they should order a testing kit.

So, what happens if you do make the mistake of clicking on the link in the bogus text message you have received?

The real NHS website is at nhs.uk, but obviously the scammers don’t want you to go there.

Instead, the link sent to you by the scammers takes you to a lookalike website that pretends to belong to the NHS.

Fake NHS Website 1

To the casual observer it looks very much like the real NHS website. Indeed, on a smartphone you may very well not notice that the domain you have visited is not nhs.uk.

This bogus website wants you to order a test kit, for which you will “only have to pay £0.99 for postage”.

Fake NHS Website 2

The real NHS does not distribute free COVID-19 test kits anymore, so the notion that all you have to do to receive a free test is pay 99 pence postage should also ring alarm bells in the victim’s minds. However, if you’ve got this far through the scam chances are that you will also have forgotten that fact in your panic to get yourself tested for the Omicron variant.

Of course, the website doesn’t just want your money. It also wants your full name, address, date of birth, and other personal information. If you hand over this information you are unwittingly helping the fraudsters scam you further, by sharing your personal data. At some point in the future, this information could be used against you by a scammer to make them appear even more convincing.

The scammers are using a variety of different domains in their scam messages, many of which have only been created in the last few days.

Fake NHS text 2

In its warning the NHS references advice from the NCSC about spotting scams. One would imagine that the NHS is also reporting the scam websites to the NCSC so they can be shut down as quickly as possible, but – of course – opportunistic scammers will continue to create new domains, and send out more scam messages, for as long as they believe it will help them defraud innocent members of the public.

With so many scams reliant on the use of newly-created websites it’s a shame that giants like Apple and Google don’t do more to warn users that they are clicking on a link to a website which you should probably be more skeptical about than one which has existed for years and years.

And no, it should go without saying, you’re not going to receive a free COVID-19 testing kit through the post after handing over your personal information on one of these scam websites.


Editor’s Note: The opinions expressed in this and other guest author articles are solely those of the contributor, and do not necessarily reflect those of Tripwire, Inc.

The post ” NHS warns of scam COVID-19 text messages” appeared first on TripWire

Source:TripWire – Graham Cluley

Tags: COVID-19, Encryption, Finance, Google, Goverment, Phishing, TripWire

Continue Reading

Previous Fancy Bear Uses Nuke Threat Lure to Exploit 1-Click Bug
Next Log4Shell Still Being Exploited to Hack VMWare Servers to Exfiltrate Sensitive Data

More Stories

  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link

4 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos

4 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

⚡ Weekly Recap: Proxy Botnet, Office Zero-Day, MongoDB Ransoms, AI Hijacks & New Threats

8 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach

Securing the Mid-Market Across the Complete Threat Lifecycle

9 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users

11 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware

15 hours ago [email protected] (The Hacker News)

Recent Posts

  • OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link
  • Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos
  • ⚡ Weekly Recap: Proxy Botnet, Office Zero-Day, MongoDB Ransoms, AI Hijacks & New Threats
  • Securing the Mid-Market Across the Complete Threat Lifecycle
  • Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT