Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Phishing Attack Impersonates as DWP Attacking Users to Steal Credit Card Data

Posted on July 5, 2025July 5, 2025 By CWS

A classy phishing marketing campaign focusing on UK residents has emerged, masquerading as official communications from the Division for Work and Pensions (DWP) to steal delicate monetary data.

The marketing campaign, which has been lively since late Might 2025, represents a big escalation in social engineering assaults in opposition to British residents, exploiting issues about authorities advantages and seasonal allowances.

The assault leverages SMS messaging as its major vector, distributing fraudulent messages that warn recipients about lacking Winter Heating Allowance functions.

These messages create a way of urgency by suggesting that rapid motion is required to keep away from dropping essential monetary help in the course of the winter months.

Faux discover (Supply – X)

The psychological manipulation is especially efficient because it targets susceptible populations who rely upon authorities help packages.

Gen Menace Labs analysts recognized the marketing campaign’s peak exercise occurring within the second half of June 2025, indicating a coordinated effort to maximise influence throughout a interval when residents can be most involved about heating allowances.

The researchers famous that the marketing campaign makes use of shortened URLs to obscure the malicious vacation spot, main unsuspecting victims to convincing reproduction web sites that carefully mimic official DWP portals.

Technical Evaluation: URL Shortening and Area Masquerading

The phishing infrastructure employs refined URL shortening strategies mixed with area spoofing to evade detection mechanisms.

The attackers register domains that carefully resemble professional authorities web sites, using strategies akin to typosquatting and homograph assaults.

Faux web page (Supply – X)

These fraudulent websites are designed with meticulous consideration to element, incorporating official DWP branding, logos, and structure buildings to ascertain credibility.

🚨 Phishing Alert – UK 🇬🇧 Focused SMS Marketing campaign 🚨Since late Might, a #phishing marketing campaign impersonating @DWPgovuk has been circulating by way of SMS utilizing shortened hyperlinks resulting in faux authorities web sites, peaking within the second half of June. The messages warn of lacking Winter Heating… pic.twitter.com/XEv4lqOikS— Gen Menace Labs (@GenThreatLabs) July 4, 2025

The shortened hyperlinks serve a number of functions past mere obfuscation.

They allow the attackers to trace click-through charges, analyze sufferer demographics, and implement conditional redirects primarily based on user-agent strings or geographic areas.

This information assortment permits the menace actors to refine their focusing on methods and optimize conversion charges for his or her credential harvesting operations.

As soon as victims navigate to those malicious websites, they encounter kinds requesting complete private data together with bank card particulars, banking data, and id verification information underneath the guise of processing profit functions.

Examine stay malware habits, hint each step of an assault, and make quicker, smarter safety choices -> Strive ANY.RUN now

Cyber Security News Tags:Attack, Attacking, Card, Credit, Data, DWP, Impersonates, Phishing, Steal, Users

Post navigation

Previous Post: The Most Active RAT Uses New Stagers and Loaders to Bypass Defenses
Next Post: Writable File in Lenovo’s Windows Directory Enables a Stealthy AppLocker Bypass

Related Posts

Threat Actors Abuse Windows Run Prompt to Execute Malicious Command and Deploy DeerStealer Cyber Security News
FortiVoice 0-day Vulnerability Exploited in the Wild to Execute Arbitrary Code Cyber Security News
Microsoft and CrowdStrike Teaming Up to Bring Clarity To Threat Actor Mapping Cyber Security News
RapperBot Botnet Attack Peaks 50,000+ Attacks Targeting Network Edge Devices Cyber Security News
NCSC Warns of ‘UMBRELLA STAND’ Malware Attacking Fortinet FortiGate Firewalls Cyber Security News
Microsoft Defender for Office 365 to Provide Detail Results for Spam, Phishing or Clean Emails Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Identify Fake Mobile Apps
  • “CitrixBleed 2” Vulnerability PoC Released
  • Russia Jailed Hacker Who Worked for Ukrainian Intelligence to Launch Cyberattacks on Critical Infrastructure
  • Threat Actors Turning Job Offers Into Traps, Over $264 Million Lost in 2024 Alone
  • Instagram Started Using 1-Week Validity TLS certificates and Changes Them Daily

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Identify Fake Mobile Apps
  • “CitrixBleed 2” Vulnerability PoC Released
  • Russia Jailed Hacker Who Worked for Ukrainian Intelligence to Launch Cyberattacks on Critical Infrastructure
  • Threat Actors Turning Job Offers Into Traps, Over $264 Million Lost in 2024 Alone
  • Instagram Started Using 1-Week Validity TLS certificates and Changes Them Daily

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News