Fake UK bank domains EXPOSED

DomainTools has identified over 300 websites tricking web users into thinking they’re clicking on to UK high street bank websites.

Research released today has uncovered a plethora of cybersquatters mimicking UK bank websites. DomainTools found 324 registered domains using the trademarked names of five of the UK’s top high street banks.

Domains masquerading as legitimate UK bank websites are often used by hackers to trick customers into handing over personal details or login information.

Cybersquatting (also known as domain squatting) is the act of registering a domain name with the purpose of getting monetary benefit from a trademark that belongs to someone else.

>See also: Exposed: Scam company impersonates cybersecurity brands, tricks hundreds out of money

These domains are often used in phishing email campaigns and various other kinds of scams including pay per click ads (often for competitors’ services), for-profit survey sites and affiliate program abuse, or more nefarious content like ransomware and drive-by download campaigns.

The DomainTools research team analysed domains mimicking Barclays, HSBC, Natwest, Lloyd’s and Standard Chartered using its PhishEye tool. PhishEye allows users to search for existing and new domains that spoof legitimate brand, product, organization, or other names. In total, there were 324 domains identified as high risk that contained the banks’ brand names. Some examples include:

natwesti[.]com

natwestbusinessbanking[.]co.uk

lloydstbs[.]com

hsbcgrp[.]com

bhsbc[.]com

barclaysbank-plc[.]co.uk

wealthbarclays[.]co.uk

standardchartered-bank[.]com

standardcharteredbanks[.]com

standardcharterd[.]com

xtandardchartered[.]com

>See also: Cyber crime and the banking sector

Kyle Wilhoit, senior security researcher at DomainTools said, “Imitation has long been thought to be the sincerest form of flattery, but not when it comes to domains. While domain squatters of the past were mostly trying to profit from the domain itself, these days they’re often sophisticated cybercriminals using the spoofed domain names for more malicious endeavours.”

He explained how there are patterns to be found in these types of domains. “Many will simply add a letter to a brand name, such as Domaintoools.com, while others will add letters or an entire word such as ‘login’ to either side of a brand name. Users should remember to carefully inspect every domain they are clicking on or entering in their browser. Also, ensure you are watching redirects when you are going from site to site.”

“Brands can and should start monitoring for fraudulent domain name registrations and defensively register their own typo variants. It is better to lock down typo domains than to leave them available to someone else and at an average of £12 per year per domain, this is a relatively cheap insurance policy.” Wilhoit concluded.

>See also: Cyber criminals use fake telecom stations to spread malware

How can consumers avoid falling foul of a spoof website? DomainTools recommends that users:

 Check for extra added letters in the domain, such as Yahooo[.]com.

 Check for dashes in the domain name, such as Domain-tools[.]com.

 Look out for ‘rn’ disguised as an ‘m’, such as modem.com versus modern.com.

 Check for reversed letters, such as Domiantools[.]com.

A plural or singular form of the domain, such as Domaintool[.]com.

Examples of spoof websites
Examples of spoof websites

 

Nominations are now open for the Tech Leaders Awards 2017, the UK’s flagship celebration of the business, IT and digital leaders driving disruptive innovation and demonstrating value from the application of technology in businesses and organisations. Nominating is free and simply: just click here to enter. Good luck!

Avatar photo

Nick Ismail

Nick Ismail is a former editor for Information Age (from 2018 to 2022) before moving on to become Global Head of Brand Journalism at HCLTech. He has a particular interest in smart technologies, AI and...

Related Topics