skip to Main Content

At The Identity Organisation, we're here to help!

    Your privacy is important to us, and we want to communicate with you in a way which has your consent and which is in line with UK Law on data protection. As a result of a change in UK law on 25th May 2018, by providing us with your personal details you consent to us processing your data in line with current GDPR requirements.

    Here is where you can review our Privacy & GDPR Statement

    To remove consent at any time, please e-mail with the word "unsubscribe" as the subject.

    +44 (0) 1628 308038

    Phishing scam adds a ‘chatbot-like’ twist to steal credit card information and more

    A newly discovered phishing campaign tries to ease potential victims into feeling secure about sharing credit card numbers and other information, according to research published Thursday by Trustwave’s SpiderLabs team.

    The process includes a “chatbot-like” page that “tries to engage and establish trust with the victim” rather than simply embed an information-stealing link directly in an email or attached document, according to the report.

    “We say ‘chatbot-like’ because it is not an actual chatbot,” writes researcher Adrian Perez. “The application already has predefined responses based on the limited options given.”

    Responses to the bogus bot take the potential victim through a series of steps that include a fake CAPTCHA, a login page for a delivery service and ultimately a page that captures credit card information.

    Like the fake chatbot, some of the other steps in the process aren’t very sophisticated. The CAPTCHA, for instance, is just a jpeg file, according to SpiderLabs. But the credit card page actually executes a few things in the background.

    “The credit card page has some input validation methods. One is card number validation, wherein it tries to not only check the validity of the card number but also determine the type of card the victim has inputed,” Perez writes.

    The company says it discovered the campaign in late March, and as of Thursday morning it was still active.

    The SpiderLabs report is just the latest warning about the creativity of cybercriminals who focus on credit card information. Researchers at Trend Micro warned in April that cybercriminals were using fake “security alerts” from popular banks as part of phishing schemes. Discussions about using phishing attacks to harvest credit card information increased on dark web forums last year, Gemini Advisory said in its annual report for 2021.

    Another method — skimming the card data directly from shopping websites — remains popular.

    Researchers at RiskIQ said this week that they have seen a “consistent increase” in skimming activity lately, and not all of it is connected to known groups that use the notorious Magecart malware.

    With thanks to the Cyber Defence Alliance and The Record. The full story is here:

    Free Phishing Security Test

    Would your users fall for convincing phishing attacks? Take the first step now and find out before bad actors do. Plus, see how you stack up against your peers with phishing Industry Benchmarks. The Phish-prone percentage is usually higher than you expect and is great ammo to get budget.

    PST Results

    Here’s how it works:

    • Immediately start your test for up to 100 users (no need to talk to anyone)
    • Select from 20+ languages and customize the phishing test template based on your environment
    • Choose the landing page your users see after they click
    • Show users which red flags they missed, or a 404 page
    • Get a PDF emailed to you in 24 hours with your Phish-prone % and charts to share with management
    • See how your organization compares to others in your industry

    PS: Don’t like to click on redirected buttons? Cut & Paste this link in your browser:


    Sign Up to the TIO Intel Alerts!

    Back To Top