Action Fraud Reports A Sharp Rise In Fake TSB Activity

The increase in the number of reports being sent to Action Fraud is in part linked to the system issue some TSB customers have experienced over recent weeks. 

Opportunistic fraudsters are using TSB’s system issue to target people with this type of fraud. TSB, or any bank, will never ask for a PIN, password or full memorable information by email or text. 

Fraudsters are commonly using text messages as a way to defraud unsuspecting victims out of money. This is called smishing (SMS + fishing). Of the smishing attempts reported to Action Fraud, 80% requested that the recipient clicks onto a website link. The second most common delivery technique reported has been email.

Fraudsters are using specialist software which changes the sender ID on text messages so that it looks like messages are being sent by TSB. In some instances, this spoofed text is being added to existing TSB message threads on victim’s phones.
Should someone click on the link within a spoofed text message and enter their personal information, the fraudsters then call the victim back and persuade them to hand over their one off code from their mobile phone. The fraudsters can then empty the victim’s account. 

Director of Action Fraud, Pauline Smith, said:

“We have seen an increase in opportunistic fraudsters sending text messages claiming to be from TSB that ask people to reply with their personal or banking details. 

“This can have a devastating effect on people, who can lose out on large sums of money.

“Don’t assume anyone who’s sent you a text message is who they say they are. If a text message asks you to make a payment, log in to an online account or offers you a deal, be cautious and report it to Action Fraud.”

A TSB Fraud spokesperson said: 

“While our systems are safe and secure, unfortunately fraudsters are increasingly sophisticated and looking to take advantage of situations like these by approaching customers. 

“Protecting our customers’ information is our number one priority. We are doing all we can to ensure customers don’t become a victim of fraud, whether they bank with us in branch, online or via the telephone and this is something we are working on with Action Fraud and a number of external organisations. 

“We are also working with these organisations to help them identify fraudulent sites so we can take them down as quickly as possible.”

How to Protect Yourself
Don’t assume an email or text is authentic: Always question uninvited approaches in case it’s a scam. Phone numbers and email addresses can be spoofed, so always contact the company directly via a known email or phone number, such as the one on the back of your bank card. 

Clicking on links/files:
Don’t be tricked into giving a fraudster access to your personal or financial details. Never automatically click on a link in an unexpected text or email. Remember, a genuine bank will never contact you out of the blue to ask for your full PIN or password. 

If you have received a suspicious TSB email, please do not respond to it, report it 

Action Fraud:         

You Might Also Read:

TSB's IT Meltdown Was Evident A Year Before:

Barclays Bank Want To Stop Cybercrime:

 

 

« Nation State Cyber Attacks Are An Act Of War
Malta Under Large Scale Attack »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Navista

Navista

Navista's hardware and software modules are especially designed to ease the deployment of secure networks.

FIDO Alliance

FIDO Alliance

FIDO Alliance is a non-profit organization formed to address the lack of interoperability among strong authentication devices.

Atos

Atos

Atos provides a unique Cyber Security end to end solution with a data-centric and pre-emptive security approach.

Avira

Avira

Avira provide a portfolio of antivirus, security and performance applications for Windows, Android, Mac, and iOS.

NinjaJobs

NinjaJobs

NinjaJobs is a community-run job platform developed by information security professionals. We focusing strictly on cybersecurity positions.

Outsource UK

Outsource UK

Outsource UK is an independent recruitment company supplying highly-skilled technology, change and engineering talent to clients within a range of specialist sectors including Cyber Security.

Osirium

Osirium

The Osirium PxM Privileged Access Management platform addresses both security and compliance requirements by defining who gets access to what and when.

Kentik

Kentik

Kentik - one platform for Network Visibility, Performance, and Security.

Seknox

Seknox

Seknox TRASA™ protects your business from insider threats.

Hyperwise Ventures

Hyperwise Ventures

Hyperwise Ventures lead seed investments in startups in the cyber security and enterprise software spaces.

Nostra

Nostra

Nostra are a next generation managed services provider with a constant focus on Security and Business Continuity.

RegScale

RegScale

RegScale helps organizations comply in real-time with multiple compliance requirements (NIST, CMMC, ISO, SOX, etc), scalable to meet the needs of the entire enterprise.

Toka Group

Toka Group

Toka empowers government agencies with critical and previously out-of-reach digital forensics, force protection and Intelligence capabilities, tackling the fields' most pressing challenges.

Ipstack

Ipstack

Ipstack offers one of the leading IP to geolocation APIs and global IP database services worldwide. Protect your site and web application by detecting proxies, crawlers or tor users at first glance.

Cypago

Cypago

Cypago provides a powerful yet easy-to-use Compliance Orchestration Platform to automate the compliance process end-to-end.

Sunnic

Sunnic

Sunnic is a leading provider of comprehensive digital data security technology.