Hi Guys,

The Microsoft 365 Defender Research Team has uncovered an SMS-based phishing campaign targeting banks’ customers with information-stealing malware masquerading as a rewards application. They said the SMS messages contain links that redirect users to dodgy websites that download the fake banking rewards app onto a target’s device. Here is everything you need to know.

How Does The Attack Work?

  • The attacker sends the target an SMS message with a malicious link. The message will look like this:
    Dear Customer,
    Your (name of your bank) credit card points will expire tomorrow. Kindly redeem points in cashback by clicking on HTTPS://……
    -DCEnter
  • When the target opens the link, they are redirected to a fake website where they download a malicious app that poses as a banking rewards app.
  • Once installed, the app asks the target to confirm their credit card number, expiry date, and CCV number, as well as their IBAN, etc. At this point, they empty your bank account and drain your credit card.
  • In addition, they can now take control of the target’s phone and all its information.
  • GAME OVER

How do you protect yourself?

  • Ignore any SMS messages that look like the one described above
  • Use the Incognito website checker to ensure the link is safe before clicking. We will let you know if it is secure. You can find this feature in the app.
  • Never give your credit card to any app unless you 100% trust it.

Please pass this on to anyone you think might be affected by this scam.

All the best, and I hope you are having a great moment wherever you are 🙂

Max Roberts,
Ijncognito Privscuy Care Team