Search This Blog

Powered by Blogger.

Blog Archive

Labels

About Me

Showing posts with label Logging tax. Show all posts

UK Tax Fraud Scheme Uncovered Following Arrests in Romania

 


Despite being organized and waged on a global scale, phishing-based tax fraud schemes that target the United Kingdom have emerged in recent years as a significant development in the fight against transnational cyber-enabled financial crime. An operation coordinated by Romanian law enforcement authorities and HM Revenue and Customs (HMRC) of the UK unfolded across the counties of Ilfov, Giurgiu, and Calarasi during the second half of 2011 and resulted in the arrests of 27 suspects aged between 23 and 53. 

A preliminary investigation suggests that the group organized a sophisticated campaign involving the use of phishing tactics to harvest personal information from people, then used this information to fraudulently apply for tax refunds and government benefits within the UK. In this case, more than 100 Romanian police officers and criminal investigators participated in a sweeping crackdown, demonstrating the size and urgency of the cross-border operation. 

A related operation has been conducted, in which a 38-year-old man was arrested in Preston. HMRC officials seized several electronic devices that appeared to be linked to the broader network. Romanian prosecutors, the HMRC, and the Crown Prosecution Service (CPS) have recently come together to form a strategic alliance aimed at tackling complex cyber fraud and financial misconduct which has cross-border implications. 

As part of the alliance, Romanian prosecutors will cooperate with the UK Crown Prosecution Service to bring this enforcement action. Several authorities on both sides have stressed the importance of this cooperation in the fight against organized cybercriminal groups that are exploiting digital vulnerabilities to attack national tax systems. 

The investigation continues while digital evidence is analyzed and more suspects are being identified as new suspects are identified. It is believed that the arrests are in connection with an ongoing investigation into an organized criminal network accused of using large-scale phishing attacks for defrauding His Majesty's Revenue and Customs (HMRC) of approximately £47 million (equivalent to $63 million) through a large-scale phishing attack campaign. 

Apparently, the gang used deceptive digital schemes in order to harvest login credentials and personal information from British taxpayers, which were then used to access online tax accounts and file fraudulent claims for refunds and government benefits as a result of the misuse of these credentials. When nearly 100,000 UK taxpayers were informed in June 2024 that their HMRC online accounts were compromised, the full extent of the breach only became publicized in June 2024. 

It was the Treasury Committee, which oversees the nation's tax administration, that sparked outrage over the revelation. They criticized senior HMRC officials for failing to announce the losses in a timely manner. As a result of their accusations of a lack of transparency in handling one of the biggest cyber-enabled financial frauds in the recent history of the United Kingdom, lawmakers have called the agency into question. 

HMRC investigators and Romanian police officers have worked together to carry out coordinated raids across multiple locations in Ilfov, Giurgiu, and Calarasi counties, as part of the international enforcement operation targeting the key suspects behind this fraud. Authorities conducted searches during which they seized electronic devices that were believed to contain digital evidence important to the investigation. 

It was confirmed by the Romanian Police Economic Crimes Investigation Directorate that 13 people ranging in age from 23 to 53 were arrested as part of the investigation. As the investigation continues to uncover the full extent of the criminal infrastructure behind the scheme, the suspects are now facing charges of computer fraud, money laundering, and unauthorized access to information systems. HM Revenue and Customs (HMRC) is conducting a series of investigations into a wave of sophisticated phishing campaigns which have targeted individuals across the United Kingdom, leading to the recent arrests, forming part of a broader investigation. 

There were scams involving fraudulent emails and messages designed to mimic official government communications, which deceived the intended recipients into providing sensitive information such as login credentials, personal information, and banking or credit card information to them. Using stolen data as a basis to orchestrate a variety of fraudulent activities that were intended to siphon money out of government programs, the stolen data was ultimately used by perpetrators. 

As a result of this illegal information gathered by the perpetrators, they are able to submit false claims under various financial assistance schemes, such as the Pay As You Earn system (PAYE), VAT repayment schemes, and Child Benefit payments. HMRC nevertheless issued breach notifications to about 100,000 affected individuals whose information was compromised, despite the fact that the fraud was targeted at defrauding the tax authority itself rather than targeting taxpayers' personal financial assets. 

As the Romanian Economic Crimes Investigation Directorate, which spearheaded the arrests, has confirmed, the suspects have been under investigation for a wide range of serious offenses, including computer fraud, money laundering, unauthorized access to information systems, and other serious crimes. 

In the aftermath of the attack, the authorities were keen to stress that there was no breach in the internal cybersecurity infrastructure of HMRC that resulted in the attack. The fraud was, instead, primarily conducted using social engineering methods and phishing tactics in an attempt to gather personal information, which was then manipulated to exploit legitimate tax and benefit services. 

In light of the growing threat of cyber-enabled financial crimes and the need for cross-border cooperation in order to counter complex fraud operations, this case highlights the importance of cross-border cooperation. In spite of the fact that it is believed that the cyberattack occurred in 2023, it was not until June 2024 that the public became aware of the breach. 

According to Dame Meg Hillier, Chair of the UK Parliament's Treasury Select Committee, this delay in disclosure has caused the government to face severe criticism for failing to inform lawmakers and the public in a timely fashion. Her assessment of the tax authority's lack of transparency was "unacceptable," in light of how large the fraud was and how many people were affected by it. 

The government of HMRC announced in June that it had contacted all taxpayers affected by the breach and informed them of the compromise and provided details of the steps taken to secure their accounts in response to the breach. HMRC has seized the affected online accounts as a precautionary measure and has deleted the login credentials associated with the accounts, including Government Gateway user IDs and passwords, to prevent unauthorized access from continuing. 

Additionally, the agency has confirmed that any incorrect or fraudulent information that may have been added to the taxpayers' records during the scam has been identified and removed from the taxpayer's records. There has been increasing interest in tax-related scams since that period, but cybersecurity experts have warned that fraudsters are employing more and more convincing tactics in order to deceive the public. 

According to the CEO of Closed Door Security, tax scams are still one of the major cyber threats facing the UK. The lawyer explained that criminals are increasingly utilizing phishing methods that closely mimic official government correspondence, including emails, text messages, and physical letters, by blending phishing methods and email, text messages, and physical letters. 

To make it more likely for a message to be successful, it is often timed to coincide with important tax deadlines, such as the self-assessment period that falls in January. As Wright pointed out, even technology-savvy individuals can have difficulty distinguishing between these fraudulent messages and the real thing, underlining the need for greater public awareness and stronger digital security. 

Despite the ongoing investigation into cyber-enabled financial crime, this case serves as a powerful reminder of the growing sophistication of this crime, as well as the need for global collaboration in detecting, disrupting, and deterring such activities as soon as possible. In this regard, it emphasizes the importance of public awareness, proactive cybersecurity measures, as well as timely coordination between agencies across borders in order to protect the public's safety. 

For governments, the incident highlights the need for better safeguards around the automation of benefit and tax systems as well as strengthening digital identity verification protocols. In the end, it is a stark warning for individuals to remain vigilant against unsolicited e-mails and adopt best practices to protect their personal information online, as digital infrastructure is becoming increasingly essential to public administration and financial services. 

Therefore, it is imperative that these systems are made resilient as a national priority, as their resilience will become increasingly important in the near future. There will be a greater need to continue investing in cybersecurity capacity-building, sharing threat intelligence, and public awareness campaigns in order to stay ahead of financially motivated cybercrime syndicates operating around the world.

Storm-0558 Breach: Microsoft Breach Risks Millions of Azure AD Apps


Storm-0558 breach, that enabled the China-based advanced persistent threat (APT) group to access emails of at least 25 US agencies seems to be more notorious than anticipated, since the breach may put significant risk on Microsoft cloud services than one could have predicted.

However, it will take weeks, if not months, to identify the full extent of the real compromise caused by the situation since many firms lack sufficient authentication logging.

Reportedly, the email breach enabled access to Microsoft 365 enterprise email accounts and the potentially sensitive information they contained by forging authentication tokens under the guise of authorized Azure Active Directory (AD) users thanks to a stolen Microsoft account (MSA) key.

There are also speculations that the lost MSA key could have additionally allowed threat actors to forge access tokens for "multiple types of Azure Active Directory applications, including every application that supports personal account authentication, such as SharePoint, Teams, OneDrive, customers' applications that support the 'login with Microsoft' functionality, and multitenant applications in certain conditions," as per a research by Wiz published on July 21. 

Head of research at Wiz, Shir Tamari further notes that the APT potentially was fixed in a position to "immediate single hop access to everything, any email box, file service or cloud account."

Scope of the Storm-0558 Breach

After reviving the key earlier in July, Microsoft released indicators of compromise (IoCs) for the email attack. However, assessing if the breach has in fact used the broader access to any of the loads of additional susceptible applications will be a significantly challenging task.

Tamari further explains, "We discovered that it may be difficult for customers to detect the use of forged tokens against their applications due to lack of logs on crucial fields related to the token verification process."

This situation sits next to the so-called “logging tax” that first came across as the aftermath of Microsoft’s initial disclosure of the Storm-0558 breach. 

Due to the fact that advanced logging with a feature of detecting suspicious behavior in systems has only been made available to customers with paid premium service, many Microsoft customers have been unable to see how the attacks have affected their companies. Microsoft quickly caved to industry pressure and pledged to make access to advanced logging free, but it will take some time before users everywhere install and use this update.

"Unfortunately, there is a lack of standardized practices when it comes to application-specific logging. Therefore, in most cases, application owners do not have detailed logs containing the raw access token or its signing key[…]As a result, identifying and investigating such events can prove exceedingly challenging for app owners," wrote Tamari.

While the stakes are still quite high, Yossi Rachman, director of security research for AD security company Semperis noted that the “main concern here is understanding how exactly threat actors were able to get their hands on the compromised Azure AD key, as these types of breaches have the potential of quickly turning into a SolarWinds-scale event."

Impact on Azure AD Customers

Wiz further noted that despite the fact that the key has been recovered, several Azure AD customers could still be at high risk, given that Storm-0558 could potentially have used its access to establish a persistent position through application-specific keys, or setting up backdoors. 

Moreover, applications that might have kept copies of the Azure AD public keys before they were revived, and applications that depend on local certificate stores or cached keys that may not have been updated remain vulnerable to token forging.

"It is imperative for these applications to immediately refresh the list of trusted certificates," Tamari urged. "Microsoft advises refreshing the cache of local stores and certificates at least once a day."

In another post, Wiz mentioned details as to which Azure AD configurations would be vulnerable to attack, and advised organizations to update their application caches and Azure SDKs to the latest versions. 

Tamari further notes, "The full impact of this incident is much larger than we initially understood it to be[…]We believe this event will have long-lasting implications on our trust of the cloud and the core components that support it, above all, the identity layer which is the basic fabric of everything we do in cloud. We must learn from it and improve."