British Student Jailed for Selling Phishing Kits Tied to £100 Million Scam | Cybercrime News

A 21-year-old student has been sentenced to seven years in jail for designing and distributing online kits responsible for £100 million worth of fraud.

Ollie Holman created phishing kits that replicated the websites of governments, banks, and charities, enabling criminals to steal personal information from unsuspecting victims.

In one instance, the kit was used to create a fake donation page for a charity, resulting in the theft of credit card details from individuals attempting to make contributions.

Based in East Court, northwest London, Holman produced and distributed 1,052 phishing kits targeting 69 organizations across 24 countries. He also offered tutorials on how to use the kits and established a network of nearly 700 contacts. The counterfeit websites included in the kits could store sensitive information such as login credentials and banking details.

It is believed that Holman marketed these kits from 2021 to 2023, earning approximately £300,000, with distribution carried out via the encrypted messaging platform Telegram.

Holman, who pursued a degree in electronics and computer engineering at the University of Kent in Canterbury, laundered the proceeds through a cryptocurrency wallet.

The London Police’s specialized card and payment crime unit initiated an investigation following intelligence from WMC Global regarding the sale of fraud kits online.

Holman was arrested in October 2023, with a search of his university accommodation leading to the seizure of his devices. Despite his arrest, he continued to provide support to kit buyers through his Telegram channel, prompting a re-arrest in May 2024.

Detectives found links between Holman’s computer and the creation of the kits, which were distributed throughout Europe; one kit was tied to a scam totaling around 1 million euros (£870,000).

Holman pleaded guilty to seven charges, including producing materials for fraud, aiding a criminal enterprise, and possessing criminal property. He received a seven-year sentence at Southwark Crown Court.

Following the sentencing, DS Ben Hurley remarked that Holman facilitated extensive global fraud. “The financial losses associated with Holman’s actions are in the millions. Despite his substantial profits from selling the software, he failed to comprehend the harm caused to victims,” he stated.

Sarah Jennings, a specialist prosecutor with the Crown Prosecutor’s Office, expressed her hope that the verdict serves as a warning to other fraudsters. “No matter how advanced your methods are, you cannot conceal yourself behind online anonymity or encrypted platforms,” she commented.

The CPS has indicated plans to return Holman to court to recover the illicit profits he earned from his criminal activities.

Source: www.theguardian.com

100,000 UK Taxpayer Accounts Compromised in £47 Million HMRC Phishing Scam

HM’s revenues and customs have experienced a loss of £47 million due to phishing scams that have compromised tens of thousands of tax accounts, a panel of lawmakers has been informed.

On Wednesday, two senior tax officials briefed the Treasury Commission, reporting that 100,000 individuals have been contacted or are being contacted after their accounts were locked as part of an “organized crime” investigation initiated last year.

John Paul Marks, CEO of HMRC, stated that the affected taxpayers will face “no financial loss.”

He explained to the committee: “About 0.2% of the Pay population is being notified, with approximately 100,000 individuals informed that unusual activity has been detected on their Pay accounts.”

Marks clarified that this pertains to individual workers’ payment accounts, not business accounts.

He further elaborated: “This incident involved organized crime phishing for identity data outside of the HMRC system, which unfortunately affects banks and other entities that utilize that data to set up Payer accounts for refunds or accessing existing accounts.”

He informed MPs of investigations into issues from last year that “involve jurisdictions beyond the UK,” which led to “arrests last year.”

Angela McDonald, HMRC’s deputy chief executive and second permanent secretary, added:


“Ultimately, we successfully protected £19 billion that was targeted during last year’s attacks.”

McDonald made it clear that this breach is “not a cyber attack, there has been no hacking, and data has not been extracted.”

She went on to state: “The act of compromising someone’s system to extract data and implement ransomware constitutes a cyber attack. That is not what transpired here.”

HMRC reported that it has secured the details of the affected accounts and has eliminated logins to prevent future unauthorized access.

Incorrect information has been purged from tax records, and authorities are verifying that no other details have been altered.

Affected individuals will receive notifications from HMRC within the next three weeks.

Marks noted that HMRC’s phone line experienced an outage on Wednesday afternoon, but this was “accidental” and would be “up and running” by Thursday.

A spokesperson for HMRC stated: “We have taken steps to safeguard our customers after identifying attempts to access a minimal amount of tax revenues and will collaborate with law enforcement both domestically and internationally to bring the culprits to justice.

“This was not a cyber attack; instead, it involved criminals utilizing personal information from phishing activities or data obtained from other sources to attempt to claim funds from HMRC.”

“We are sending letters to affected customers to assist in securing their accounts and to reassure them that they have not lost any money.”

Last week, UK banks and payment companies were advised to enhance their anti-fraud systems for international transactions due to a rising number of fraudsters targeting individuals abroad.

Recent statistics indicated that international payments account for 11% of the losses attributed to push payment fraud in 2024.

Source: www.theguardian.com

Students Implicated in Cyber Fraud After Police Discover Involvement in Massive Phishing Site

Police have uncovered a disturbing trend among university students, who are resorting to cyber fraud to boost their income. They have managed to infiltrate a large phishing site on the dark web that has defrauded tens of thousands of individuals.

The site, known as LabHost, has been operational since 2021 and serves as a hub for cyber fraud, enabling users to create realistic-looking websites mimicking reputable companies like major banks. It has ensnared 70,000 users globally, including 70,000 individuals in the UK.

Victims unknowingly provided sensitive information, which was then used to siphon money from their accounts. The perpetrators behind the site profited by selling this stolen data on the dark web to other fraudsters.

According to the Metropolitan Police, the primary victims fall within the 25-44 age bracket, with a significant portion of their activities carried out online.

Law enforcement authorities have apprehended one of the alleged masterminds behind the site, along with 36 other suspects detained in the UK and abroad. The arrests were made at various airports in Manchester, Luton, Essex, and London.

British police are facing mounting pressure to demonstrate their effectiveness in combating the rising tide of cyber fraud.

Despite the relatively small impact of dismantling this particular site, the police intend to dismantle additional cyber fraud operations to undermine the confidence of criminals who believe they can act with impunity.

While fraud and cybercrime present considerable challenges for law enforcement agencies, they often compete for resources with other policing priorities, such as safeguarding children and enhancing women’s safety.

LabHost managed to amass significant amounts of sensitive data, including 480,000 debit or credit card numbers and 64,000 PIN numbers, generating over £1 million in membership fees from 2,000 individuals who paid in cryptocurrency.

The company lured users with tutorial videos on committing crimes using the site and on utilizing new consumer products. It promised quick installation of software in five minutes and offered “customer service” in case of any issues.

DI Oliver Richter noted the shift in cyber fraud from requiring technical skills like coding to now being accessible to individuals ranging from late teens to late 20s, many of whom are college students.

He expressed concern that these users may not fully grasp the risks and consequences of their actions, assuming anonymity and ease of operation.

Following the dismantling of the site, 800 users received warnings that the police were aware of their activities.

Detective Inspector Helen Rance, head of the Metropolitan Police’s cybercrime unit, described the LabHost bust as a sophisticated operation targeting those who have commercialized fraudulent activities. She highlighted collaboration with 17 factions globally, both in the public and private sectors.

She emphasized the success of penetrating the service, identifying the perpetrators, and understanding the scale of their illicit operations.

Source: www.theguardian.com