A sophisticated phishing campaign is targeting UK organizations that sponsor migrant workers and students, leveraging authentic Home Office branding to compromise credentials within the government’s Sponsorship Management System (SMS).
The SMS is a critical platform for employers sponsoring visas in the Worker and Temporary Worker categories, as well as for institutions sponsoring visas in the Student and Child categories. Its primary functions include managing the creation and assignment of sponsorship certificates for prospective employees or students and reporting changes in circumstances for sponsored immigrants. The attackers’ objective is to gain unauthorized access to this system for various illicit financial gains.
According to Samantha Clarke, Hiwot Mendahun, and Ankit Gupta of Mimecast, the campaign employs fraudulent emails that meticulously impersonate official Home Office communications. These emails are typically sent to general organizational email addresses, conveying urgent warnings about compliance issues or account suspension. The messages contain malicious links that redirect recipients to highly convincing fake SMS login pages designed to harvest User IDs and passwords.
Mimecast’s technical analysis reveals the attackers’ advanced methods, including the use of captcha-gated URLs as an initial filtering mechanism. This is followed by redirection to attacker-controlled phishing pages that are direct clones of the genuine SMS login portal. These cloned pages incorporate pilfered HTML, links to official UK government assets, and minimal yet critical alterations to the form submission process. The Mimecast team noted, “The threat actors demonstrate advanced understanding of government communication patterns and user expectations within the UK immigration system.”
The goals of this phishing attack appear to be twofold, targeting both organizations that legitimately sponsor immigrants to the UK and the immigrants themselves. Once the attackers compromise SMS credentials, they pursue multiple monetization objectives. A primary objective is the sale of access to compromised accounts on dark web forums to facilitate the issuance of fake Certificates of Sponsorship (CoS). They also aim to conduct extortion attacks directly on the compromised organizations.
A more insidious and potentially lucrative avenue of exploitation involves the creation of fake job offers and visa sponsorship schemes. Computer Weekly understands that some downstream victims, individuals seeking to move to the UK, have been defrauded of significant sums, with reports indicating losses of up to £20,000 for seemingly legitimate visas and job offers that never materialized.
In response to this campaign, Mimecast has already implemented comprehensive detection capabilities within its email security platform to identify and block associated incoming emails. The company continues to monitor for any new developments related to these threats.
For organizations utilizing the SMS service, Mimecast recommends several crucial steps to enhance their security posture:
Deploy email security capabilities: Implement solutions that can detect government impersonation and suspicious URL patterns. This includes URL rewriting and sandboxing to analyze links before user interaction.
Enforce multifactor authentication (MFA): Establish and enforce MFA for SMS access. Organizations should also rotate these credentials frequently and monitor SMS accounts for unusual access patterns or login locations.
Provide comprehensive training: Educate staff with SMS access on genuine Home Office communications and official email domains. Emphasize the importance of verifying urgent notifications before taking action. This should be coupled with general phishing-awareness training and simulations.
Implement verification procedures: Set up robust verification procedures for all SMS-related communications. Incorporate SMS compromise into existing incident response protocols and, where possible, segregate SMS duties to prevent single-point-of-failure scenarios.




