Author: Olly

  • Another Uk Car Tax SCAM! DVLA – Tax Update Required By…

    It was only a few weeks ago when I blogged about a car tax scam a friend sent me, when this morning a different friend sent me a different DVLA Car Tax Scam!

    Car Tax SCAM email!

From: DVLA Information Service <noreply-domain##@mail.sezarpizza.com>
Subject: Important Reminder: Tax Update Required by 23 December
Date: 22 December 2025 at 13:25:05 GMT
To: user@email.com

GOV.UK Logo
Driver & Vehicle Licensing Agency Logo
D6292dc8326e9446800448a052303b688r36b2704f70 Va236ae8401edf5508e784h5098432942i122472e318c27815e7977l227f832d86e2816163110 O343a5d9606wf407353145n436b222685e170a8dc556re8c13f7549,344e3c2455

We inform you that your vehicle tax will expire on Tuesday, December 23, 2025.

To ensure your vehicle remains compliant with UK road regulations, we recommend that you renew your vehicle before the due date to avoid late fees.

Uad385f1739pb7faf1671ad50c08702a4a3b23cb4199t15f176ea50e cb716d2270N9477053f20o426c44f74ew5f1d9b1d69

Thank you for keeping your vehicle tax up to date and for helping us maintain safe and legal roads across the UK.

    Red flags;

    Email is obviously not right

    If you hover over the button it goes here: hXXps://taxreminderservicewebbapps.urbanconcepto.com/?alwasyw – doesnt look very government-y does it!

    Its also not addressed to my friend – “Dear Vehicle Owner”

    Etc….

    The button takes you to a fake website, interestingly after I had visited the website once, it would not let me view it again. I did try clearing cache and changing IP and it still didnt work, but then i switched to my phone and it worked again. They had screenshot blocking technology on the website so I had to take photos of it on a different phone. This made me feel about 78 years old but I didnt have time to get it working on my laptop again so I could take proper screenshots haha.

    Same as usual though, fake website on a hacked domain, once you fill those details out it will send them to someone and then boom, you are short a few ££ in your bank account.

    Take your time and read things, look out for red flags and if you are unsure – give me a shout 🙂

  • Trustwallet Systems SCAM – Inactivity Alert: Wallet at Risk of Removal Fake Email

    Things seem to be coming at me thick and fast at the moment. A customer of mine recently signed up to use my agency as their cbd payment gateway partner, we have been integrating it for a while now and we were about to go live when he got this Trustwallet Systems SCAM email;

    The Trustwallet Systems SCAM Fake Email

    From: Trust Wallet <system@twt.io>
Sent: 16 November 2025 22:53
To: info@website.com
Subject: Inactivity Alert: Wallet at Risk of Removal

 



 

Trustwallet Systems

Hello,

As part of our periodic account maintenance, we are confirming the current status of wallets connected to the Trustwallet platform.

Our system indicates that one of your registered wallets has not shown recent activity. To keep it associated with your profile, you can confirm that it is still in use.

Confirm Wallet Status

If the wallet is no longer active, no action is required and it may be removed from our system during the next update.

Thank you.
Trustwallet Operations

This notification relates to your Trustwallet account settings.
You can update your email preferences or unsubscribe.

    Now most of you reading this may not have heard of a payment company called Trustwallet Systems – but the supplier I work with literally has the word Trust in their name. The similarities between the wording used here and the wording used by my supplier is spooky. Trustwallet systems seems to be actually crypto related, but the similarities between their name and the name of my payment partner are scary.

    So what is this Trustwallet Systems SCAM?

    I’m afraid this time I wasnt able to find out. All the warnings (Nord, Chrome, etc) suggested that it was Malware related – which would mean visiting the links would result in your PC being infected. And then you would probably get popups about how your device was infected and you had to pay some fake support company in Amazon gift cards to “fix it” for you.

    The link at the end of the trail was already dead, so well done whoever reported them 🙂

    This was spooky, well timed, and could have fooled my client – but thankfully my clients are switched on and always double check things like this with me first.

    Stay eSafe peeps.

  • Another Mailgun Scam – Payment Declined

    I actually use Mailgun, its fantastic – so when I first saw the email subject land in my inbox, I was initially alarmed as I dont want a missed payment to affect the deliverability of website emails etc.

    The Mailgun Scam Email

    ​Payment Declined "ID: 0637824646"
'MailGun' via info <info@website.co.uk>	5 November 2025 at 16:46
Reply-To: MailGun <info@wasteconnections.com>
To: info@website.uk
Your payment to Mailgun was unsuccessful.
Mailgun
Your payment to Mailgun was unsuccessful.
Hello info@website.uk,

We're writing to let you know that your payment is unsuccessful and your account is marked for removal.

Fix Now
Mailgun



©2025 Sinch. All rights reserved.  Terms of use  |  Privacy policy  |  Sending policy

    Google did flag the email as suspicious to be fair, but if this had come into a mail client like outlook or thunderbird it may not have been flagged and could have tricked someone.

    Mailgun Scam: The Red Flags

    OK, so as always we look for the red flags so we can all get better at spotting the scams.

    Sender email: This seemed to come from a domain I own, which isn’t unusual.

    Reply-to email: info@wasteconnections.com

    Pretty sure that isnt an official mailgun email account!

    The button: Linked to a huge sendgrid URL so wouldn’t have really been alarming as that’s not unusual. Sendgrid is an email marketing service. I have informed Sendgrid.

    Digging Deeper into the Mailgun Scam

    **NEVER PRESS BUTTONS OR LINKS IN DODGY EMAILS**

    So, I pressed the button (lol) and it took me to some page that looked like it was processing something, and then boom, the Mailgun login window appeared;

    Mailgun Scam

    This was hosted on Microsoft Azure, so I reported the website to the relevant department at MS.

    If I had been tricked up to this point, I think I’d have been a bit alarmed at the fact they pre-filled my email I know Mailgun dont do this as I log into it most days.

    None of the buttons apart from “Continue” seemed to do anything – seems to be a trend at the moment.

    I added a fake password and pressed next, it asked me to confirm my password – this is NOT how the Mailgun website works. I confirmed my fake password, they then asked me for a 2FA which I also faked.

    It seemed to hang at this point, I dont know if it was trying to log into my Mailgun account in the background or something.

    I checked in the background and it is pulling a file from here;

    hXXps://sourcebigwhale.cfd/10302025/sinch-connect/gobe.php

    That must be the most sketchy looking domain name extension I have ever seen in my life haha. I have reported this domain as well.

    The Mailgun Scam: Conclusion

    This seems to be a classic “Credential and MFA phishing” scam, focusing on Mailgun for some reason. Perhaps as then once they are in they can send 30,000 spam emails or something.

    Remember to check for red flags when getting an email or message that raises alarm bells, and if in doubt send it to me 🙂

    Stay eSafe peeps!

    Credential and MFA phishing Scam FAQs

    Why do scammers create fake login pages that look like services like Mailgun or Sinch?

    Because they know those are “backend” services that not many people outside digital teams understand. They rely on the fact that inboxes, tech teams, and marketing people will see the branding and think it’s legit. Once they have your login details, they can get into your email sending service and use it to send out further phishing emails that look totally legitimate (which then spreads the attack).

    Why do these fake pages ask for passwords and then a 2FA code as well?

    If they only took a password, the victim could still be protected by 2FA. Scammers now know this, so they make the fake form walk you through entering a 2FA token which they immediately use in real time to log into the real service as you. So they capture both your password and your temporary code.

    How can I spot these scams before I click on anything?

    Always check the actual domain name before typing in any credentials. If the domain is weird, cheap, or doesn’t match the official brand (for example something like “sourcebigwhale.cfd” instead of “mailgun.com”) then it’s almost certainly malicious. Legit login pages will always be on official domains, never random ones. Also, if a link comes out of the blue, treat it as untrusted until you verify it.

    Mailgun Scam

    We blogged about another MailGun Scam here.

    Update 11/11/25: Just had word from NameSilo that they have suspended the dodgy domain, putting a stop to this scam;

    Success!