Attack spotlight

UK Home Office visa & immigration scam targets Sponsor Management System accounts

October 8, 2025

UK Home Office visa & immigration scam targets Sponsor Management System accounts

Credential phishing scam targeting UK Visas and Immigration sponsors

Ready to see Sublime 
in action
Get a demo
Authors
Bryan Campbell
Bryan Campbell
Detection

Sublime’s Attack Spotlight series is designed to keep you informed of the email threat landscape by showing you real, in-the-wild attack samples, describing adversary tactics and techniques, and explaining how they’re detected. These attacks can be prevented with a free Sublime account.

EMAIL PROVIDER: Google Workspace

ATTACK TYPE: Credential Phishing

We have recently detected a large influx of credential phishing attacks targeting visa sponsors in the UK. These attacks start with emails that impersonate the UK Visas and Immigration (UKVI) department of the UK Home Office. The messages direct the target to fake Sponsor Management System (SMS) login pages that are used for credential phishing.

It is unclear who the attackers are or what their specific goal is, but based on the amount of messages detected by Sublime, it can be safe to assume that this is an organized effort. In this post, we’ll look at the attack, how it works, and possible goals of the attackers.

The message

While the attack email has many variants, they all share the goal of getting the target to log in to their SMS account. Each message conveys a sense of urgency, often asking the target to review a notification, an approaching expiration, or an upcoming security review.

Within the messages, there are typically references to needing either Level 1 or Level 2 SMS accounts. In some cases, the message directs the recipients to forward the message to a Level 1 or Level 2 SMS account holder if the message reached them incorrectly. Incidentally, many of these messages were sent to targets without those accounts.

Additionally, the payload URL is obfuscated behind a button or an official-looking link. These evasions can be seen in the below examples, including the hover text to the payload URL:

Fake message notification
Fake expiration notice with payload hosted on Vercel

The payload

After clicking on the link, the target is taken to a credential phishing page that is an imitation of the UK Home Office SMS login page. The official page is hosted on points.homeoffice.gov[.]uk, and many of the attack pages reference that address within their page URL or path.

In some cases, the target is first taken through a challenge page before reaching the phishing page:

Challenge page
SMS credential phishing page

Looking at the source code of this page, we can see that the login portion is actually a form that submits the credentials to a sms.php processing script.


form id="j_idt224:smsNavigation" name="j_idt224:smsNavigation" method="post" action="sms.php" enctype="application/x-www-form-urlencoded"

Payload domains

The phishing page has been observed across a wide variety of domains. Some of these attacks are hosted on compromised domains (instead of attacker-owned or free). This tactic is used to evade security scanning that looks at domain trustworthiness (in some cases, compromised .org domains). By only adding one page to the compromised site and then not returning, an attacker could considerably decrease chances of detection.

Thoughts on outcomes and motivation

This activity targets highly sensitive, identity-linked systems and poses significant risk to individuals, organizations, and possibly even national security:

Individual harms

  • Identity theft: Immigration records contain sensitive, personal information, passports, addresses, biometrics, and legal status details that can be used for impersonation and fraud or the potential to extort those who do not understand the immigration system well enough.
  • Disruption of status: Fraudulent submissions might contribute to delays or even block legitimate applications, risking victims’ ability to live, work, and access services based on the samples.
  • Exploitation: Vulnerable immigrant communities may be extorted or pressured using compromised accounts or fabricated documents based on their lack of native speaking or understanding of complicated legal systems.

Organizational/National harms

  • System integrity: Successful access undermines trust in UKVI systems and could facilitate illegal movement or employment.
  • National security: Unauthorized visas or accounts may be used by organized crime or hostile actors.
  • Public trust and political fallout: Exploitation of immigration systems could erode confidence in government processes.

At present, Sublime’s Threat Research team does not attribute this activity to a known adversary. It is difficult to determine the exact motivation of these attacks without more information about the adversaries. A possible motivation is opportunistic financial gain, in which the attacker exploits the complexity and opacity of immigration systems in order to sell stolen identities/visas or extort their victims.

Detection signals

Sublime's AI-powered detection engine prevents these attacks. Some top signals for these attacks are:

  • Brand impersonation: Messages impersonate the UK Home Office while being sent from non-government email addresses and linking to non-government domains.
  • Deceptive URL structure: Links contain homeoffice.gov[.]uk within the URL to imitate legitimacy.
  • Deceptive link display text: Display text for some links contain URLs that do not match the destination URL.
  • Vercel abuse: Some payloads make use of Vercel app hosting.
  • Urgency: Messages contain urgent language (ex: deadlines, expiration warnings, etc.) to drive engagement.
  • Niche expertise: Messages target a business process (visa sponsorship) that many organizations may not be deeply familiar with, exploiting confusion.

ASA, Sublime’s Autonomous Security Analyst, flagged this attack as malicious. Here is ASA’s analysis summary for one of the messages:

Pivot smoothly with attack variation

The quantity and variety of these attacks make it clear that adversaries will continue iterating on their assault. That’s why the most effective email security platforms are adaptive, using AI and machine learning to shine a spotlight on seemingly minor discrepancies.

If you enjoyed this Attack Spotlight, be sure to check our blog every week for new blogs, subscribe to our RSS feed, or sign up for our monthly newsletter. Our newsletter covers the latest blogs, detections, product updates, and more.

Read more Attack Spotlights:

Heading

About the authors

Bryan Campbell
Bryan Campbell
Detection

Bryan is a Detection Engineer at Sublime. Prior to Sublime, he's worked as an Intelligence Analyst for CrowdStrike and as a Threat Researcher at Proofpoint, researching ransomware activity and eCrime adversaries.

Get the latest

Sublime releases, detections, blogs, events, and more directly to your inbox.

check
Thank you!

Thank you for reaching out.  A team member will get back to you shortly.

Oops! Something went wrong while submitting the form.

Related Articles

December 29, 2025
5 email security trends from 2025
Sublime news

5 email security trends from 2025

Brian BaskinPerson
Brian Baskin
Threat Research
Person
December 18, 2025
How to build fast similarity search for email from the ground up
Sublime news

How to build fast similarity search for email from the ground up

Ross WolfPerson
Ross Wolf
Engineering
Person
December 16, 2025
Evolving our brand as Sublime grows
Sublime news

Evolving our brand as Sublime grows

Omar JalalzadaPerson
Omar Jalalzada
Head of Design
Kirk JohnsonPerson
Kirk Johnson
Creative Director

Frequently asked questions

What is email security?
Email security refers to protective measures that prevent unauthorized access to email accounts and protect against threats like phishing, malware, and data breaches. Modern email security like Sublime use AI-powered technology to detect and block sophisticated attacks while providing visibility and control over your email environment.

Now is the time.

See how Sublime delivers autonomous protection by default, with control on demand.

BG Pattern