back to article HMRC: Crooks broke into 100k accounts, stole £43M from British taxpayer in late 2024

The UK's tax collections agency says cyberbaddies defrauded it of £47 million ($63 million) late last year, but insists the criminal case was not a cyberattack. Representatives for His Majesty's Revenue and Customs (HMRC) disclosed the theft, which occurred in late 2024, to Parliament's Treasury Select Committee for the first …

  1. Headley_Grange Silver badge

    It wasn't too long ago that the only way to change your password for your HMRC website was to submit a request and then wait up to ten days for a letter in the post with a code to let you change it.

    1. Yet Another Anonymous coward Silver badge

      Frankly that sounds sort of optimal - assuming your old passwd is locked as soon as they get the address.

      It's presumably a lot harder for hoodie wearing North Korean cyber-ninjas to intercept millions of brown envelopes

  2. Flak
    Flame

    No financial loss?

    '[...] The tax collector's assurance they have not suffered any financial loss as a result of the fraud case' is somewhat misleading.

    Every tax payer has suffered financial loss!

    BTW I would like to understand how MFA was circumvented - and what has been done to ensure that cannot happen again.

    1. Victor Ludorum

      Re: No financial loss?

      It's a little unclear, but from the general gist of the article it would appear that MFA wasn't bypassed, it wasn't set up in the first place because the 'victims' HMRC accounts were set up automatically as part of the PAYE process, but never activated by the end user because they didn't need to or know how to...

      1. Dr Who

        Re: No financial loss?

        That can't be right if this was indeed a credential stuffing attack (and cyberattack it was, whatever HMRC may claim) which depends on a user setting the same password on at least two different systems - so the accounts must have been activated by the users.

        1. nobody who matters Silver badge

          Re: No financial loss?

          The HMRC account will have been activated by using personal details obtained illicitly from other sources - things such as address, date of birth, employment details and NI number associated with that name among other things, which the HMRC system will tally with the personal information they already hold for an individual.

          Having successfully provided all the correct information for the individual they were trying to impersonate, the criminal would then be able to set up a password and direct MFA to their own device, so no need to find a way of bypassing MFA.

          Clearly the initial checks to verify the identity of the person trying to activate an account were woefully insufficient. I would like to think this has now been sufficiently tightened up, but......

          1. elsergiovolador Silver badge

            Re: No financial loss?

            Junior Dev> Just checking - if someone has NI number, DOB, postcode... they could activate someone else’s account?

            PM> Only if it all matches. That’s how ID works.

            Security Lead> It’s the same info they’d give on the phone, so it’s consistent.

            Junior Dev> Right… but if that info leaks

            PM> That would be a them problem, not a us problem.

            Product Owner> Most users won’t even know they have an account. We’re just offering access, not forcing it.

            UX Designer> If we make it harder, people won’t complete setup. We’ll get hammered in the usability report.

            Junior Dev> Okay. Just wondered if we'd looked at a second step - like, checking if the real person is already registered or...

            PM> It’s already signed off. Let’s not go there.

            Security Lead> We’ll monitor account activity. If anything weird happens, we’ll catch it.

            Junior Dev> Got it. Cool.

            * pause *

            PM> Any more questions?... Great. Let’s move on - next item’s the banner text for the welcome screen.

            1. Fruit and Nutcase Silver badge
              Mushroom

              Re: No financial loss?

              Probably would spend more time discussing the banner and welcome screen design/colours/emoji etc than on above discussion

            2. Yet Another Anonymous coward Silver badge

              Re: No financial loss?

              Major retailer here got hacked

              They created a free credit-check account for every victim and posted that the default passwd was the last 4 digits of the credit card number that had been stolen.........

            3. ecofeco Silver badge

              Re: No financial loss?

              Every damn word, fact. I was on those conference calls with you.

          2. Dan 55 Silver badge

            Re: No financial loss?

            Setting up an account supposedly requires an upload of a scan of photo ID (passport, driving licence) so that's a whole load of photo IDs that's got stolen.

            1. Anonymous Coward
              Anonymous Coward

              Re: No financial loss?

              Or write a program that will create a scan-like image containing the right information, at the right locations, with a photo that makes reasonable sense given the person's name (so no "Jane" with a full beard, or a pasty-white "Dikembe"). Likely the photo won't be compared to anything.

        2. Sp1z

          Re: No financial loss?

          Maybe it was sifficient for the crooks to have enough personal information to do an initial forgotten password (or however else you would initially log on to an HMRC account) and then of course they would be prompted to set up the 2FA because the system thinks it's them.

          That's my guess anyway. MFA was "on" but wasn't set up and the crooks set it up, so effectively useless.

          1. nobody who matters Silver badge

            Re: No financial loss?

            My understanding that the access was through accounts for people who had never activated them; therefore there would be no prior password to forget. I think it appears to be a much more simple case of the criminals activating accounts for the first time by impersonating people whose personal identity and financial/workplace information they had obtained from elsewhere (the article infers phishing, which still seems to be a thing, despite repeated warning to the population at large about being very wary of entering such information on web pages that may be bogus - seems you can't educate pork!).

  3. lglethal Silver badge
    Trollface

    "The UK's tax collections agency says cyberbaddies defrauded it of £47 million ($63 million) late last year, but insists the criminal case was not a cyberattack."

    For a moment there I thought HMRC was being honest about Politicians salaries, and how much they are costing us...

    Although referring to Politicans as Cyberbaddies might be giving them too much credit. They're just regular baddies after all... And saying they defrauded the country, well... I mean there are some politicians it would be easy to claim were defrauding the country simply by breathing in the air which could be better used for well anything else...

    1. Anonymous Coward
      Anonymous Coward

      I initially read that as "cyberdaddies", but subsequently realise that those internal conversations should also happen in private.

  4. Acrimonius

    Verfying true callers

    When you call HMRC you are asked your NI number, name/username, address/post code, DOB, email address and contact cell/phone. Did they not know all of this and more can be stolen so they should never take any kind of instructions via a call, if indeed this was happening. Also, given that credentials can be easily stolen they should also not accept any log-in without MFA. All old hat now. They say they continuously enhance security measures to tackle evolving fraud tactics. They appear to be lagging a few evolutions.

    So how much of the 47M was recovered?

    1. nobody who matters Silver badge

      Re: Verfying true callers

      <.......".... they should also not accept any log-in without MFA"......>

      These were previously non-activated accounts - it appears that the criminals were able to provide sufficient identity information to be able to activate them, therefore any MFA would also be set up for the first time by the criminals and therefore directed to the criminal's device.

      It seems therefore that it is the initial identity verification where there is a problem (as you infer - not being thorough enough in the range of identity information they ask for), not with any MFA once the account has been activated.

  5. elsergiovolador Silver badge

    Piñata

    Every digital failure like this becomes a funding event. "We’ll invest more in IT security" means more contracts for the usual consultancy suspects.

    There’s no sign of sackings, no clawbacks, no contract penalties. Just soft language, delayed disclosure, and a promise to spend more. Failure has no cost - it generates revenue.

    At this rate, HMRC isn’t a tax authority, it’s a money piñata. The more it gets hit, the more cash spills out - not to the public, but to the firms circling overhead with ready-made PowerPoints and day rates.

    The incentive isn’t to fix anything - it’s to manage the optics until the next breach justifies the next round of funding.

  6. ChrisElvidge Silver badge

    Cyber attack

    If it wasn't a "cyber attack", what was it? Isn't phishing a cyberattack?

    1. Anonymous Coward
      Anonymous Coward

      Re: Cyber attack

      Yes - but the phishing wasn't done against or through HMRC, so it wasn't, properly speaking, a cyberattack against HMRC.

      1. Ferry Michael

        Re: Cyber attack

        If the money was taken from HMRC, that means that HMRC were the subject of the attack.

        We're HMRC systems trusting 3rd party systems that should not have been trusted?

  7. Pascal Monett Silver badge

    "This was not a cyberattack"

    No, it was just our normal incompetence and lack of oversight, plus some outsiders being more intelligent about our systems than we are.

    Everything is fine, move along, citizen. Move along.

  8. cb7

    I wonder when they're going to go after the big US tech firms that make £billions here yet pay a pittance in UK corporation tax?

    That's £2Bn of lost tax revenue a year. And that was the figure for 2021.

    https://www.taxwatchuk.org/seven-large-tech-groups-estimated-to-have-dodged-2bn-in-uk-tax-in-2021/

    1. tonkei

      No they won't, because they're afraid of "tariffs" that the man in the orange mask will apply.

  9. wolfetone Silver badge

    Well I mean it makes a change from the usual "We take customer security very seriously" and "This was a sophisticated attack".

  10. Acrimonius

    How was it detected?

    How was this detected? Just stumbled upon? Maybe when someone decided to quey a discrepancy of 47M that could not be dismissed as just a minor accounting error. How many more are then lurking just under their noses!

    1. David Hicklin Silver badge

      Re: How was it detected?

      At a guess someone tried to activate their account for the first time and already found it running to a Russian** phone and email address..

      ** substitute with your favourite sophisticated hacking emporium

  11. Condor25

    absolutely reeks

    what's that smell... smells like breach...

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like