
A targeted phishing campaign identified by cybersecurity company, Mimecast, is actively impersonating the UK Home Office and UK Visas & Immigration (UKVI) to deceive sponsor license holders into revealing their Sponsorship Management System (SMS) login credentials. This scam directly threatens the integrity of employer-sponsored visa operations and could lead to identity theft, compliance breaches, and serious financial exploitation.
How does the UKVI scam work?
The fraudulent emails appear highly credible and warn recipients—often via generic or publicly listed email addresses—of alleged compliance issues or urgent account notifications. These emails include links to phishing websites that mirror the authentic Home Office SMS login page. The attackers use captcha-gated URLs to bypass basic security filters and then harvest usernames and passwords using a cloned form submission process.
Why it matters.
If access to a sponsor licence account is compromised, attackers can misuse the account to:
- Issue fraudulent Certificates of Sponsorship (CoS)
- Create fake job offers to support immigration fraud
- Sell access to compromised accounts on the dark web
- Extort companies using stolen credentials
Mimecast notes that victims are being charged up to £20,000 for fake visa opportunities, using sponsor licence credentials that appear legitimate on the surface.
What are the likely indicators of a scam?
Employers should be cautious of emails containing subject lines such as:
- “A new message has been posted to your Sponsorship Management System”
- “SMS System Notification – Action Required”
- “You Have a New SMS Account Notification”
Malicious URLs often spoof government domains, appearing similar to official Home Office links but redirecting to attacker-controlled servers.
Recommendations for employers
Strengthen SMS access security.
- Enable multi-factor authentication (MFA) for all users accessing the SMS portal.
- Rotate credentials regularly and restrict access based on role.
- Monitor login activity for unusual access patterns.
Enhance email filtering and threat detection.
- Work with your IT teams or providers to implement advanced threat protection, including sandboxing and real-time URL analysis.
- Consider solutions that can flag spoofed government domains and implement email handling protocols to verify sender authenticity.
Educate your team.
- Train relevant staff to identify phishing attempts, especially those involved in immigration compliance or HR.
- Reinforce the message that official Home Office communications will never ask for login credentials or contain suspicious links.
Validate all SMS communications.
- Encourage a policy of verifying any SMS-related email directly via the official Home Office portal or through Newland Chase.
- Avoid clicking on links in unsolicited messages claiming to be from UKVI.
Prepare an incident response plan.
- Establish a defined escalation path if compromise is suspected.
- Immediately change passwords and notify the Home Office of any suspicious activity.
- Document and retain any suspicious communications for forensic review.
A trusted partner in compliance.
At Newland Chase, we understand the critical nature of immigration compliance for UK employers. As the landscape evolves with new digital threats, our clients rely on us not only for strategic immigration advice but also for proactive risk awareness.
Mimecast’s detailed report on this threat underlines the importance of maintaining rigorous digital hygiene and organizational controls. We strongly encourage all sponsor licence holders to review internal policies and remain vigilant against impersonation campaigns that exploit trust in official government channels.
For additional guidance on safeguarding your SMS account or reviewing your sponsorship compliance protocols, please contact your Newland Chase representative.
This news alert is for informational purposes only and does not constitute legal advice. For case-specific guidance or further information, please contact Newland Chase directly.