We have had many reports of people who have received phishing emails.
These are emails with attachments that appear to come from Land Registry saying that we will take money from the recipient’s account. People who have received the emails have understandably been worried and confused, especially as many of them are not Land Registry customers.
These emails are designed to look like the standard direct debit email that we send to customers who have a business account with us. However, the main difference is that the bogus emails have a .zip attachment.
Our genuine emails never contain .zip attachments. The .zip attachment in the scam emails contains a computer virus which has software that can steal sensitive data stored on the infected computer when it is opened.
Also, we never ask for personal information or payment information by email.
If you receive a bogus email, we recommend that you take the following steps.
- Delete the email without opening it.
- If you have already opened the email or the attachment, run your anti-virus software if you are on your personal computer.
- If you receive the email at work, tell your IT administrator.
If you are unsure whether an email you receive from us is genuine, please do not:
- follow any links or open any attachments
- disclose any personal details
- respond to it.
Please forward it to us at email@example.com then delete it. You will not receive a response, but we will examine your email.
Unfortunately, it is very difficult to say where the scam emails come from. Our investigations show that these scams target a wide range of email addresses. Only some of them belong to Land Registry customers. We have checked our systems and we are confident that our security or data has not been compromised. The scammers have got the contact details of the people who received these emails in some other way.
Whenever we become aware of such incidents we direct people to the advice on our website through our social media channels. We report the incidents to GovCertUK, the central response team for government IT security incidents, and will continue to monitor and change our advice should we need to.
Sorry for any worry or inconvenience this may have caused you.
This blog post has been updated on 14 May 2015.