What is Phishing? (Real UK Examples Exposed)

Phishing is one of the most common ways cybercriminals trick people into giving away sensitive information—passwords, bank details, login access, or even full control of business systems.
It’s quick, cheap, and highly effective, which is why the UK sees millions of phishing attempts every year.
This article breaks down what phishing actually is, how it works, and the real UK examples that show how attackers lure victims.
We'll also cover the steps you can take to protect yourself and your business.
What Is Phishing?
Phishing is a cyberattack where criminals impersonate a trusted person or organisation to deceive victims into clicking harmful links, downloading malware, or sharing sensitive information.
The messages usually look legitimate — often copying real branding, tone, and layouts from:
- Banks
- HMRC
- NHS
- Royal Mail
- Government departments
- Online payment platforms
- Work-related accounts like Microsoft 365 or Slack
Attackers rely on urgency, fear, or reward to get quick reactions before the victim thinks.
How Phishing Works (Simple Breakdown)
1. The Setup
The attacker creates a fake email, text, or website that looks real.
2. The Hook
They push a scenario designed to trigger emotion:
- “Your account will be suspended in 24 hours.”
- “A package cannot be delivered.”
- “You are due a tax refund.”
3. The Action
The victim clicks a link, downloads a file, or enters details into a fake page.
4. The Outcome
The attacker now has access to:
- Accounts
- Money
- Sensitive data
- Full business systems (in some cases)
Real UK Phishing Examples (Exposed)
1. Fake Royal Mail Tracking Emails
A common scam where victims receive an email or SMS saying a parcel cannot be delivered unless a small fee is paid.
Once the form is filled, attackers steal card details and sometimes install malware.
Why it works:
It targets busy people who expect frequent deliveries.
2. HMRC “Tax Refund” Phishing Emails
Scammers send official-looking tax notifications offering refunds or warning of overdue payments.
Danger:
HMRC never sends tax refunds via email links.
Victims often lose full access to their bank accounts after entering login details on fake sites.
3. NHS COVID or Appointment Messages
During and after the pandemic, fake vaccination and appointment invitations became widespread.
Tactic:
Attackers used NHS branding and urgency (“Confirm now or your appointment will be cancelled”).
4. Microsoft 365 Login Phishing (Targeting UK Businesses)
Employees receive “Password Expiring” or “Mailbox Storage Full” messages.
Fake login pages capture:
✔ Email credentials
✔ Access to Teams, SharePoint, OneDrive
✔ Entire company communications
This is one of the top entry points for business breaches.
Why Phishing Is So Dangerous
Phishing is effective because:
- It doesn’t require hacking servers
- It bypasses firewalls by targeting people
- It can scale to millions of victims instantly
- It only takes one employee to cause a breach
In the UK, phishing is involved in over 40% of business cybersecurity incidents (National Cyber Security Centre data).
How to Spot Phishing (Checklist)
- Unfamiliar sender or strange email address
- Urgency (“act now”, “24 hours left”)
- Generic greetings (“Dear Customer”)
- Misspellings or odd tone
- Links that redirect to strange domains
- Attachments you were not expecting
When in doubt — don’t click.
How to Protect Yourself and Your Business
1. Train staff regularly
Most phishing attacks succeed because employees aren’t aware of common tactics.
2. Use multi-factor authentication (MFA)
Even if criminals steal a password, MFA stops them from logging in.
3. Enable email filtering and domain protection
SPF, DKIM, and DMARC reduce spoofing.
4. Run regular external security scans
This helps uncover exposed login portals, outdated systems, and weak points attackers use in phishing campaigns.
5. Stay informed with real threat examples
The NCSC and Action Fraud regularly publish updated threats and scams.
How FYND Helps Reduce Phishing Risk
While FYND can’t stop every phishing attempt, it helps eliminate the weaknesses attackers rely on:
- Detects exposed login panels targeted in credential phishing
- Flags outdated services attackers use for further exploitation
- Identifies weak security headers
- Shows you what hackers see before they try to impersonate you
- Alerts you when new risks appear
FYND gives small businesses simple, actionable clarity — without technical jargon.
Frequently Asked Questions
Is phishing illegal in the UK?
Yes — phishing is prosecuted under the Computer Misuse Act.
What should I do if I clicked a phishing link?
Change passwords immediately, enable MFA, and inform your IT or security team.
Where can I report phishing in the UK?
Forward suspicious emails to [email protected] (NCSC).
