www.trustwave.com
Open in
urlscan Pro
52.151.96.240
Public Scan
URL:
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/microsoft-encrypted-restricted-permission-messages-deliver...
Submission: On May 26 via api from TR — Scanned from GB
Submission: On May 26 via api from TR — Scanned from GB
Form analysis
8 forms found in the DOMGET /en-us/search/
<form oninput="autoSuggest(q.value)" method="get" target="_self" action="/en-us/search/" _lpchecked="1" data-hs-cf-bound="true">
<div class=" site-header-search-mobile" id="search-box">
<i class="fe fe-search text-darkest"></i>
<input id="search" value="" type="text" class="form-control" name="q" placeholder="Search trustwave.com" autocomplete="off">
<div id="search-bar">
<ul class="ul-list list-unstyled result-list" id="suggestresults"></ul>
</div>
</div>
</form>
GET /en-us/search/
<form method="get" target="_self" action="/en-us/search/" data-hs-cf-bound="true">
<div class="site-header-search-main">
<i class="fe fe-search text-darkest"></i>
<input type="text" class="form-control form-control-lg" id="q" name="q" placeholder="Search trustwave.com">
</div>
</form>
<form id="navdemo-form" class="modal pt-9" style="max-height:90vh; width:90%; margin:auto 0;" data-hs-cf-bound="true">
<script charset="utf-8" type="text/javascript" src="//js.hsforms.net/forms/embed/v2.js"></script>
<script data-hubspot-rendered="true">
hbspt.forms.create({
region: "na1",
portalId: "21158977",
formId: "92358282-9e9e-4fe6-a21f-c30c1e55336d",
sfdcCampaignId: "7016e0000020JvOAAU"
});
</script>
<div id="hbspt-form-0e43e439-7bfb-4a40-8483-d0143603cf12" class="hbspt-form" data-hs-forms-root="true"><iframe id="hs-form-iframe-0" class="hs-form-iframe" title="Form 0" scrolling="no" width="100%"
style="position: static; border: none; display: block; overflow: hidden; width: 100%;"></iframe></div>
</form>
<form id="demo-form" class="modal" data-hs-cf-bound="true">
<script charset="utf-8" type="text/javascript" src="//js.hsforms.net/forms/embed/v2.js"></script>
<script data-hubspot-rendered="true">
hbspt.forms.create({
region: "na1",
portalId: "21158977",
formId: "cfc901a2-eafd-46d4-a988-cdec75f02fd1",
sfdcCampaignId: "7016e0000020JvOAAU"
});
</script>
<div id="hbspt-form-d7578df5-795f-4a5b-a8b4-8eaf95682bd0" class="hbspt-form" data-hs-forms-root="true"><iframe id="hs-form-iframe-1" class="hs-form-iframe" title="Form 1" scrolling="no" width="100%"
style="position: static; border: none; display: block; overflow: hidden; width: 100%;"></iframe></div>
</form>
<form id="demo-form" class="modal pt-9" style="max-height:90vh; width:90%; margin:auto 0" data-hs-cf-bound="true">
<script charset="utf-8" type="text/javascript" src="//js.hsforms.net/forms/embed/v2.js"></script>
<script data-hubspot-rendered="true">
hbspt.forms.create({
region: "na1",
portalId: "21158977",
formId: "cfc901a2-eafd-46d4-a988-cdec75f02fd1",
sfdcCampaignId: "7016e0000020JvOAAU"
});
</script>
<div id="hbspt-form-94f36e25-8155-43a8-a7a7-84817665c47c" class="hbspt-form" data-hs-forms-root="true"><iframe id="hs-form-iframe-2" class="hs-form-iframe" title="Form 2" scrolling="no" width="100%"
style="position: static; border: none; display: block; overflow: hidden; width: 100%;"></iframe></div>
</form>
<form id="partner-form" class="modal pt=9" style="max-height:90vh; width:90%; margin:auto 0" data-hs-cf-bound="true">
<script charset="utf-8" type="text/javascript" src="//js.hsforms.net/forms/embed/v2.js"></script>
<script data-hubspot-rendered="true">
hbspt.forms.create({
region: "na1",
portalId: "21158977",
formId: "de7ea1d6-a749-4248-88db-dc813310bec6",
sfdcCampaignId: "7016e0000020A3BAAU"
});
</script>
<div id="hbspt-form-5bf75ef8-8553-47ff-aabc-d3694d9db985" class="hbspt-form" data-hs-forms-root="true"><iframe id="hs-form-iframe-3" class="hs-form-iframe" title="Form 3" scrolling="no" width="100%"
style="position: static; border: none; display: block; overflow: hidden; width: 100%;"></iframe></div>
</form>
POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/21158977/68741a11-8e56-4f23-ba7f-b2307e77714c
<form id="hsForm_68741a11-8e56-4f23-ba7f-b2307e77714c" method="POST" accept-charset="UTF-8" enctype="multipart/form-data" novalidate=""
action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/21158977/68741a11-8e56-4f23-ba7f-b2307e77714c"
class="hs-form-private hsForm_68741a11-8e56-4f23-ba7f-b2307e77714c hs-form-68741a11-8e56-4f23-ba7f-b2307e77714c hs-form-68741a11-8e56-4f23-ba7f-b2307e77714c_a18b8e92-399c-42ae-94b5-faac9a7adbc1 hs-form stacked"
target="target_iframe_68741a11-8e56-4f23-ba7f-b2307e77714c" data-instance-id="a18b8e92-399c-42ae-94b5-faac9a7adbc1" data-form-id="68741a11-8e56-4f23-ba7f-b2307e77714c" data-portal-id="21158977" data-hs-cf-bound="true">
<div class="hs_email hs-email hs-fieldtype-text field hs-form-field"><label id="label-email-68741a11-8e56-4f23-ba7f-b2307e77714c" class="" placeholder="Enter your " for="email-68741a11-8e56-4f23-ba7f-b2307e77714c"><span></span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input id="email-68741a11-8e56-4f23-ba7f-b2307e77714c" name="email" placeholder="Business Email" type="email" class="hs-input" inputmode="email" autocomplete="email" value=""></div>
</div>
<div class="hs_submit hs-submit">
<div class="hs-field-desc" style="display: none;"></div>
<div class="actions"><input type="submit" class="hs-button primary large" value="SUBSCRIBE"></div>
</div><input name="hs_context" type="hidden"
value="{"embedAtTimestamp":"1685067078125","formDefinitionUpdatedAt":"1674512136291","lang":"en","embedType":"REGULAR","renderRawHtml":"true","userAgent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.5672.126 Safari/537.36","pageTitle":"Microsoft Encrypted Restricted Permission Messages Deliver Phishing | Trustwave","pageUrl":"https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/microsoft-encrypted-restricted-permission-messages-deliver-phishing/","isHubSpotCmsGeneratedPage":false,"hutk":"610439289a4c554afaa7dc822b693969","__hsfp":1944070336,"__hssc":"94548739.1.1685067080811","__hstc":"94548739.610439289a4c554afaa7dc822b693969.1685067080811.1685067080811.1685067080811.1","formTarget":"#hbspt-form-a18b8e92-399c-42ae-94b5-faac9a7adbc1","locale":"en","timestamp":1685067080888,"originalEmbedContext":{"portalId":"21158977","formId":"68741a11-8e56-4f23-ba7f-b2307e77714c","region":"na1","target":"#hbspt-form-a18b8e92-399c-42ae-94b5-faac9a7adbc1","isBuilder":false,"isTestPage":false,"isPreview":false,"isMobileResponsive":true},"correlationId":"a18b8e92-399c-42ae-94b5-faac9a7adbc1","renderedFieldsIds":["email"],"captchaStatus":"NOT_APPLICABLE","emailResubscribeStatus":"NOT_APPLICABLE","isInsideCrossOriginFrame":false,"source":"forms-embed-1.3243","sourceName":"forms-embed","sourceVersion":"1.3243","sourceVersionMajor":"1","sourceVersionMinor":"3243","_debug_allPageIds":{},"_debug_embedLogLines":[{"clientTimestamp":1685067078561,"level":"INFO","message":"Retrieved pageContext values which may be overriden by the embed context: {\"pageTitle\":\"Microsoft Encrypted Restricted Permission Messages Deliver Phishing | Trustwave\",\"pageUrl\":\"https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/microsoft-encrypted-restricted-permission-messages-deliver-phishing/\",\"userAgent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.5672.126 Safari/537.36\",\"isHubSpotCmsGeneratedPage\":false}"},{"clientTimestamp":1685067078563,"level":"INFO","message":"Retrieved countryCode property from normalized embed definition response: \"DE\""},{"clientTimestamp":1685067080875,"level":"INFO","message":"Retrieved analytics values from API response which may be overriden by the embed context: {\"hutk\":\"610439289a4c554afaa7dc822b693969\"}"}]}"><iframe
name="target_iframe_68741a11-8e56-4f23-ba7f-b2307e77714c" style="display: none;"></iframe>
</form>
<form data-hs-cf-bound="true"></form>
Text Content
Trustwave Action Response: Supply Chain Attack Using 3CX PBAX Software. Learn More * Contact Us * Login Login Fusion Platform Login What is the Trustwave Fusion Platform? * MailMarshal Cloud Login * Incident Response Incident Response EXPERIENCING A SECURITY BREACH? Get access to immediate incident response assistance. 24 HOUR HOTLINES * AMERICAS +1 855 438 4305 * EMEA +44 8081687370 * AUSTRALIA +61 1300901211 * SINGAPORE +65 68175019 Recommended Actions * * Services Services * Managed Detection & Response Eradicate cyberthreats with world-class intel and expertise * Managed Security Services Expand your team’s capabilities and strengthen your security posture * Consulting & Professional Services Tap into our global team of tenured cybersecurity specialists * Penetration Testing Subscription- or project-based testing, delivered by global experts * Database Security Get ahead of database risk, protect data and exceed compliance requirements * Email Security & Management Catch email threats others miss with layered security & maximum control * Co-Managed SOC (SIEM) Eliminate alert fatigue, focus your SecOps team, stop threats fast, and reduce cyber risk View All Trustwave Services * Solutions Solutions BY INDUSTRY * Education * Financial Services * Government * Healthcare * Hotels * Legal * Manufacturing * Retail BY REGULATION * Data Privacy * CMMC * FISMA * GDPR * GLBA * HIPAA * ISO * SOX BY TOPIC * Microsoft Exchange Server Attacks Stay protected against emerging threats * Rapidly Secure New Environments Security for rapid response situations * Securing the Cloud Safely navigate and stay protected * Securing the IoT Landscape Test, monitor and secure network objects * Why Trustwave Why Trustwave * The Trustwave Approach A focus on threat detection and response * Awards and Accolades Recognition by analysts and media outlets * Trustwave SpiderLabs Team Researchers, ethical hackers and responders * Trustwave Fusion Platform Unprecedented security visibility and control * SpiderLabs Fusion Center Our cybersecurity command center * Security Operations Centers Distributed worldwide defense nodes * Partners Partners * Technology Alliance Partners Key alliances who align and support our ecosystem of security offerings * Trustwave PartnerOne Program Join forces with Trustwave to protect against the most advance cybersecurity threats * Register Login * Resources Resources BLOGS * Trustwave Blog * SpiderLabs Blog UPCOMING * Webinars * Events MEDIA & ASSETS * Document Library * Video Library * Analyst Reports * Webinar Replays * Case Studies * Trials & Evaluations NOTICES * Security Advisories * Software Updates HELP * Contact * Support * * Request a Demo Loading... BLOGS & STORIES SPIDERLABS BLOG Attracting more than a half-million annual readers, this is the security community's go-to destination for technical breakdowns of the latest threats, critical vulnerability disclosures and cutting-edge research. MICROSOFT ENCRYPTED RESTRICTED PERMISSION MESSAGES DELIVER PHISHING access_timeMay 24, 2023 person_outlinePhil Hay, Rodel Mendrez share * * * Over the past few days, we have seen phishing attacks that use a combination of compromised Microsoft 365 accounts and .rpmsg encrypted emails to deliver the phishing message. At this stage, we are exploring and uncovering different aspects of this campaign and will share here some of our observations to date. THE EMAIL It starts with an email that originated from a compromised Microsoft 365 account, in this case from Talus Pay, a payments processing company. The recipients were users in the billing department of the recipient company. The message shows a Microsoft encrypted message. In the email, the From: and To: email address displayed in the header were the same, but the message was delivered to various third party recipients. Note the email has a .rpmsg attachment, a Microsoft technology which stands for restricted permission message file. Essentially it is an encrypted email message stored as an attachment. As a recipient, you must be authorized to view the message. This check is performed by some form of authentication by the Rights Management service that was used to protect the file. Your Microsoft email and password might be checked or you might apply for a one-time passcode. The permissions can also extend to whether the recipient can forward the original message. Note: After this email was sent, Talus Pay, to its credit, sent out an email to its contacts warning that one of its accounts had been compromised and it was investigating. VIEWING THE MESSAGE In the message body, behind the “Read the message” button there is a long URL that points to office365.com in order to be able to view the message: hxxps://outlook.office365[.]com/Encryption/retrieve.ashx?recipientemailaddress=[redacted]&senderemailaddress=rmcbride%40chambless-math.com&senderorganization=AwGEAAAAAoAAAAADAQAAANPu52tb0WpLrMi8HJFYSWFPVT1jaGFtYmxlc3NtYXRoLm9ubWljcm9zb2Z0LmNvbSxPVT1NaWNyb3NvZnQgRXhjaGFuZ2UgSG9zdGVkIE9yZ2FuaXphdGlvbnMsREM9TkFNUFIxNEEwMDcsREM9UFJPRCxEQz1PVVRMT09LLERDPUNPTRAVEmk%2fx2JNil9Bqbi8411DTj1Db25maWd1cmF0aW9uLENOPWNoYW1ibGVzc21hdGgub25taWNyb3NvZnQuY29tLENOPUNvbmZpZ3VyYXRpb25Vbml0cyxEQz1OQU1QUjE0QTAwNyxEQz1QUk9ELERDPU9VVExPT0ssREM9Q09NAQ%3d%3d&messageid=%3cPH7PR19MB780122DAFF0EDCF5E97BFB26D3799%40PH7PR19MB7801.namprd19.prod.outlook.com%3e&cfmRecipient=SystemMailbox%7bD0E409A0-AF9B-4720-92FE-AAC869B0D201%7d%40chamblessmath.onmicrosoft.com&consumerEncryption=false&senderorgid=5526729b-5da8-4878-b9f5-96944d3c71c6&urldecoded=1&e4e_sdata=gn5PbAvAmx%2bZiHudqA2%2bxzmczqO%2b74dasBg%2bMjGZzpR7h%2fKpCNG%2bB%2bC9oraTIgHVWFBtsn4r%2bwRBMY69GQ3vgLpv%2fZ96qN3U6P8iBXbp21knZRwXiQLSnHrbc33qkrzr4ngC5NH7%2bAqV2oQgqGNOam9MxBsHV%2fb3Eprr6oNm3mGhylJVmqeL6dl0QcPVCqJSWg8EshTztuFtJmG5WwO2%2fLL0OAe39SXVckcPVs1UFH3omi0OodRLlwZZT1VZEW56H6lSChGr7nNRLzGb82nC4CAINeZSv1DvQso%2bwWuuxiCtyRquMRGL2YBfAdgkIqHzKJI0iZMuEhWjl%2b%2buACjVxA%3d%3d Note the sender email address hidden in that link: senderemailaddress=rmcbride@chambless-math.com And the Microsoft 365 organisation domain: chamblessmath.onmicrosoft.com Clicking the link will show this Microsoft Encrypted message page: If you don’t authenticate with your Microsoft account, you can ask for a one-time passcode which Microsoft will email to you to be able to decrypt the message. If you generate a passcode and enter it, you would then be able to view the contents of the message online at Microsoft. The message below has a bogus SharePoint theme. LANDING PAGE AND REDIRECTION If you clicked the “Click here to Continue,” you would be directed to another fake SharePoint document, this time hosted on Adobe’s InDesign service: hxxps://indd.adobe[.]com/view/4c97ff1d-d526-4673-83bf-594684c6885f THE PHISHING SITE If you “Click Here to View Document” on the Adobe document you will be redirected to the final destination, the domain of which resembles the domain of the original sender, Talus Pay. But this domain has a .us TLD and was registered recently on the 16 May 2023. hxxps://taluspay.taluspays[.]us/?1No=o4vOLE If you browsed to this site, you would immediately see a “Loading…Wait” in the title bar. But in the background, JavaScript, using the open source FingerprintJS library, would be executed to fingerprint the user’s browser. Data collected includes: * visitor ID * connect token (hardcoded from the configuration), * connect hash (hardcoded from the configuration), * video card renderer information * system language * device memory * hardware concurrency (# of processor) * browser plugins installed * browser window size, orientation, and screen resolution * OS architecture Finally, you would be presented the final phony Microsoft 365 phishing credential site. OTHER SAMPLES In addition to the message example above, we have seen two other email examples, and are aware of other URLs as well (for example this Joe Sandbox report). No doubt there are others as well. The other email examples were very similar in style but were received from a different compromised Microsoft 365 accounts, they had the following subjects: Farmers and Merchants State Bank 05/18 SCANTRON 05/19 The messages were almost identical in style to the Talus Pay sample. The same email address was used in the link: senderemailaddress=rmcbride@chambless-math.com But they pointed to slightly different Adobe hosting links. Below is the one for Farmers and Merchant’s State Bank, which was still alive at the time of visiting: hxxps://indd.adobe[.]com/view/2eafc949-d4c0-4def-82e0-a5a87c028d8a For the email relating to the Farmers Bank, the final destination was again a domain related to the sender of the email with a .us TLD, this time registered on 18 May 2032. This link was dead at the time of visiting. hxxps://fmsbscotland.fmsbscotland[.]us/?L8N=KAe5 CONCLUSION AND MITIGATION These phishing attacks are challenging to counter. They are low volume, targeted, and use trusted cloud services to send emails and host content (Microsoft and Adobe). The initial emails are sent from compromised Microsoft 365 accounts and appear to be targeted towards recipient addresses where the sender might be familiar. The use of encrypted .rpmsg messages means that the phishing content of the message, including the URL links, are hidden from email scanning gateways. The only URL link in the body of the message points to a Microsoft Encryption service. The only clue that something might be amiss is the URL has a specified senderaddress (chambless-math.com) unrelated to the From: address of the email. The link was likely generated from yet another compromised Microsoft account. In terms of mitigation: * Consider how you handle inbound messages with .rpmsg attachments from outside parties. Depending on how many you expect, or your users’ need to receive them, you may want to consider blocking, flagging or manually inspecting .rpmsg attachments. * Monitor inbound email streams for emails from MicrosoftOffice365@messaging.microsoft.com with the Subject: “Your one-time passcode to view the message”. This may give insight into users who have received .rpmsg messages and have requested a passcode. * Educate your users on the nature of the threat, and not to attempt to decrypt or unlock unexpected messages from outside sources. * To help prevent Microsoft 365 accounts being compromised, enable Multi-Factor Authentication (MFA). For Trustwave MailMarshal customers, you can create a rule for inbound traffic, and recognize the attachment type by the FileType “Restricted-permission message” under “Azure IRM protected documents.” You can also use a Filename extension rule with *.rpmsg. In terms of action, you can choose to quarantine, copy, or stamp the message or subject with a warning. We are continuing to track this campaign and are responding with updated protections as needed. IOCS Sender Address used in links in .rpmsg messages: rmcbride@chambless-math.com Intermediate Landing Pages: hxxps://indd.adobe[.]com/view/4c97ff1d-d526-4673-83bf-594684c6885f hxxps://indd.adobe[.]com/view/2eafc949-d4c0-4def-82e0-a5a87c028d8a Phishing Sites: hxxps://taluspay.taluspays[.]us/?1No=o4vOLE hxxps://fmsbscotland.fmsbscotland[.]us/?L8N=KAe5 Yara rules for Phishing page: rule rpmsg_phish_landing_page { meta: description = "detects JS obfuscation on the intermediate landing page" strings: $str_conn = "connectURL" $str_foll = "followRedirectURL" $str_ckey= "cookieKey" $str_cdmn= "cookieDomain" $str_ctest = "cookietest=1" $string_fpjs = "https://m1.openfpcdn.io/fingerprintjs/" condition: all of them } rule rpmsg_phish_main_page { meta: description = "detects the main phishing page configuration" author = "Trustwave SpiderLabs" strings: $str_htmltag = "<!DOCTYPE html>" $str1 = "dumpLocalCookies" $str2 = "dumpLocalStorage" $str3 = "WebSocketSubject" $str4 = "WebSocketCtor" $str5 = "hookServerURL" $b64_wss = "d3NzOi" $str7 = "https://github.com/zloirock/core-js" condition: all of them } RELATED SPIDERLABS BLOGS ONENOTE SPEAR-PHISHING CAMPAIGN SpiderLabs Blog MALICIOUS MACROS ADAPT TO USE MICROSOFT PUBLISHER TO PUSH EKIPA RAT SpiderLabs Blog META-PHISH: FACEBOOK INFRASTRUCTURE USED IN PHISHING ATTACK CHAIN SpiderLabs Blog STAY INFORMED Sign up to receive the latest security news and trends from Trustwave. * Leadership Team * Our History * News Releases * Media Coverage * Careers * Global Locations * Awards & Accolades * Trials & Evaluations * Contact * Support * Security Advisories * Software Updates * Legal * Terms of Use * Privacy Policy * Copyright © 2023 Trustwave Holdings, Inc. All rights reserved. Loading HELP US STOP THE ROBOT UPRISING This is a bot-free zone. Please check the box to let us know you're human. THANK YOU Download Now -------------------------------------------------------------------------------- Read complimentary reports and insightful stories in the Trustwave Resource Center THANK YOU One of our sales specialists will be in touch shortly. -------------------------------------------------------------------------------- Read complimentary reports and insightful stories in the Trustwave Resource Center We use cookies to provide you a relevant user experience, analyze our traffic, and provide social media features. Privacy Policy GOT IT PREFERENCE CENTRE When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. More information Allow All MANAGE CONSENT PREFERENCES STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. Back Button COOKIE LIST Search Icon Filter Icon Clear checkbox label label Apply Cancel Consent Leg.Interest checkbox label label checkbox label label checkbox label label Confirm My Choices PREFERENCE CENTRE When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. More information Allow All MANAGE CONSENT PREFERENCES STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. Back Button PERFORMANCE COOKIES Search Icon Filter Icon Clear checkbox label label Apply Cancel Consent Leg.Interest checkbox label label checkbox label label checkbox label label Confirm My Choices