Suppose that an organisation of which you are a member sends you a mail which says “We need your bank details so that we can send you money we owe you. Please click the link in this message to go straight to the screen where you can enter bank details”.
Also:
a) They legitimately do use your bank details to send you money as part of their business model, but…
b) They already have your correct bank details and have been successfully sending money to you for over a year
c) The link (yes, I clicked it … I live on the wild side. No, obviously I did NOT go prepared to enter any information about myself whatsoever) does in fact correctly go to the appropriate page of the organisation’s website, which is clearly not spoofed. But the link also contains about three lines of unreadable encoded text which could be doing just about anything.
What is likely to be going on here? Just a case of the helpdesk lefthand not knowing what the programming righthand is doing? Or is it possible for an exploit to rewrite the code on target-organisation’s website so that if you do enter information after clicking the link, it funnels back to a third party?
Organisation in question doesn’t seem to think they have a problem, but I think they have a problem (not least that my email to them querying all this seems to have been answered by a random helpdesker, not an actual security expert, and then closed with a breezy “oh, I’m not sure why we sent you that mail but don’t worry - we do already have your details on file!”)