Alerts
Warning: Emails misusing the name of Llys Cennen Solicitors
25 September 2022
An email has been sent misusing the name of Llys Cennen Solicitors in relation to a supposed 'Contract and Additional Enquiries'.
What is the scam?
An email has been sent from an individual called 'Sara Williams' misusing the name of Llys Cennen Solicitors in relation to a supposed 'Contract and Additional Enquiries'.
The email seen by the SRA claimed to be sent from 'Sara Williams' and was sent from the email address 'sarah@llyscennen.com. It contained an attachment stating 'New Secure File Transfer from CYFREITHWYR LLYS CENNEN SOLICITORS'.
The concern is the link may contain Malware.
The email misuses the name of a genuine solicitor at a genuine firm of solicitors (see below)
Any business or transaction through the email address of 'sarah@llyscennen.com' is not undertaken by a solicitors' practice or individual authorised and regulated by the SRA.
Is there a genuine firm or person?
The SRA authorises and regulates a firm of solicitors called Llys Cennen Solicitors. The genuine firm email domain ends with ‘@llyscennen.co.uk’.
The SRA authorises and regulates a genuine solicitor called Sarah Williams, who is employed at Llys Cennen Solicitors. Her genuine email is sarah@llyscennen.co.uk.
The genuine firm Llys Cennen Solicitors and Sarah Williams have confirmed that they do not have any connection with the email referred to in the above alert.
What should I do?
When a firm's or individual's identity has been copied exactly (or cloned), due diligence is necessary. If you receive correspondence claiming to be from the above firm(s) or individual(s), or information of a similar nature to that described, you should conduct your own due diligence by checking the authenticity of the correspondence by contacting the law firm directly by reliable and established means. You can contact the SRA to find out if individuals or firms are regulated and authorised by the SRA and verify an individual's or firm's practising details. Other verification methods, such as checking public records (e.g. telephone directories and company records) may be required in other circumstances.