Är Bezuelung war net erfollegräich

Explanation

The goal of this phishing campaign is to steal Netflix, credit card as well as LuxTrust credentials. The entire phishing attempt is conducted in Luxembourgish, however many translation errors have slipped through.

In the email, it is claimed that a Netflix payment did not go through. The message is equipped with several buttons/URLs to click on, but all of them lead to the same landing page. Once there, the user is prompted to enter their Netflix login credentials.

Next, the user is asked to provide some personal data as well as information about their bank card. After that, the system requests the LuxTrust data. Following a brief wait, the user is then supposed to enter an SMS code, which likely stands for the One-Time Password (OTP).

The entire process runs under the malicious domain renderhealth.com .

Example

email landing_page bank data luxtrust waiting SMS code

0x00

Prevention

If you are uncertain about the authenticity of an email, do not hesitate to contact the entity that seems to have sent you the email using a safe communication manner, using the phone for example (no phone number from the untrusted email must be used in order to verify the authenticity).

If you are working for the Luxembourgish government or are using any of the GOVCERT.LU services, it is important to forward phishing emails to us (using Reporting an incident or the Outlook button). This will allow us to take down phishing websites and protect members of our constituency.

0x01

More phishing threats to be aware of

View all