RE: (Ref INV/2024/8434) Remboursement en attente (1) .

Explanation

This phishing involves collecting LuxTrust and credit card credentials by impersonating Foyer. The e-mail claims that a mistake has been made and that you should click on the link to get the money back.

This link then redirects the victim to a page where they are first asked to enter personal data and then, in a second step, credit card details. A single authentication method can then be selected: LuxTrust Mobile. However, the text does not match the corresponding image, which shows a LuxTrust Token. The other options such as LuxTrust Token, Scan, SmartCard, Signing Stick and eID Luxembourgeoise are missing from this phishing. Finally the victim is prompted to enter the respective authentication details (User ID, Password, OTP token).

All the steps described above have taken place on pages under the malicious domain ‘remboursfoyer-enlignelx.servebbs.com’ .

Example

email landing_page bank data luxtrust1 luxtrust2 waiting otp

0x00

Prevention

If you are uncertain about the authenticity of an email, do not hesitate to contact the entity that seems to have sent you the email using a safe communication manner, using the phone for example (no phone number from the untrusted email must be used in order to verify the authenticity).

If you are working for the Luxembourgish government or are using any of the GOVCERT.LU services, it is important to forward phishing emails to us (using Reporting an incident or the Outlook button). This will allow us to take down phishing websites and protect members of our constituency.

0x01

More phishing threats to be aware of

View all