Microsoft 365 (Phishing)

Explanation

The goal of this phishing campaign is to steal Microsoft 365 credentials. The distribution happens via email; according to our knowledge mainly by compromised accounts.

In the rather plainly written email it is claimed that another person has shared a document. Hereby it is possible that the language changes, even within the message. However, if the user clicks on “View Document” they are redirected to a malicious website. At that point, the user is prompted again to click “VIEW DOCUMENT” to supposedly access the file. Clicking on that link redirects the user then to a fake Microsoft 365 login page.

Note: The overall approach and appearance of the individual pages may deviate slightly from the previously described.

The following domains were observed in the context of this phishing campaign:

  • *.bard.it[.]com
  • whimsical[.]com

Example

email landing_page login

0x00

Prevention

If you are uncertain about the authenticity of an email, do not hesitate to contact the entity that seems to have sent you the email using a safe communication manner, using the phone for example (no phone number from the untrusted email must be used in order to verify the authenticity).

If you are working for the Luxembourgish government or are using any of the GOVCERT.LU services, it is important to forward phishing emails to us (using Reporting an incident or the Outlook button). This will allow us to take down phishing websites and protect members of our constituency.

0x01

More phishing threats to be aware of

View all