Paypal themed phishing (2022-08-23)

Overview

The threat actor leverages a fake Paypal phishing theme to steal credit card numbers and Paypal login credentials.

Explanation

In this phishing attempt, the threat actor claims that an unauthorised transaction to purchase cryptocurrency has taken place.

In order to cancel that fake unauthorised transaction, the victim is asked to login and provide his credit card details.

When clicking on the link ‘Melden Sie sich bei PayPal an’ (hXXps://payalcustmecare90139180471[.]life), a fake Paypal login page is shown. After that, the phishing continues in two different stages.

  • 1st stage: There is a fake Paypal login form.
  • 2nd stage: The final form asks the credit card number details.

In this case, no 2nd factor authentication phishing was conducted. An example of this would be a phishing form asking Luxtrust token codes.

Example!

paypal_email_tb paypal_email paypal_login_user paypal_login_password


Prevention

If you are uncertain about the authenticity of an email, do not hesitate to contact the entity that seems to have sent you the email using a safe communication manner, using the phone for example (no phone number from the untrusted email must be used in order to verify the authenticity).
If you are working for the Luxembourgish government or are using any of the GOVCERT.LU services, it is important to forward phishing emails to us (using Reporting an incident or the Outlook button). This will allow us to take down phishing websites and protect members of our constituency.

Report an incident

If you wish to report an incident anonymously, please complete the PGP encrypted reporting form.

> Report
> More Information