Bouteille chartreuse verte prix (2023-05-04)
Overview
Threat actors collecting Microsoft 365 credentialsExplanation
Threat actors are using compromised accounts to collect Microsoft 365 credentials.
By using compromised accounts, the e-mail seems legitimate at first glance as it seems to originate from a known and trusted source.
In reality, however, it is malicious.
The phishing mail leads the user to believe that there is a document to review and sign.
By clicking on the link “ÜBERPRÜFUNGS DOKUMENT” the user is presented a fake Microsoft OneNote page,
showing a link to a fake invoice (REVIEW DOCUMENT).
After clicking on the fake link, they are redirected to a fake Microsoft login form.
The owner of the compromised account has been notified.
Example
Prevention
If you are uncertain about the authenticity of an email, do not hesitate to contact the entity that seems to have sent you the email using a safe communication manner, using the phone for example (no phone number from the untrusted email must be used in order to verify the authenticity).If you are working for the Luxembourgish government or are using any of the GOVCERT.LU services, it is important to forward phishing emails to us (using Reporting an incident or the Outlook button). This will allow us to take down phishing websites and protect members of our constituency.
Report an incident
If you wish to report an incident anonymously, please complete the PGP encrypted reporting form.
> Report> More Information