Document partagé de <name> (2024-02-13)
Overview
Threat actors collecting Microsoft login credentialsExplanation
Threat actors are using a compromised e-mail account of an independent Luxembourgish media company to send phishing e-mails and collect Microsoft e-mail credentials. This makes the emails appear legitimate at first glance, as it seems they come from a known and trusted source.
The attackers are employing a multi-step approach:
Legitimate Dropbox Link: The e-mail contains a Dropbox link to download a PDF file.
PDF File with Phishing Link: Upon opening the PDF file, there is a phishing link disguised within the document. The PDF file contains content suggesting that important files have been sent, urging users to click on the provided link for further details.
Phishing Landing Page: The phishing link redirects users to a fake Microsoft login page. This fake page closely resembles the legitimate Microsoft login interface, prompting users to enter their username and password.
Example
Prevention
If you are uncertain about the authenticity of an email, do not hesitate to contact the entity that seems to have sent you the email using a safe communication manner, using the phone for example (no phone number from the untrusted email must be used in order to verify the authenticity).If you are working for the Luxembourgish government or are using any of the GOVCERT.LU services, it is important to forward phishing emails to us (using Reporting an incident or the Outlook button). This will allow us to take down phishing websites and protect members of our constituency.
Report an incident
If you wish to report an incident anonymously, please complete the PGP encrypted reporting form.
> Report> More Information