<recipient's address> Authenticator Sessions Timeout (2024-03-08)
Overview
Threat actors collecting ZIMBRA login credentialsExplanation
Threat actors are attempting to collect ZIMBRA login credentials.
The message states that the recipient’s Login Authenticator sessions will expire and prompts them to re-authenticate their login security by scanning the QR code. To increase credibility, the phishing email mentions the recipient’s email address several times.
Upon entering their credentials on the phishing landing page, which closely resembles the legitimate ZIMBRA login page, the information is directly sent to the threat actors.
Example
Prevention
If you are uncertain about the authenticity of an email, do not hesitate to contact the entity that seems to have sent you the email using a safe communication manner, using the phone for example (no phone number from the untrusted email must be used in order to verify the authenticity).If you are working for the Luxembourgish government or are using any of the GOVCERT.LU services, it is important to forward phishing emails to us (using Reporting an incident or the Outlook button). This will allow us to take down phishing websites and protect members of our constituency.
Report an incident
If you wish to report an incident anonymously, please complete the PGP encrypted reporting form.
> Report> More Information