Sender Shared e-Sign (2024-08-21)

Overview

Threat actors collecting Microsoft login credentials

Explanation

The goal of this phishing campaign is to steal Microsoft login credentials.

The phishing email pretends to be a notification about the reception of a secure document. To appear more legitimate, the name of the recipient’s institution is taken from the email domain and used in the title.

By clicking on the link to view the document, the recipient is redirected to a landing page where another click has to be performed in order to access the document.

After clicking on “View Statement” the user is taken to the Phishing page that impersonates a Microsoft login page.

Example

email landing_page view_statement phishing_page


Prevention

If you are uncertain about the authenticity of an email, do not hesitate to contact the entity that seems to have sent you the email using a safe communication manner, using the phone for example (no phone number from the untrusted email must be used in order to verify the authenticity).
If you are working for the Luxembourgish government or are using any of the GOVCERT.LU services, it is important to forward phishing emails to us (using Reporting an incident or the Outlook button). This will allow us to take down phishing websites and protect members of our constituency.

Report an incident

If you wish to report an incident anonymously, please complete the PGP encrypted reporting form.

> Report
> More Information