<Company> DOCUMENT #64743

Explanation

Threat actors are using compromised accounts to collect Microsoft e-mail credentials. By using compromised accounts, the e-mail seems legitimate at first glance as it seems to originate from a known and trusted source. In reality, however, it is malicious.

The phishing mail leads the user to believe that important files have been sent.
By scanning the QR code in the e-mail the user is redirected to a fake Microsoft login page, where they are asked for their username and password.

Example

phishing_email phishing_username phishing_password

0x00

Prevention

If you are uncertain about the authenticity of an email, do not hesitate to contact the entity that seems to have sent you the email using a safe communication manner, using the phone for example (no phone number from the untrusted email must be used in order to verify the authenticity).

If you are working for the Luxembourgish government or are using any of the GOVCERT.LU services, it is important to forward phishing emails to us (using Reporting an incident or the Outlook button). This will allow us to take down phishing websites and protect members of our constituency.

0x01

Méi Phishing Beispiller

Alleguer gesinn