Är Bezuelung war net erfollegräich (2024-06-18)

Iwwerbléck

Threat actors collecting Netflix, credit card and Luxtrust credentials

Erklärung

The goal of this phishing campaign is to steal Netflix, credit card as well as LuxTrust credentials. The entire phishing attempt is conducted in Luxembourgish, however many translation errors have slipped through.

In the email, it is claimed that a Netflix payment did not go through. The message is equipped with several buttons/URLs to click on, but all of them lead to the same landing page. Once there, the user is prompted to enter their Netflix login credentials.

Next, the user is asked to provide some personal data as well as information about their bank card. After that, the system requests the LuxTrust data. Following a brief wait, the user is then supposed to enter an SMS code, which likely stands for the One-Time Password (OTP).

The entire process runs under the malicious domain renderhealth.com .

Beispill

email landing_page bank data luxtrust waiting SMS code


Preventioun

Wann Dir Iech net sécher sidd datt en E-mail wierklech vun der Persoun geschéckt gouf vun där dësen soll kommen, da kënnt Dir ëmmer bei der Verwaltung oder bei der Persoun selwer iwwer ee séchere Kommunikatiounskanal nofroen. Zum Beispill iwwer Telefon (d'Nummer soll deen Ament awer net aus dem E-Mail geholl ginn mee muss manuell iwwerpréift ginn).
Wann Dir beim lëtzebuerger Staat schafft, oder Notzer vun de Servicer vum GOVCERT.LU sidd, ass et wichteg eis esou E-Mailen ze mellen (iwwer En Tëschefall mellen oder dem Knäppchen am Outlook). Nëmmen esou kënnen dës Websäiten vum Netz geholl ginn a weidere Schued, zum Beispill bei Persounen déi dësen Ugrëff net erkennen, verhënnert ginn.

Tëschefall mellen

Fir en Tëschefall anonym ze mellen, benotzt w.e.g. de PGP verschlësselte Formulaire

> Meldung
> Méi Informatiounen