Ihre wichtigen Dokumente.pdf (2021-12-15)

Overview

Attackers try to collect Microsoft credentials

Explanation

In this case, the attackers use emails from a trusted source and add a link leading to allegedly important documents. This way, the attackers want to lure user to the phishing form in order to enter their credentials before accessing the documents.

Example

Phishing mail


Prevention

If you are uncertain about the authenticity of an email, do not hesitate to contact the entity that seems to have sent you the email using a safe communication manner, using the phone for example (no phone number from the untrusted email must be used in order to verify the authenticity).
If you are working for the Luxembourgish government or are using any of the GOVCERT.LU services, it is important to forward phishing emails to us (using Reporting an incident or the Outlook button). This will allow us to take down phishing websites and protect members of our constituency.

Report an incident

If you wish to report an incident anonymously, please complete the PGP encrypted reporting form.

> Report
> More Information