Paypal themed phishing (2022-05-27)

Overview

The threat actor leverages a fake Paypal phishing theme, to steal different types of credentials and personal identifiable information.

Explanation

In this phishing attempt, the threat actor uses a fake email with a security notification about an unauthorised Paypal account access.

When clicking on the link ‘update your account’ (hxxps://www.sunrisetrailerparts[.]com[.]au/wp-content/ussu/), a fake Paypal login page is shown. After that, the phishing continues in three different stages.

  • 1st stage: There is a form that asks personal identifiable information, the birthday date, email address and phone number.
  • 2nd stage: Another form to input credit card credentials.
  • 3th stage: The final form where the social security number and a 3D secure code (Luxtrust for most users) are asked.

This phishing attempt is a lot more than a simple Paypal credentials phishing.

Example

paypal_email paypal_login paypal_form


Prevention

If you are uncertain about the authenticity of an email, do not hesitate to contact the entity that seems to have sent you the email using a safe communication manner, using the phone for example (no phone number from the untrusted email must be used in order to verify the authenticity).
If you are working for the Luxembourgish government or are using any of the GOVCERT.LU services, it is important to forward phishing emails to us (using Reporting an incident or the Outlook button). This will allow us to take down phishing websites and protect members of our constituency.

Report an incident

If you wish to report an incident anonymously, please complete the PGP encrypted reporting form.

> Report
> More Information