RE: bureau d'aide (2022-06-10)

Overview

Threat actors trying to steal Microsoft Exchange credentials

Explanation

In this phishing attempt, the phishing theme is the migration of the email accounts of the organisation of the recipient to Outlook 2022 Office Webmail.
The user is asked to login in order for migration updates to be performed and to improve the protection against spam e-mails.

When clicking on the link (CLIQUER ICI), the phishing landing page is presented to the user.
In it, the user is asked for the username, email and password.
In order to make it look more like an update, the phishing form asks to confirm the password.

The web page is built with pipefy - a work platform that allows to organise work processes.
For applications built with this solution, a pipefy logo is shown at the bottom right.
This allows to easily differentiate a real Outlook Webmail login and the phishing page.

Example

phishing_email landing_page


Prevention

If you are uncertain about the authenticity of an email, do not hesitate to contact the entity that seems to have sent you the email using a safe communication manner, using the phone for example (no phone number from the untrusted email must be used in order to verify the authenticity).
If you are working for the Luxembourgish government or are using any of the GOVCERT.LU services, it is important to forward phishing emails to us (using Reporting an incident or the Outlook button). This will allow us to take down phishing websites and protect members of our constituency.

Report an incident

If you wish to report an incident anonymously, please complete the PGP encrypted reporting form.

> Report
> More Information