E-DOC-S001245226G022 (2022-06-29)

Overview

Attackers targeting Société Générale customers trying to steal bank account information

Explanation

In this case, customers of the bank Société Générale are targeted.
The phishing mail leads the user to believe that a new important security document is available, and by clicking on the link the user is redirected to the phishing landing page.

After clicking, the landing page presents a fake notice that claims the user must activate strong authentication for his account to be compliant with the payment services (PSD 2) directive (EU) 2015/2366.

In order to “activate” those security services, the user has to click on the link ‘PASS-SECURITE’, where they will then be asked to enter their account information.

Note that neither the phishing mail nor the landing page are in any way linked to Société Générale.

Example

phishing_email PSD2_notice landing_page


Prevention

If you are uncertain about the authenticity of an email, do not hesitate to contact the entity that seems to have sent you the email using a safe communication manner, using the phone for example (no phone number from the untrusted email must be used in order to verify the authenticity).
If you are working for the Luxembourgish government or are using any of the GOVCERT.LU services, it is important to forward phishing emails to us (using Reporting an incident or the Outlook button). This will allow us to take down phishing websites and protect members of our constituency.

Report an incident

If you wish to report an incident anonymously, please complete the PGP encrypted reporting form.

> Report
> More Information