Re: Hëllef Desk (2022-07-22)

Overview

Attacker trying to collect Microsoft Exchange credentials

Explanation

Threat actors are trying to collect Microsoft Exchange credentials of organisations.

The phishing mail leads the user to believe that the employees email account is migrated and the security settings need to be reviewed, and by clicking on the link the user is redirected to the phishing landing page.

When clicking on the link HEI KLICKT, the victim is presented an input form to collect the credentials.

It’s is easy to recognise that this e-mail is a phishing e-mail because it contains spelling errors and errors in the sentence structure. In addition, on the landing page, one can see the logo of pipefy, which is normally not visible on a legitimate Outlook Web App login form.

Example

phishing_email landing_page


Prevention

If you are uncertain about the authenticity of an email, do not hesitate to contact the entity that seems to have sent you the email using a safe communication manner, using the phone for example (no phone number from the untrusted email must be used in order to verify the authenticity).
If you are working for the Luxembourgish government or are using any of the GOVCERT.LU services, it is important to forward phishing emails to us (using Reporting an incident or the Outlook button). This will allow us to take down phishing websites and protect members of our constituency.

Report an incident

If you wish to report an incident anonymously, please complete the PGP encrypted reporting form.

> Report
> More Information