Facture 220003078_9000620 (2022-11-08)

Overview

Threat actors trying to collect Office 365 credentials

Explanation

Threat actors are impersonating a Luxembourgish company to collect Office 365 credentials.

The attack starts with a spoofed e-mail that tells the victim that they have a corrected invoice that needs to be reviewed.

The e-mail text leads the victim to open the attachment, which redirects to the phishing landing page shown in a web browser.

When the credentials are entered, an error message shows up and no further action is taken.

No invoice file is ever downloaded.

Please note that the spoofed e-mail does not originate from climalux.lu.

Example

phishing_email phishing_landing_page phishing_error_page


Prevention

If you are uncertain about the authenticity of an email, do not hesitate to contact the entity that seems to have sent you the email using a safe communication manner, using the phone for example (no phone number from the untrusted email must be used in order to verify the authenticity).
If you are working for the Luxembourgish government or are using any of the GOVCERT.LU services, it is important to forward phishing emails to us (using Reporting an incident or the Outlook button). This will allow us to take down phishing websites and protect members of our constituency.

Report an incident

If you wish to report an incident anonymously, please complete the PGP encrypted reporting form.

> Report
> More Information