NOUVELLE REGLEMENTATION: SECURITE CLIENT-FRD-C-1486014 (2023-07-05)

Overview

Threat actors collecting BNP Paribas account information

Explanation

Threat actors are targeting BNP Paribas customers to collect account information.

The phishing mail leads the user to believe that a new service needs to be activated for their account.
By clicking on the link “Proceder”, the user is redirected to the phishing landing page.

As a first step, the user has to solve a captcha (6+1=?), to make the page more credible.

Once the challenge is solved, the user has to provide their client number, followed by their mobile number. Afterwards, the user has to enter an SMS code.

This page asks for account number and password
Once this information is provided, the user then has to provide his ID card number, after which another SMS code is asked.

Finally, the user is redirected to the legitimate website of BNP Paribas.

Example

phishing_email phishing_captcha phishing_client_number phishing_mobile_number phishing_sms phishing_legitimate_website


Prevention

If you are uncertain about the authenticity of an email, do not hesitate to contact the entity that seems to have sent you the email using a safe communication manner, using the phone for example (no phone number from the untrusted email must be used in order to verify the authenticity).
If you are working for the Luxembourgish government or are using any of the GOVCERT.LU services, it is important to forward phishing emails to us (using Reporting an incident or the Outlook button). This will allow us to take down phishing websites and protect members of our constituency.

Report an incident

If you wish to report an incident anonymously, please complete the PGP encrypted reporting form.

> Report
> More Information