In the modern working world, the concept of the clean desk is not just a buzzword, but an effective method of promoting order, efficiency and safety in the workplace. But what exactly does clean desk mean, what advantages does it bring and how can it be implemented in practice? This article sheds light on these aspects and shows how the dataglobal Group’s solutions make a decisive contribution to implementing the clean desk principle.
Phishing campaigns target ELSTER users
Just under six months ago, the Thuringia Ministry of Finance warned of a wave of phishing attacks in which fraudulent emails relating to electronic tax returns (ELSTER) were circulating. As many citizens and companies use ELSTER for their tax affairs, there was an increased risk of the scam being successful.
Users were directed to fake websites that were used to steal account data, access information or credit card details. There was also a risk that malware such as viruses or Trojans could find their way onto the devices of those affected.
New ELSTER phishing in circulation (as of January 2025)
The current ELSTER phishing uses a similar method and lures the recipient with an alleged tax refund for the last tax year (in this case 2024).

Among other things, they are asked to provide their ELSTER access data and bank details in order to receive the outstanding amount. There is also a threat of account blocking if the steps are not taken, as “active participation in this process” is mandatory. The websites appear authentic, but have no connection with the real ELSTER platform.

The ELSTER website also provides information about the current phishing campaign.
How to recognize counterfeits
The fraudulent messages have several peculiarities that should make you suspicious:
- The form of address is impersonal (“Dear customer”).
- Pressure is exerted by urging immediate action.
- There are threats of disproportionate penalties, such as the blocking of the ELSTER account.
Protect yourself!
Do not open any links or attachments and do not disclose any personal data. The tax administration does not send tax data or invoices as e-mail attachments and does not request sensitive information by e-mail.
Recommendation: If you receive suspicious e-mails, contact the company or authority directly via the official channels to verify the authenticity of the message. Do not reply to the e-mail under any circumstances and do not follow any instructions contained therein.
In addition to these measures, we recommend using software to protect your email communication. Opt for a professional email security solution and minimize the risk of becoming a victim of cybercrime.