A new, widespread phishing campaign is impersonating Australia Post to harvest sensitive financial information from unsuspecting victims. The scam, identified by security firm MailGuard, uses deceptive emails claiming a parcel delivery has failed. These emails lure recipients to a fraudulent website that perfectly mimics the Australia Post branding, where they are asked to pay a small "redelivery fee" of 1.99 AUD. The multi-stage attack is designed to steal not only full credit card details but also the one-time passcode (OTP) sent by the victim's bank, giving the criminals everything they need to bypass 2-factor authentication and commit financial fraud. The campaign highlights the continued effectiveness of brand impersonation and the importance of user vigilance in scrutinizing unsolicited emails.
The attack follows a classic phishing flow:
csskundapi.com) but with a display name designed to look legitimate. The email contains a clear call-to-action, "Click Here," to resolve the supposed delivery issue. (T1566.002 - Spearphishing Link)T1598.003 - Spearphishing via Service: Mail-to-Web)T1649 - Steal or Forge Authentication Certificates - conceptually similar to stealing a one-time token).The inclusion of the OTP harvesting step is what makes this attack particularly dangerous. It bypasses a key security control (2FA/3D Secure) that is designed to protect online payments, allowing attackers to immediately monetize the stolen card details.
@auspost.com.au or similar official domains, not random addresses like csskundapi.com.auspost.com.au website, it is a scam.The most effective mitigation is training users to identify the signs of a phishing email, such as checking sender addresses and hovering over links.
Using email and web filters to analyze and block links to known malicious domains is a critical technical control.
Mapped D3FEND Techniques:
Implementing DMARC, DKIM, and SPF helps prevent domain spoofing, making it harder for attackers to impersonate a trusted brand like Australia Post.
To combat phishing campaigns like the Australia Post impersonation, automated URL analysis at the email gateway is essential. Modern email security solutions can perform real-time analysis of every link within an incoming email before it reaches the user's inbox. This involves checking the URL against threat intelligence feeds of known malicious domains, analyzing the domain's age and reputation, and using 'time-of-click' protection, which re-analyzes the URL when the user clicks it. For this specific attack, the system would identify that the link does not point to the legitimate auspost.com.au domain and would either block the email entirely or display a prominent warning to the user. This automated defense removes the primary burden from the end-user and provides a critical layer of protection against clicking malicious links.
User training is the ultimate defense against phishing. Organizations must continuously train their employees and the public on how to spot these scams. For the Australia Post campaign, training should emphasize several key behaviors: 1) Always verify the sender's email address, not just the display name. 2) Hover over all links to preview the destination URL before clicking. 3) Never provide financial information or credentials by following a link in an unsolicited email; instead, navigate to the official website manually. 4) Be highly suspicious of any website that asks you to enter an OTP directly onto its page, as this is not standard practice for secure payments. Interactive training using phishing simulations can help reinforce these behaviors and build a resilient human firewall against such attacks.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats