Australia Post Phishing Scam Harvests Credit Card and OTP Data

Phishing Campaign Impersonating Australia Post Aims to Steal Payment Data and One-Time Passcodes

MEDIUM
February 9, 2026
5m read
PhishingCyberattack

Related Entities

Organizations

MailGuard

Other

Australia Post

Full Report

Executive Summary

A new, widespread phishing campaign is impersonating Australia Post to harvest sensitive financial information from unsuspecting victims. The scam, identified by security firm MailGuard, uses deceptive emails claiming a parcel delivery has failed. These emails lure recipients to a fraudulent website that perfectly mimics the Australia Post branding, where they are asked to pay a small "redelivery fee" of 1.99 AUD. The multi-stage attack is designed to steal not only full credit card details but also the one-time passcode (OTP) sent by the victim's bank, giving the criminals everything they need to bypass 2-factor authentication and commit financial fraud. The campaign highlights the continued effectiveness of brand impersonation and the importance of user vigilance in scrutinizing unsolicited emails.

Threat Overview

  • Attack Type: Phishing / Credential Harvesting.
  • Impersonated Brand: Australia Post.
  • Lure: An email with the subject line "Parcel Awaiting Instructions," claiming a package delivery failed due to an incomplete address.
  • Objective: To steal:
    1. Full credit card details (Card number, expiry date, CVV).
    2. Personal information (Phone number).
    3. One-Time Passcodes (OTPs) for transaction authorization.
  • Method: The attack uses a low-value fee (1.99 AUD) to appear plausible and lower the victim's guard. The multi-stage harvesting process is designed to extract the maximum amount of information.

Technical Analysis

The attack follows a classic phishing flow:

  1. The Bait (Email): A simple HTML email is sent from a non-official domain (e.g., csskundapi.com) but with a display name designed to look legitimate. The email contains a clear call-to-action, "Click Here," to resolve the supposed delivery issue. (T1566.002 - Spearphishing Link)
  2. The Hook (Landing Page): The link directs the victim to a phishing page hosted on a compromised or malicious domain. This page is a high-quality replica of an Australia Post webpage, complete with branding and a professional layout, to build trust. (T1598.003 - Spearphishing via Service: Mail-to-Web)
  3. The Reel (Data Harvesting): The scam proceeds in multiple steps:
    • Step 1: Payment Details: The victim is prompted to enter their full credit/debit card information.
    • Step 2: Personal Details: The site then asks for a phone number, which is essential for the final step.
    • Step 3: OTP Theft: The final and most critical page asks the victim to enter the one-time passcode that their bank has just sent to their mobile phone. The attackers, having already initiated a fraudulent transaction with the stolen card details, simply wait for the victim to supply the OTP needed to authorize it. (T1649 - Steal or Forge Authentication Certificates - conceptually similar to stealing a one-time token).

The inclusion of the OTP harvesting step is what makes this attack particularly dangerous. It bypasses a key security control (2FA/3D Secure) that is designed to protect online payments, allowing attackers to immediately monetize the stolen card details.

Impact Assessment

  • Direct Financial Loss: Victims who fall for the scam will likely suffer immediate financial loss as the attackers use their card details and OTP to make unauthorized purchases or cash withdrawals.
  • Identity Theft: The combination of payment details and a phone number can be used in further identity theft schemes.
  • Reputational Damage to Brand: Although Australia Post is not at fault, such widespread scams can tarnish its brand image and reduce customer trust in its official communications.
  • Loss of Confidence: These attacks erode public confidence in digital services and e-commerce.

Detection & Response

For Users:

  • Scrutinize the Sender: Always check the sender's email address. Official communications from Australia Post will come from @auspost.com.au or similar official domains, not random addresses like csskundapi.com.
  • Hover Before You Click: Hover your mouse over any links in an email to see the actual destination URL. If it does not point to the legitimate auspost.com.au website, it is a scam.
  • Go Directly to the Source: If you receive a notification about a package, do not click the link. Instead, open a new browser window and manually type in the official Australia Post website or use their official app to track your package using the provided tracking number.
  • Be Wary of Small Fees: Scammers often use small, plausible fees to trick you. Be suspicious of any unexpected request for payment.

For Organizations:

  • Email Filtering: Use advanced email security gateways that can detect and block phishing emails based on sender reputation, content analysis, and link scanning.
  • DMARC, DKIM, SPF: Implement these email authentication standards to prevent attackers from spoofing your domain, making it harder for them to impersonate your brand effectively.

Mitigation

  • User Education: The primary defense against this type of attack is user awareness. Regularly train employees and educate the public on how to spot phishing scams.
  • Report Phishing: Users who receive these emails should report them to ScamWatch and the Australian Cyber Security Centre (ACSC). If they have entered their details, they must contact their bank or financial institution immediately to cancel their card.
  • Brand Protection Services: Companies like Australia Post can use brand protection services that actively scan the internet for fraudulent domains and phishing sites impersonating their brand and work to have them taken down.

Timeline of Events

1
February 9, 2026
MailGuard intercepts and reports on the Australia Post phishing campaign.
2
February 9, 2026
This article was published

MITRE ATT&CK Mitigations

The most effective mitigation is training users to identify the signs of a phishing email, such as checking sender addresses and hovering over links.

Using email and web filters to analyze and block links to known malicious domains is a critical technical control.

Mapped D3FEND Techniques:

Implementing DMARC, DKIM, and SPF helps prevent domain spoofing, making it harder for attackers to impersonate a trusted brand like Australia Post.

D3FEND Defensive Countermeasures

To combat phishing campaigns like the Australia Post impersonation, automated URL analysis at the email gateway is essential. Modern email security solutions can perform real-time analysis of every link within an incoming email before it reaches the user's inbox. This involves checking the URL against threat intelligence feeds of known malicious domains, analyzing the domain's age and reputation, and using 'time-of-click' protection, which re-analyzes the URL when the user clicks it. For this specific attack, the system would identify that the link does not point to the legitimate auspost.com.au domain and would either block the email entirely or display a prominent warning to the user. This automated defense removes the primary burden from the end-user and provides a critical layer of protection against clicking malicious links.

User training is the ultimate defense against phishing. Organizations must continuously train their employees and the public on how to spot these scams. For the Australia Post campaign, training should emphasize several key behaviors: 1) Always verify the sender's email address, not just the display name. 2) Hover over all links to preview the destination URL before clicking. 3) Never provide financial information or credentials by following a link in an unsolicited email; instead, navigate to the official website manually. 4) Be highly suspicious of any website that asks you to enter an OTP directly onto its page, as this is not standard practice for secure payments. Interactive training using phishing simulations can help reinforce these behaviors and build a resilient human firewall against such attacks.

Sources & References

Australia Post “Parcel Awaiting Instructions” email fake
MailGuard (mailguard.com.au) February 9, 2026
Warning: Flurry of new Australia Post phishing emails detected
ScamWatch (scamwatch.gov.au) February 9, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

PhishingAustralia PostScamCredential HarvestingOTP TheftAustralia

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading