Internet fraudsters lure Austrian Post customers into the phishing trap with fake e-mails. The messages claim that the shipping costs for a package to be delivered were too low and that an additional payment was necessary. Cyber criminals also target victims’ post.at accounts.
Phishing is an old and proven scam used by online scammers – they use well-known companies and organizations as camouflage and send fake emails on their behalf, with the aim of luring recipients to fake websites. There they are persuaded to enter their credit card details or login details – and the cyber criminals have accomplished their goal.
Criminals on the hunt for payment details
In Austria, in particular, online fraudsters use the local post office as camouflage in an ongoing phishing campaign. The logistics company has posted a warning on its website – and also presented one of the fake emails Post customers should watch out for right now. It is claimed that shipping costs are still payable for a package. Clicking on the link in the message will take you to a phishing site that is supposed to extract your credit card information.
Also targeting post.at user accounts
According to mimikama.at, the online fraudsters are also trying to outsmart Swiss Post customers with a second scam: In a phishing email, recipients are asked to register with their post.at account on a fake Swiss Post website . If you enter your mail access data there, keep in mind that it falls into the wrong hands – and that criminals can use it, for example, to reroute packages.
Watch out for warnings!
To avoid falling victim to such phishing attacks, carefully check incoming emails: In this particular case, the emails are sent from addresses such as [email protected] or [email protected], which obviously do not belong to the Austrian Post. Bumpy German can also be an indication of a phishing attempt. In that case, do not click on the links in the message and do not disclose sensitive data! A self-test with which you can test whether you recognize fraud as such can be found here.