Watch For Fake Australia Post Emails/Texts Pretending Package Issues

Scammers are aggressively using the Australia Post name to send phishing text messages and emails aimed at stealing personal and financial information from unsuspecting victims. These sophisticated scams convince recipients to share confidential details under the guise of a missed parcel delivery or other shipping-related issue that requires urgent attention.

This in-depth article will uncover how the Australia Post scams operate, red flags to watch for, and most critically, how to protect yourself from being deceived.

AU Post verification page

Overview of the Australia Post Scam

This scam involves fraudulent text messages or emails that appear to come from Australia Post about issues with a package delivery or customs fees. The messages mimic Australia Post branding and messaging style.

Some variants of the following shipping-related issues are typically cited:

  • A parcel is stuck in customs and fees must be paid
  • There is a pending delivery you must confirm
  • Your package delivery address needs to be validated
  • Your shipment has shipping issues that require payment

No matter the story, the scammers posing as Australia Post then provide a phone number to call or link to click so the problem can supposedly be resolved. Their ultimate aim is to steal financial and personal information or infect devices with malware.

This scam surged during the pandemic as more people shopped online and anxiously awaited postal deliveries. Victims expect parcels and don’t suspect notifications from Australia Post are fraudulent.

The sophistication varies. Some scams have typos and inconsistencies, while others can appear very credible, replicating official Australia Post fonts, colors and logos. Australia Post has posted warnings on its website about the scams.

Key things to know about the scam:

  • Uses real Australia Post branding – The texts and emails looks like authentic Australia Post communications. This fools many people.
  • Pressures urgent action – Messages often say immediate payment is required or penalties will be incurred. This rushes victims into clicking without thinking.
  • Directs victims to fake sites – The links and numbers go to convincing sham Australia Post pages where users enter personal or financial data.
  • May include parcel numbers – Fake parcel IDs and details make the scam more believable and personalized.
  • Originates from burner phones/accounts – Texts come from constantly changing cell numbers and disposable accounts are used for emails.
  • Seeks sensitive information – Whether through fake sites or calls, the scammers want personal info, bank logins, credit card details, etc.
  • Preys on parcel anticipation – People expecting a delivery are more likely to fall for notifications about shipping problems from the courier.

This scam has infiltrated Australia as more citizens fall victim. But awareness of how to spot fraudulent Australia Post communications will curb deception.

How the Australia Post Scam Works

Australia Post scammers operate through text messages or emails. Here are the step-by-step details on how both versions of the scam unfold:

Australia Post SMS Scam

  1. A text message is sent from a phone number disguised as an official notice from Australia Post. The number changes regularly to avoid blocking.
  2. The message claims there is an urgent issue with a package delivery using Australia Post branding and messaging. Common reasons given are customs fees owed or address confirmation needed.
  3. A link is embedded in the text to supposedly address the delivery problem. The link goes to a fake website impersonating the real Australia Post site.
  4. On the phony site, victims are instructed to enter personal information like name, address, ID number, phone, etc. to confirm delivery details. In other cases, financial account info is sought.
  5. The scammers now possess the victim’s sensitive data, either using it directly for identity theft or selling it online. If bank details are given, accounts can be drained.
  6. With the confidential information acquired, the criminals disappear. The temporary number and website leave virtually no trail. The victim’s data is now in the hands of scammers.

Australia Post Email Scam

  1. An email is sent to recipients spoofing the legitimate email and website of Australia Post. The “From” address mimics Australia Post but goes to the scammer.
  2. The email claims the recipient has a pending delivery, but there is a problem needing urgent action. Customs charges, address confirmation, redelivery fees, and shipping issues are commonly cited.
  3. A link within the email leads to a fake Australia Post website seeking personal information when entered by victims. In other cases, it may download malware onto the user’s device.
  4. The scam email prompts entry of bank account data, credit card numbers, photo ID, etc. to pay fictional fees – allowing immediate account access.
  5. Along with potential bank theft and malware installation, the scammers obtain personal data like name, phone, ID numbers, address, etc. to facilitate identity fraud.
  6. As with the text scam, the criminals have now acquired sensitive user details through the sham emails and sites. The disposable accounts used make the scammers difficult to trace.

Red Flags of the Scam:

  • Spelling and grammar mistakes
  • Threatening urgent calls to action
  • Requests for financial account information
  • Links to odd URLs or domain names
  • Requests to download software
  • Phone numbers from outside Australia
  • Lack of specific user and shipment details

How to Identify Australia Post Text Message Scams

Australia Post scammers use text messages to fool victims about delivery issues. Here are tips to spot fraudulent texts:

Analyze the Sender’s Number

  • Australia Post’s official short code is 75678. Other numbers are likely scams.
  • Example: “Parcel issue, call 01234555 immediately or fees applied. Click: [OddLink]”

Inspect Links Thoroughly

  • Hover over links to preview the URL without clicking. Fake sites have odd links.
  • Example: “Urgent – address confirmation needed for your Australia Post parcel today: [ShadyLink].”

Watch for Threatening Messages

  • Australia Post won’t threaten you over text. Scare tactics about fees/penalties are red flags.
  • Example: “Failed delivery yesterday – redelivery fee must be paid in 30 minutes or further $50 penalties charged.”

Verify Unexpected Requests

  • Pause if a text out of nowhere asks for sensitive information or payment. Verify first.
  • Example: “Please confirm your Australia Post details now to schedule redelivery: [SketchyLink]”

Check for Missing Details

  • No parcel number, order references or your address suggests a scam.
  • Example: “You have a pending Australia Post delivery. Provide your address and credit card details now: [FishyLink]”

Trust your instincts if a text seems suspicious. Verify directly with Australia Post before clicking links or providing information.

How to Spot Australia Post Delivery Scam Emails

Australia Post imposters also use fraudulent emails to target victims. Here are tips to recognize scam emails:

Examine the Sender’s Email Address

  • Emails from odd addresses pretending to be Australia Post are scams.
  • Example: Sender “AusPostSupport@auspozt.com” – typo is a red flag.

Analyze the Links in Emails

  • Hover over hyperlinks to preview the actual destination URL without clicking.
  • Example: “Click here to pay customs fee” points to shady “auspostlogistics.net”

Watch for Spelling/Grammar Errors

  • Poor writing suggests an amateur scammer, not a real Australia Post email.
  • Example: “Parcel attempt failed. Must pay outstanding balence immediately.”

Verify Threats of Fees or Penalties

  • Australia Post won’t threaten penalties in emails. These urgent claims aim to pressure victims.
  • Example: “You must pay $75 customs fee in 1 hr or delivery will be canceled and further fines applied.”

Check for Lack of Details

  • No parcel number, tracking ID or your address is suspicious.
  • Example: “Your Australia Post parcel awaits delivery. Please click link to update information.”

Go slowly and use scrutiny before clicking email links or attachments. When in doubt, contact Australia Post directly to verify legitimacy first.

What to Do if You Have Fallen Victim to the Scam

If you suspect you have been targeted or already fallen victim to an Australia Post text or email scam, take these recommended steps:

1. Contact your bank and credit card issuer.

If any financial information was shared, immediately contact your bank and card issuer. They can freeze accounts and block fraudulent charges. The quicker you notify them, the better.

2. Change any compromised passwords.

If you entered login credentials on fake sites or downloaded malware, rapidly change passwords for your email, bank accounts, social media, and other critical accounts. Enable two-factor authentication if possible.

3. Scan devices for malware.

Use quality antivirus software like Malwarebytes to scan all involved devices for viruses and malware. Remove any infections detected.

4. Place fraud alert on your credit.

Contact credit bureaus to declare fraud alerts for your file. This flags any new activity for review, making it harder for scammers to open accounts in your name.

5. Monitor accounts and credit reports.

Watch bank statements, credit reports, and online logins closely for signs of misuse of your information in the months following the scam targeting you. Proactive monitoring helps.

6. Report the scam.

Alert Australia Post about both scam texts and emails by filing a complaint on their website. Also report SMS scams directly to your mobile operator.

7. Document details as evidence.

Retain records like screenshots of scam texts, emails, and sites as proof for claims and investigations. Note relevant dates, phone numbers, messages, losses, etc.

8. Wipe devices completely if severe infection.

For serious malware attacks, fully reset infected devices to factory default settings. This cleans out embedded malware. Reinstall apps afterwards.

9. Seek further help if identity theft occurs.

If scammers misuse your stolen data, file an identity theft report and contact agencies for extended fraud resolution guidance. The IDCARE helpline can advise Australian victims.

Falling prey to the Australia Post scam can create substantial personal and financial troubles. But taking quick and thorough actions can help curb damages and prevent further negative impacts going forward.

Is Your Device Infected? Check for Malware

If your device is running slowly or acting suspicious, it may be infected with malware. Malwarebytes Anti-Malware Free is a great option for scanning your device and detecting potential malware or viruses. The free version can efficiently check for and remove many common infections.  

Malwarebytes can run on Windows, Mac, and Android devices. Depending on which operating system is installed on the device you’re trying to run a Malwarebytes scan, please click on the tab below and follow the displayed steps.

Malwarebytes For WindowsMalwarebytes For MacMalwarebytes For Android

Scan your computer with Malwarebytes for Windows to remove malware

Malwarebytes stands out as one of the leading and widely-used anti-malware solutions for Windows, and for good reason. It effectively eradicates various types of malware that other programs often overlook, all at no cost to you. When it comes to disinfecting an infected device, Malwarebytes has consistently been a free and indispensable tool in the battle against malware. We highly recommend it for maintaining a clean and secure system.

  1. Download Malwarebytes for Windows

    You can download Malwarebytes by clicking the link below.

    MALWAREBYTES FOR WINDOWS DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes)
  2.  

    Install Malwarebytes

    After the download is complete, locate the MBSetup file, typically found in your Downloads folder. Double-click on the MBSetup file to begin the installation of Malwarebytes on your computer. If a User Account Control pop-up appears, click “Yes” to continue the Malwarebytes installation.

    MBAM1
  3. Follow the On-Screen Prompts to Install Malwarebytes

    When the Malwarebytes installation begins, the setup wizard will guide you through the process.

    • You’ll first be prompted to choose the type of computer you’re installing the program on—select either “Personal Computer” or “Work Computer” as appropriate, then click on Next.

      MBAM3 1
    • Malwarebytes will now begin the installation process on your device.

      MBAM4
    • When the Malwarebytes installation is complete, the program will automatically open to the “Welcome to Malwarebytes” screen.

      MBAM6 1
    • On the final screen, simply click on the Open Malwarebytes option to start the program.

      MBAM5 1
  4. Enable “Rootkit scanning”.

    Malwarebytes Anti-Malware will now start, and you will see the main screen as shown below. To maximize Malwarebytes’ ability to detect malware and unwanted programs, we need to enable rootkit scanning. Click on the “Settings” gear icon located on the left of the screen to access the general settings section.

    MBAM8

    In the settings menu, enable the “Scan for rootkits” option by clicking the toggle switch until it turns blue.

    MBAM9

    Now that you have enabled rootkit scanning, click on the “Dashboard” button in the left pane to get back to the main screen.

  5. Perform a Scan with Malwarebytes.

    To start a scan, click the Scan button. Malwarebytes will automatically update its antivirus database and begin scanning your computer for malicious programs.

    MBAM10
  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now scan your computer for browser hijackers and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check the status of the scan to see when it is finished.

    MBAM11
  7. Quarantine detected malware

    Once the Malwarebytes scan is complete, it will display a list of detected malware, adware, and potentially unwanted programs. To effectively remove these threats, click the “Quarantine” button.

    MBAM12

    Malwarebytes will now delete all of the files and registry keys and add them to the program’s quarantine.

    MBAM13

  8. Restart your computer.

    When removing files, Malwarebytes may require a reboot to fully eliminate some threats. If you see a message indicating that a reboot is needed, please allow it. Once your computer has restarted and you are logged back in, you can continue with the remaining steps.

    MBAM14

Your computer should now be free of trojans, adware, browser hijackers, and other malware.

If your current antivirus allowed this malicious program on your computer, you may want to consider purchasing Malwarebytes Premium to protect against these types of threats in the future.
If you are still having problems with your computer after completing these instructions, then please follow one of the steps:

Scan your computer with Malwarebytes for Mac to remove malware

Malwarebytes for Mac is an on-demand scanner that can destroy many types of malware that other software tends to miss without costing you absolutely anything. When it comes to cleaning up an infected device, Malwarebytes has always been free, and we recommend it as an essential tool in the fight against malware.

  1. Download Malwarebytes for Mac.

    You can download Malwarebytes for Mac by clicking the link below.

    MALWAREBYTES FOR MAC DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Mac)
  2. Double-click on the Malwarebytes setup file.

    When Malwarebytes has finished downloading, double-click on the setup file to install Malwarebytes on your computer. In most cases, downloaded files are saved to the Downloads folder.

    Double-click on setup file to install Malwarebytes

  3. Follow the on-screen prompts to install Malwarebytes.

    When the Malwarebytes installation begins, you will see the Malwarebytes for Mac Installer which will guide you through the installation process. Click “Continue“, then keep following the prompts to continue with the installation process.

    Click Continue to install Malwarebytes for Mac

    Click again on Continue to install Malwarebytes for Mac for Mac

    Click Install to install Malwarebytes on Mac

    When your Malwarebytes installation completes, the program opens to the Welcome to Malwarebytes screen. Click the “Get started” button.

  4. Select “Personal Computer” or “Work Computer”.

    The Malwarebytes Welcome screen will first ask you what type of computer are you installing this program, click either Personal Computer or Work Computer.
    Select Personal Computer or Work Computer mac

  5. Click on “Scan”.

    To scan your computer with Malwarebytes, click on the “Scan” button. Malwarebytes for Mac will automatically update the antivirus database and start scanning your computer for malware.
    Click on Scan button to start a system scan Mac

  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will scan your computer for adware, browser hijackers, and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Wait for Malwarebytes for Mac to scan for malware

  7. Click on “Quarantine”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes has detected. To remove the malware that Malwarebytes has found, click on the “Quarantine” button.
    Review the malicious programs and click on Quarantine to remove malware

  8. Restart computer.

    Malwarebytes will now remove all the malicious files that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your computer.
    Malwarebytes For Mac requesting to restart computer

Your Mac should now be free of adware, browser hijackers, and other malware.

If your current antivirus allowed a malicious program on your computer, you might want to consider purchasing the full-featured version of Malwarebytes Anti-Malware to protect against these types of threats in the future.
If you are still experiencing problems while trying to remove a malicious program from your computer, please ask for help in our Mac Malware Removal Help & Support forum.

Scan your phone with Malwarebytes for Android to remove malware

Malwarebytes for Android automatically detects and removes dangerous threats like malware and ransomware so you don’t have to worry about your most-used device being compromised. Aggressive detection of adware and potentially unwanted programs keeps your Android phone or tablet running smooth.

  1. Download Malwarebytes for Android.

    You can download Malwarebytes for Android by clicking the link below.

    MALWAREBYTES FOR ANDROID DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Android)
  2. Install Malwarebytes for Android on your phone.

    In the Google Play Store, tap “Install” to install Malwarebytes for Android on your device.

    Tap Install to install Malwarebytes for Android

    When the installation process has finished, tap “Open” to begin using Malwarebytes for Android. You can also open Malwarebytes by tapping on its icon in your phone menu or home screen.
    Malwarebytes for Android - Open App

  3. Follow the on-screen prompts to complete the setup process

    When Malwarebytes will open, you will see the Malwarebytes Setup Wizard which will guide you through a series of permissions and other setup options.
    This is the first of two screens that explain the difference between the Premium and Free versions. Swipe this screen to continue.
    Malwarebytes Setup Screen 1
    Tap on “Got it” to proceed to the next step.
    Malwarebytes Setup Screen 2
    Malwarebytes for Android will now ask for a set of permissions that are required to scan your device and protect it from malware. Tap on “Give permission” to continue.
    Malwarebytes Setup Screen 3
    Tap on “Allow” to permit Malwarebytes to access the files on your phone.
    Malwarebytes Setup Screen 4

  4. Update database and run a scan with Malwarebytes for Android

    You will now be prompted to update the Malwarebytes database and run a full system scan.

    Malwarebytes fix issue

    Click on “Update database” to update the Malwarebytes for Android definitions to the latest version, then click on “Run full scan” to perform a system scan.

    Update database and run Malwarebytes scan on phone

  5. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now start scanning your phone for adware and other malicious apps. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Malwarebytes scanning Android for Vmalware

  6. Click on “Remove Selected”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes for Android has detected. To remove the malicious apps that Malwarebytes has found, tap on the “Remove Selected” button.
    Remove malware from your phone

  7. Restart your phone.

    Malwarebytes for Android will now remove all the malicious apps that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your device.


Your phone should now be free of adware, browser hijackers, and other malware.

If your current antivirus allowed a malicious app on your phone, you may want to consider purchasing the full-featured version of Malwarebytes to protect against these types of threats in the future.
If you are still having problems with your phone after completing these instructions, then please follow one of the steps:

Frequently Asked Questions About Australia Post Scams

What are Australia Post scams?

They are fake text messages and emails sent by scammers impersonating Australia Post. They claim issues with deliveries to trick people into providing personal and financial information.

How do I recognize Australia Post scams?

Watch for odd links, urgent threats, spelling/grammar errors, requests for sensitive data, non-Australian numbers, missing order details, and other red flags. Verify any suspicions directly with Australia Post.

What do the scammers want?

Their aim is to steal identities, drain bank accounts, and install malware using the fraudulent shipping communications. Posing as Australia Post lets them elicit sensitive data.

What should I do if I get a suspicious message?

Do not click links, provide information, make payments, or call numbers provided. Report scam emails to Australia Post and text scams to 0429 999 888.

What if I already provided information or clicked a link?

Quickly contact your bank, scan devices for malware, enable two-factor authentication on accounts, place fraud alerts with credit bureaus, monitor your credit, and report the scam.

How can I avoid Australia Post scams?

Analyze messages closely, look for red flags, contact Australia Post to verify concerns, avoid opening attachments/links, and never provide personal or financial data to unconfirmed sources.

How common are these scams?

These scams have surged along with e-commerce and delivery volumes. Scammers increasingly pretend to be Australia Post hoping victims anxiously await parcels.

Who is responsible for these scams?

Individual scammers and organized cybercrime rings in Australia and abroad run these cons. They are difficult to trace as they use burner phones and fake accounts.

What risks do I face if I provide my information?

Identity theft, bank account draining, credit damage, and device malware infections. Scammers exploit leaked personal and financial data.

Can Australia Post help if I’m scammed?

Unfortunately Australia Post is not liable, but can provide information to authorities to aid investigations. You must file claims and reports regarding any losses from scams.

How can I protect myself from these scams?

Be vigilant inspecting parcel communications, contact Australia Post to verify odd requests, avoid opening attachments/links, and never provide personal or financial information to unconfirmed sources.

The Bottom Line

Scam texts and emails impersonating Australia Post are a growing threat that citizens should be vigilant against. These fraudulent shipping notifications are designed to harvest users’ personal details and money.

By learning the scam tactics, recognizing warning signs, and acting fast if targeted, individuals can protect themselves from the havoc of identity theft and bank account draining. The insights provided here offer the awareness needed to avoid becoming another victim of these parcel delivery and customs scams.

Stay alert for questionable digital communications claiming to be from Australia Post. Verify any delivery issues directly with them. Follow prudent cyber security habits regarding links, downloads, and providing sensitive information to unconfirmed sources. With proper scam awareness, these frauds can be contained. But it requires an informed public that examines messages critically and understands this threat. Use the knowledge in this article to identify and evade Australia Post scams.

How to Stay Safe Online

Here are 10 basic security tips to help you avoid malware and protect your device:

  1. Use a good antivirus and keep it up-to-date.

    Shield Guide

    It's essential to use a good quality antivirus and keep it up-to-date to stay ahead of the latest cyber threats. We are huge fans of Malwarebytes Premium and use it on all of our devices, including Windows and Mac computers as well as our mobile devices. Malwarebytes sits beside your traditional antivirus, filling in any gaps in its defenses, and providing extra protection against sneakier security threats.

  2. Keep software and operating systems up-to-date.

    updates-guide

    Keep your operating system and apps up to date. Whenever an update is released for your device, download and install it right away. These updates often include security fixes, vulnerability patches, and other necessary maintenance.

  3. Be careful when installing programs and apps.

    install guide

    Pay close attention to installation screens and license agreements when installing software. Custom or advanced installation options will often disclose any third-party software that is also being installed. Take great care in every stage of the process and make sure you know what it is you're agreeing to before you click "Next."

  4. Install an ad blocker.

    Ad Blocker

    Use a browser-based content blocker, like AdGuard. Content blockers help stop malicious ads, Trojans, phishing, and other undesirable content that an antivirus product alone may not stop.

  5. Be careful what you download.

    Trojan Horse

    A top goal of cybercriminals is to trick you into downloading malware—programs or apps that carry malware or try to steal information. This malware can be disguised as an app: anything from a popular game to something that checks traffic or the weather.

  6. Be alert for people trying to trick you.

    warning sign

    Whether it's your email, phone, messenger, or other applications, always be alert and on guard for someone trying to trick you into clicking on links or replying to messages. Remember that it's easy to spoof phone numbers, so a familiar name or number doesn't make messages more trustworthy.

  7. Back up your data.

    backup sign

    Back up your data frequently and check that your backup data can be restored. You can do this manually on an external HDD/USB stick, or automatically using backup software. This is also the best way to counter ransomware. Never connect the backup drive to a computer if you suspect that the computer is infected with malware.

  8. Choose strong passwords.

    lock sign

    Use strong and unique passwords for each of your accounts. Avoid using personal information or easily guessable words in your passwords. Enable two-factor authentication (2FA) on your accounts whenever possible.

  9. Be careful where you click.

    cursor sign

    Be cautious when clicking on links or downloading attachments from unknown sources. These could potentially contain malware or phishing scams.

  10. Don't use pirated software.

    Shady Guide

    Avoid using Peer-to-Peer (P2P) file-sharing programs, keygens, cracks, and other pirated software that can often compromise your data, privacy, or both.

To avoid potential dangers on the internet, it's important to follow these 10 basic safety rules. By doing so, you can protect yourself from many of the unpleasant surprises that can arise when using the web.