Online risks

The amount of so-called phishing messages (e-mails, text messages, Messenger messages) and malware on web sites is on the rise. This page with practical tips and examples has been created to protect you from online risks.

Our most important tips:

Do not share any user names, passwords, credit card information and account information via e-mail. During the log-in, make sure you are actually on an Austrian Post web site. Delete any e-mails that seems suspicious to you.

How to identify a phishing attempt

  • By the sender      
    • The email address does not end in @post.at
    • The sender's name is not Austrian Post
       
  • By the content
    • The text is written in incorrect German; the writing style does not match that of Austrian Post; there's no personal salutation
    • The design does not match other e-mails or messages sent by Austrian Post
    • The content of the message does not fit (I am not currently waiting for any shipment to be delivered by Austrian Post)
    • The message includes a request to submit payment or account details or other personal information (via e-mail or by clicking on a link)
       

Examples of current phishing attempts

Download

Current phishing attacks

Despite comprehensive measures, Austrian Post is being misused as a purported sender of phishing e-mails. There is currently a campaign involving e-mails with the subject "Your parcel is waiting!", which ask for a payment of a "delivery fee".

Regarding this fraud or phishing campaign, please note:

  • Austrian Post will never ask for payments in e-mails.
  • The e-mail appears to have been sent from meine.post@post.at. The fraudsters use a trick that creates the impression that the e-mail is actually from Austrian Post.

Here's what you should definitely avoid when dealing with phishing e-mails:

  • Do not click on suspicious links in e-mails or text messages.
  • Never open suspicious attachments or documents.
  • Never disclose passwords.
  • Never comply with requests for payment.

    Screenshots of current fraud attempts
 
Phishing examples

Further variants

Phishing Example