
Postbank Phishing – Fake Login Page Stealing Postbank ID Credentials
This phishing campaign impersonates Postbank, a leading retail bank in Germany. The page is designed to steal customers’ online banking credentials—specifically the Postbank ID (the primary login identifier). The page mimics the legitimate Postbank login interface to trick victims into entering their credentials.
How it works:
The victim receives a phishing email, SMS, or other message claiming a security alert, account issue, or the need to verify their information. The message includes a link to this fake Postbank login page. The page asks for the Postbank ID, which is the first step in the bank’s legitimate authentication process. After the victim enters their Postbank ID, they would likely be taken to a subsequent phishing page requesting their password (and possibly a second factor or PIN).
The goal:
The attacker aims to steal the victim’s Postbank ID and, through a follow-up page, their password and any additional authentication credentials. With these, the attacker can log into the victim’s real Postbank account, view balances, transfer funds, and potentially access other linked financial services.
Red flags to watch for:
- Suspicious URL: The page is hosted on a domain that is not
postbank.de. The legitimate Postbank online banking domain ispostbank.de. Always check the address bar before entering any credentials. - Unsolicited login request: Postbank does not send emails or messages with links requiring customers to log in to resolve account issues. Customers should always access online banking by typing the URL directly or using the official app.
- Generic greeting: The page uses a generic greeting (“Guten Morgen” – Good morning) rather than addressing the customer by name. Legitimate banking portals often personalize the greeting or display a security image after initial identification.
- Missing security indicators: Legitimate Postbank login pages use HTTPS with valid certificates and display a padlock icon. Phishing pages may lack these indicators or use self-signed certificates.
- No step for password or second factor: This page only asks for the Postbank ID. The password and second factor would be requested on subsequent pages—a common pattern in phishing kits that first validate the identifier before proceeding.
What to do if you encounter this:
- Do not enter your Postbank ID or any other credentials on this page.
- If you are a Postbank customer, always access online banking by typing
postbank.dedirectly into your browser or by using the official Postbank app. - If you have already entered your Postbank ID, do not proceed to enter your password or any security codes. Contact Postbank immediately to secure your account.
- Report the phishing page to Postbank’s fraud department (e.g., by forwarding the original message to
[email protected]or using their official reporting channels).
Why this scam is effective:
Postbank has millions of customers in Germany, making it a frequent target for phishing. The page closely mimics the design of the legitimate Postbank login interface, including familiar elements such as the “IT-Umzug” (IT migration) references and security warnings. The inclusion of real-looking footer links (impressum, data protection, etc.) adds to the illusion of legitimacy.
Protective measures:
- Bookmark the official Postbank login page and use that bookmark to access online banking—never click links in emails or messages.
- Use a password manager: It will autofill only on legitimate
postbank.dedomains, not on phishing sites. - Enable two-factor authentication (2FA) on your Postbank account if available, to add an extra layer of protection.
- Be suspicious of any unsolicited message that creates urgency and asks you to log in to your bank account.
- Check the URL carefully: Legitimate Postbank domains end with
postbank.de(e.g.,meine.postbank.de). Look for misspellings, extra words, or unusual top-level domains (.com,.xyz, etc.). - If in doubt, contact Postbank directly using a phone number from your bank statement or the official website—never use contact information provided in a suspicious message.











