MailGuard 09 October 2025 17:06:18 AEDT 6 MIN READ

Refund Updates, a Ruse to Steal myGOV Credentials

Could your team fall for this fake myGov refund scam, rendering access to government services like the ATO (Australian Taxation Office), vulnerable? Cybercriminals certainly think so, as they impersonate myGov in a phishing campaign that's currently being detected and blocked by MailGuard’s AI powered filter network. The scam uses a fake email with a single link that leads to a cloned myGov login page. The page requests credentials and an SMS authentication code before redirecting to the legitimate myGov site, giving the illusion of authenticity while stealing user data.

At a Glance

Impersonated brand: myGov

  • Lure: Simple HTML email with one link to a fake myGov login page
  • Flow: Fake login → asks for username and password → asks for SMS code → redirects to legitimate myGov site
  • Sender: info@taschenpracht.de (display name “myGov”)
  • Threat type: Phishing and credential theft
  • Status: Blocked by MailGuard’s AI-powered threat detection network

What We Are Seeing

The phishing email impersonates myGov with the subject line “Refund Updates!!!” and includes links to supposed ATO and Centrelink messages. It’s short, appears legitimate, and urges users to check their myGov inbox, a common lure for Australian taxpayers and service recipients.

mygov - 1025 - email

Fake myGov notification email. Note the display name “myGov” but the sender address info@taschenpracht.de and the subject 'Refund Updates!!!', are a red flag.

How the Scam Works

After the email lure, the message using myGov branding and a fake sender address (info(at)taschenpracht(dot)de), includes a link to 'View Messages' that leads to a counterfeit myGov login page hosted on a fraudulent domain.

mygov - 1025 - signin

The cloned myGov sign-in page hosted on myg00vs.framer.website requests username and password, creating a convincing copy of the legitimate portal.

Once user enters their credentials, the site prompts for an SMS code, harvesting multi-factor authentication details in real time.

mygov - 1025 - auth code

After credentials are entered, the fake page requests a one-time SMS code, harvesting 2FA tokens before redirecting victims to the real myGov site.

After submission, the phishing site redirects victims to the legitimate myGov homepage, reinforcing the illusion of legitimacy while attackers exploit stolen details.

Indicators to Share with Your Team

The sender domain taschenpracht.de is unrelated to the Australian Government.

  • The email uses a trusted brand name and short call-to-action.
  • Links do not resolve to 'my.gov.au'. Hover to verify before clicking.
  • Redirecting to the legitimate site after login is a common deception tactic.

Business Impact

Credential harvesting campaigns like this can lead to identity theft, unauthorised access to connected services, and business email compromise. Compromised personal accounts can be leveraged for payroll or supplier fraud, extending the impact beyond individual users.

Recommended Actions for Administrators

  • Block indicators and lookalike domains (e.g., taschenpracht.de, myg00vs.framer.website)
  • Educate users to avoid embedded login links in emails
  • Encourage typing known URLs directly into browsers
  • Review security logs for similar activity
  • Ensure layered protection is active, including advanced AI powered solutions like MailGuard to boost Microsoft 365 and other native email security layers . 

Stay Safe, Know the Signs

MailGuard advises all recipients of these emails to delete them immediately without clicking on any links. Responding or providing personal details can lead to identity theft, data breaches, and financial losses.

Avoid emails that:

  • Aren’t addressed to you personally.
  • Are unexpected and urge immediate action.
  • Contain poor grammar or miss crucial identifying details.
  • Direct you to a suspicious URL that isn’t associated with the genuine company.

Many businesses turn to MailGuard after a near miss or incident. Don't wait until it's too late. Reach out to our team for a confidential discussion by emailing expert@mailguard.com.au or calling 1300 30 44 30.

One Email Is All That It Takes   

All that it takes to devastate your business is a cleverly worded email message that can steal sensitive user credentials or disrupt your business operations. If scammers can trick one person in your company into clicking on a malicious link or attachment, they can gain access to your data or inflict damage on your business.     

For a few dollars per staff member per month, you can protect your business with MailGuard's specialist, 'zero zero-day' email security. Special Ops for when speed matters!  Our real-time 'zero zero-day', email threat detection amplifies our client’s intelligence, knowledge, security and defence. Talk to a solution consultant at MailGuard today about securing your company's inboxes.  

Stay up-to-date with MailGuard's latest blog posts by subscribing to free updates. Subscribe to weekly updates by clicking on the button below.  

Keep Informed with Weekly Updates