MailGuard has intercepted a new phishing campaign impersonating Webcentral, using fake payment‑failure notices to steal login credentials and credit card details. The scam uses rotating sender names and a staged phishing flow that mimics Webcentral’s real login and billing pages. This campaign is currently being blocked across MailGuard’s global filter network.
The email claims that a recent Webcentral payment has failed and urges the recipient to update their billing details to avoid service interruption. The link leads to a multi‑step phishing flow designed to capture usernames, passwords and full credit card information.
The email states that a payment attempt was declined and encourages the user to act quickly.
Attackers use this to create urgency and prompt the victim to click the link.
The link opens a page styled as a Webcentral login screen requesting a username and password.
This step is designed to harvest account credentials.
A second page requests full credit card details, including card number, expiry, CVV and cardholder name.
This step is used to collect financial information for fraudulent use.
A final loading page appears, branded with Visa or Mastercard imagery.
This step appears to simulate payment processing while attackers validate the stolen card details.
Key indicators of the threat
Display names such as Webcentral, Webcentral Billing, Webcentral Domains and Webcentral Renewals
Sender addresses using random mailboxes on the unrelated domain benefitnavigators.de
Unique, rotating sending addresses embedding the victim’s own email address
Simple HTML email containing a single link
Phishing pages hosted on non‑Webcentral domains
Multi‑step flow capturing login credentials and credit card information
Interfaces closely mimicking Webcentral’s real login and billing pages
Why this matters for businesses
This campaign is particularly dangerous for organisations that rely on Webcentral for domain management, DNS, hosting and email services. A successful compromise can allow attackers to:
With many staff members managing hosting and domain assets from corporate devices, a single phishing email can quickly escalate into a business‑level security incident.
MailGuard advises all recipients of these emails to delete them immediately without clicking on any links. Responding or providing personal details can lead to identity theft, data breaches, and financial losses.
Avoid emails that:
Many businesses turn to MailGuard after a near miss or incident. Don't wait until it's too late. Reach out to our team for a confidential discussion by emailing expert@mailguard.com.au or calling 1300 30 44 30.
All that it takes to devastate your business is a cleverly worded email message that can steal sensitive user credentials or disrupt your business operations. If scammers can trick one person in your company into clicking on a malicious link or attachment, they can gain access to your data or inflict damage on your business.
For a few dollars per staff member per month, you can protect your business with MailGuard's specialist AI-powered, zero-day email security. Special Ops for when speed matters! Our real-time zero-day, email threat detection amplifies our client’s intelligence, knowledge, security and defence. Talk to a solution consultant at MailGuard today about securing your company's inboxes.
Stay up-to-date with MailGuard's latest blog posts by subscribing to free updates. Subscribe to weekly updates by clicking on the button below.