{"id":31654,"date":"2023-07-06T06:35:26","date_gmt":"2023-07-06T06:35:26","guid":{"rendered":"https:\/\/www.cos.net.au\/c\/?p=31654"},"modified":"2024-08-27T07:18:45","modified_gmt":"2024-08-27T07:18:45","slug":"recognising-phishing-scams-in-australia","status":"publish","type":"post","link":"https:\/\/www.cos.net.au\/c\/cospedia\/recognising-phishing-scams-in-australia","title":{"rendered":"A Complete Guide to Recognising Phishing Scams in Australia"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"31654\" class=\"elementor elementor-31654\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e424d02 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e424d02\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-36881b1\" data-id=\"36881b1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1d77770 elementor-widget elementor-widget-text-editor\" data-id=\"1d77770\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW250645472 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW250645472 BCX0\">Australia, like many other countries, has seen a worrying increase in phishing scams.&nbsp;<\/span><\/span><span style=\"text-align: var(--text-align); background-color: var( --e-global-color-6758e1c ); color: var( --e-global-color-text ); font-size: 1rem;\">According to Scamwatch, Australians lost over AU$476 million to scams in 2023. Investment scams led to the most significant financial losses, totaling just over AU$291 million, despite only 8,159 reports being filed. In contrast, phishing scams were much more prevalent, with over 108,000 incidents reported to Scamwatch last year.<\/span><\/p>\n<p><span class=\"TextRun SCXW250645472 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW250645472 BCX0\">With one cybercrime report being filed every seven minutes, <\/span><span class=\"NormalTextRun SCXW250645472 BCX0\">it&#8217;s<\/span> <span class=\"NormalTextRun SCXW250645472 BCX0\">evident<\/span><span class=\"NormalTextRun SCXW250645472 BCX0\"> that the situation is simply getting out of hand. <\/span><span class=\"NormalTextRun SCXW250645472 BCX0\">The average cost per <\/span><span class=\"NormalTextRun SCXW250645472 BCX0\">cybercrime<\/span><span class=\"NormalTextRun SCXW250645472 BCX0\"> report has increased to more than $39,000 for small <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW250645472 BCX0\">organisations<\/span><span class=\"NormalTextRun SCXW250645472 BCX0\">, $88,000 for medium businesses, and over $62,000 for large businesses &#8211;&nbsp; that&#8217;s a14% rise on <\/span><span class=\"NormalTextRun SCXW250645472 BCX0\">average.<\/span><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-731b50d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"731b50d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-35dc1c8\" data-id=\"35dc1c8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0973194 elementor-widget elementor-widget-text-editor\" data-id=\"0973194\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\">Phishing attacks in Australia can take many different forms from emails, phone calls, text messages to even social media messages, and they can target individuals, businesses, and organisations. Cybercriminals are continually adapting their tactics, s<\/span><span style=\"background-color: var( --e-global-color-6758e1c ); color: var( --e-global-color-text ); font-size: 1rem;\">o <\/span><span style=\"background-color: var( --e-global-color-6758e1c ); color: var( --e-global-color-text ); font-size: 1rem;\">it&#8217;s<\/span><span style=\"background-color: var( --e-global-color-6758e1c ); color: var( --e-global-color-text ); font-size: 1rem;\"> crucial to recognise these scams by s<\/span><span style=\"background-color: var( --e-global-color-6758e1c ); color: var( --e-global-color-text ); font-size: 1rem;\">taying informed, taking precautions, and employing security best practices. Here are some of the most common forms of phishing attempts reported in Australia:<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-26763dc elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"26763dc\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-192b1a1\" data-id=\"192b1a1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ea9d20c elementor-widget elementor-widget-text-editor\" data-id=\"ea9d20c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1><strong><span class=\"TextRun SCXW20725502 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW20725502 BCX0\">Email Phishing<\/span><\/span><\/strong><\/h1><p><span class=\"TextRun SCXW20725502 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW20725502 BCX0\">According to the most recent Proofpoint research, email phishing <\/span><span class=\"NormalTextRun SCXW20725502 BCX0\">scams<\/span><span class=\"NormalTextRun SCXW20725502 BCX0\"> are <\/span><span class=\"NormalTextRun SCXW20725502 BCX0\">a serious problem<\/span><span class=\"NormalTextRun SCXW20725502 BCX0\"> in Australia. These <\/span><span class=\"NormalTextRun SCXW20725502 BCX0\">scams<\/span> <span class=\"NormalTextRun SCXW20725502 BCX0\">mostly target individuals, banking and financial institutions, government <\/span><span class=\"NormalTextRun SCXW20725502 BCX0\">agencies<\/span><span class=\"NormalTextRun SCXW20725502 BCX0\">, healthcare groups, and telecommunications businesses. In 2022, over 71,299 phishing <\/span><span class=\"NormalTextRun SCXW20725502 BCX0\">scams<\/span><span class=\"NormalTextRun SCXW20725502 BCX0\"> were reported in Australia<\/span><span class=\"NormalTextRun SCXW20725502 BCX0\">, with <\/span><span class=\"NormalTextRun SCXW20725502 BCX0\">over <\/span><span class=\"NormalTextRun SCXW20725502 BCX0\">96% of phishing attempts arriving by email, another 3% via malicious websites, and only 1% via phone. Scammers send fraudulent emails impersonating <\/span><span class=\"NormalTextRun SCXW20725502 BCX0\">reputable <\/span><span class=\"NormalTextRun SCXW20725502 BCX0\">businesses or individuals <\/span><span class=\"NormalTextRun AdvancedProofingIssueV2Themed SCXW20725502 BCX0\">in order to<\/span><span class=\"NormalTextRun SCXW20725502 BCX0\"> appear<\/span><span class=\"NormalTextRun SCXW20725502 BCX0\"> legitimate <\/span><span class=\"NormalTextRun SCXW20725502 BCX0\">to gain<\/span><span class=\"NormalTextRun SCXW20725502 BCX0\"> recipients&#8217; trust. During tax season in Australia, phishing attempts typically <\/span><span class=\"NormalTextRun SCXW20725502 BCX0\">imitate <\/span><span class=\"NormalTextRun SCXW20725502 BCX0\">the Australian Taxation Office (ATO), with the intention of <\/span><span class=\"NormalTextRun SCXW20725502 BCX0\">acquiring<\/span><span class=\"NormalTextRun SCXW20725502 BCX0\"> personal and financial information or <\/span><span class=\"NormalTextRun SCXW20725502 BCX0\">initiating<\/span><span class=\"NormalTextRun SCXW20725502 BCX0\"> fraudulent <\/span><span class=\"NormalTextRun SCXW20725502 BCX0\">tax refund claims.<\/span><span class=\"NormalTextRun SCXW20725502 BCX0\"> Phishing emails <\/span><span class=\"NormalTextRun SCXW20725502 BCX0\">frequently<\/span><span class=\"NormalTextRun SCXW20725502 BCX0\"> use social engineering techniques to trick recipients into taking immediate action. <\/span><span class=\"NormalTextRun SCXW20725502 BCX0\">These approaches often involve creating a sense of urgency, panic, or interest in recipients in order to convince them to click on <\/span><span class=\"NormalTextRun SCXW20725502 BCX0\">malicious links <\/span><span class=\"NormalTextRun SCXW20725502 BCX0\">or provide critical information.<\/span><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-189a64a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"189a64a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-eeaed84\" data-id=\"eeaed84\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-433b40a elementor-widget elementor-widget-text-editor\" data-id=\"433b40a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1><strong><span class=\"TextRun SCXW51803604 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW51803604 BCX0\">Spear Phishing<\/span><\/span><\/strong><\/h1><p><span class=\"TextRun SCXW51803604 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW51803604 BCX0\">In spear phishing, s<\/span><span class=\"NormalTextRun SCXW51803604 BCX0\">cammers collect personal information about specific individuals or groups to make their phishing attempts appear more credible. They include <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW51803604 BCX0\">customised<\/span><span class=\"NormalTextRun SCXW51803604 BCX0\"> details such as the recipient&#8217;s name, job title, or corporate information to boost their chances of looking legitimate. Every year, over 88% of businesses face spear phishing attempts, according to Norton <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW51803604 BCX0\">statisti<\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW51803604 BCX0\">cs<\/span><span class=\"NormalTextRun SCXW51803604 BCX0\">. <\/span><span class=\"NormalTextRun SCXW51803604 BCX0\">According to Symantec&#8217;s 2019 Threat <\/span><span class=\"NormalTextRun SCXW51803604 BCX0\">Report, spear<\/span><span class=\"NormalTextRun SCXW51803604 BCX0\"> phishing accounts for 65% of cyber-attacks<\/span><span class=\"NormalTextRun SCXW51803604 BCX0\"> and <\/span><span class=\"NormalTextRun SCXW51803604 BCX0\">targets 22% of CEOs. <\/span><span class=\"NormalTextRun SCXW51803604 BCX0\">For <\/span><span class=\"NormalTextRun SCXW51803604 BCX0\">generat<\/span><span class=\"NormalTextRun SCXW51803604 BCX0\">ing<\/span><span class=\"NormalTextRun SCXW51803604 BCX0\"> a sense of urgency, scammers act as CEOs, COOs, or CFOs and send <\/span><span class=\"NormalTextRun SCXW51803604 BCX0\">fraudulent <\/span><span class=\"NormalTextRun SCXW51803604 BCX0\">emails to employees asking for sensitive information or granting scammers access to certain platforms and accounts such as an ERP system, a Microsoft account, or a banking portal.<\/span><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c4ec70a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c4ec70a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-51f1e68\" data-id=\"51f1e68\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-92473ec elementor-widget elementor-widget-text-editor\" data-id=\"92473ec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1><strong><span class=\"TextRun SCXW226092053 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW226092053 BCX0\">Business Email Compromise (BEC)<\/span><\/span><\/strong><\/h1><p><span class=\"TextRun SCXW226092053 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW226092053 BCX0\">According to the Australian Competition and Consumer Commission (ACCC), businesses in Australia reported losses<\/span><span class=\"NormalTextRun SCXW226092053 BCX0\"> of<\/span><span class=\"NormalTextRun SCXW226092053 BCX0\"> more than <\/span><span class=\"NormalTextRun SCXW226092053 BCX0\">$<\/span><span class=\"NormalTextRun SCXW226092053 BCX0\">132 million in 2020 due to BEC <\/span><span class=\"NormalTextRun SCXW226092053 BCX0\">scams<\/span><span class=\"NormalTextRun SCXW226092053 BCX0\">. <\/span><span class=\"NormalTextRun SCXW226092053 BCX0\">BEC attacks are designed to trick employees into transferring payments or <\/span><span class=\"NormalTextRun SCXW226092053 BCX0\">providing<\/span><span class=\"NormalTextRun SCXW226092053 BCX0\"> sensitive information.<\/span><span class=\"NormalTextRun SCXW226092053 BCX0\"> The impact of BEC extends beyond financial losses, resulting in businesses reputational harm, lost data, and disrupted business operations.<\/span><span class=\"NormalTextRun SCXW226092053 BCX0\"> In 2022, Accounts Payable (AP) departments <\/span><span class=\"NormalTextRun SCXW226092053 BCX0\">remain<\/span><span class=\"NormalTextRun SCXW226092053 BCX0\"> the most vulnerable to BEC <\/span><span class=\"NormalTextRun SCXW226092053 BCX0\">scams<\/span><span class=\"NormalTextRun SCXW226092053 BCX0\">. In 2023, <\/span><span class=\"NormalTextRun SCXW226092053 BCX0\">with the introduction of AI tools, <\/span><span class=\"NormalTextRun SCXW226092053 BCX0\">cybercriminals have the benefit of using AI tools <\/span><span class=\"NormalTextRun SCXW226092053 BCX0\">for <\/span><span class=\"NormalTextRun SCXW226092053 BCX0\">creat<\/span><span class=\"NormalTextRun SCXW226092053 BCX0\">ing<\/span> <span class=\"NormalTextRun SCXW226092053 BCX0\">a\u00a0<\/span><span class=\"NormalTextRun SCXW226092053 BCX0\">clear and <\/span><span class=\"NormalTextRun SCXW226092053 BCX0\">sophisticated email <\/span><span class=\"NormalTextRun SCXW226092053 BCX0\">scam<\/span><span class=\"NormalTextRun SCXW226092053 BCX0\">, so <\/span><span class=\"NormalTextRun SCXW226092053 BCX0\">it\u2019s<\/span><span class=\"NormalTextRun SCXW226092053 BCX0\"> vital t<\/span><span class=\"NormalTextRun SCXW226092053 BCX0\">o educate your<\/span><span class=\"NormalTextRun SCXW226092053 BCX0\"> AP team <\/span><span class=\"NormalTextRun SCXW226092053 BCX0\">on <\/span><span class=\"NormalTextRun SCXW226092053 BCX0\">how to spot <\/span><span class=\"NormalTextRun SCXW226092053 BCX0\">email <\/span><span class=\"NormalTextRun SCXW226092053 BCX0\">scams<\/span><span class=\"NormalTextRun SCXW226092053 BCX0\"> and how to respond to them.<\/span><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-849e332 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"849e332\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-200319c\" data-id=\"200319c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-593658a elementor-widget elementor-widget-text-editor\" data-id=\"593658a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1><span class=\"TextRun SCXW162363641 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW162363641 BCX0\">Smishing Scam<\/span><\/span><\/h1><p><span class=\"TextRun SCXW162363641 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW162363641 BCX0\">Smishing is a type of phishing <\/span><span class=\"NormalTextRun SCXW162363641 BCX0\">scam<\/span><span class=\"NormalTextRun SCXW162363641 BCX0\"> in which the message is delivered via SMS text message <\/span><span class=\"NormalTextRun SCXW162363641 BCX0\">rather than<\/span><span class=\"NormalTextRun SCXW162363641 BCX0\"> email.<\/span><span class=\"NormalTextRun SCXW162363641 BCX0\"> Smishing SMS attempt<\/span><span class=\"NormalTextRun SCXW162363641 BCX0\">s<\/span><span class=\"NormalTextRun SCXW162363641 BCX0\"> to trick you into <\/span><span class=\"NormalTextRun SCXW162363641 BCX0\">providing<\/span><span class=\"NormalTextRun SCXW162363641 BCX0\"> sensitive information such as credit card details and account passwords, or into granting access to your phone and\/or computer.<\/span><span class=\"NormalTextRun SCXW162363641 BCX0\">\u00a0<\/span><span class=\"NormalTextRun SCXW162363641 BCX0\">According to ACCC <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW162363641 BCX0\">Scamwatch<\/span><span class=\"NormalTextRun SCXW162363641 BCX0\"> data, financial losses from SMS <\/span><span class=\"NormalTextRun SCXW162363641 BCX0\">scams<\/span><span class=\"NormalTextRun SCXW162363641 BCX0\"> have climbed by 188% in 2022, rising from <\/span><span class=\"NormalTextRun SCXW162363641 BCX0\">roughly $2.3 million<\/span><span class=\"NormalTextRun SCXW162363641 BCX0\"> to more than $6.5 million. SMS <\/span><span class=\"NormalTextRun SCXW162363641 BCX0\">scams<\/span><span class=\"NormalTextRun SCXW162363641 BCX0\"> accounted for around 32% of all reported <\/span><span class=\"NormalTextRun SCXW162363641 BCX0\">scams<\/span><span class=\"NormalTextRun SCXW162363641 BCX0\"> in 2022. The SMS\u00a0<\/span><span class=\"NormalTextRun SCXW162363641 BCX0\">could resemble a bank or government <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW162363641 BCX0\">organisation<\/span><span class=\"NormalTextRun SCXW162363641 BCX0\">, such as Centrelink or the Australian Tax Office, or it could resemble a communication from Australia Post concerning a package delivery.<\/span><span class=\"NormalTextRun SCXW162363641 BCX0\">\u00a0You<\/span><span class=\"NormalTextRun SCXW162363641 BCX0\"> m<\/span><span class=\"NormalTextRun SCXW162363641 BCX0\">ay <\/span><span class=\"NormalTextRun SCXW162363641 BCX0\">receive an SMS text that <\/span><span class=\"NormalTextRun SCXW162363641 BCX0\">your account has expired or been locked <\/span><span class=\"NormalTextRun SCXW162363641 BCX0\">due to<\/span><span class=\"NormalTextRun SCXW162363641 BCX0\"> suspicious activity,<\/span><span class=\"NormalTextRun SCXW162363641 BCX0\"> and you must <\/span><span class=\"NormalTextRun SCXW162363641 BCX0\">provide<\/span><span class=\"NormalTextRun SCXW162363641 BCX0\"> personal information or click on a link to reactivate it by entering your personal information such as card numbers, NetBank client numbers, banking passwords, and <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW162363641 BCX0\">NetCodes<\/span><span class=\"NormalTextRun SCXW162363641 BCX0\">.<\/span><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2ec9e93 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2ec9e93\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5be6b5d\" data-id=\"5be6b5d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6d1e57d elementor-widget elementor-widget-text-editor\" data-id=\"6d1e57d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1><strong><span class=\"TextRun SCXW240161828 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW240161828 BCX0\">Vishing Attack<\/span><\/span><\/strong><\/h1>\n<p><span class=\"TextRun SCXW240161828 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW240161828 BCX0\">According to a Commonwealth Bank re<\/span><span class=\"NormalTextRun SCXW240161828 BCX0\">search<\/span><span class=\"NormalTextRun SCXW240161828 BCX0\">, Australians receiv<\/span><span class=\"NormalTextRun SCXW240161828 BCX0\">e<\/span><span class=\"NormalTextRun SCXW240161828 BCX0\"> 4.98 <\/span><span class=\"NormalTextRun SCXW240161828 BCX0\">scam<\/span><span class=\"NormalTextRun SCXW240161828 BCX0\"> calls\/emails\/SMS\/social media communications every week (or <\/span><span class=\"NormalTextRun SCXW240161828 BCX0\">nearly one<\/span><span class=\"NormalTextRun SCXW240161828 BCX0\"> per day, or 258.96 messages per year).<\/span><span class=\"NormalTextRun SCXW240161828 BCX0\">&nbsp;<\/span><span class=\"NormalTextRun SCXW240161828 BCX0\">Vishing, also known as&nbsp;&#8220;voice phishing,&#8221; includ<\/span><\/span><span class=\"TextRun SCXW240161828 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW240161828 BCX0\">es c<\/span><span class=\"NormalTextRun SCXW240161828 BCX0\">ybercriminals calling individuals and impersonating official entities such as financial institutions, government authorities, or technical support personnel. Scammers use deceptive tactics to trick victims into <\/span><span class=\"NormalTextRun SCXW240161828 BCX0\">disclosing<\/span><span class=\"NormalTextRun SCXW240161828 BCX0\"> personal information, granting access to their accounts, or <\/span><span class=\"NormalTextRun SCXW240161828 BCX0\">initiating<\/span><span class=\"NormalTextRun SCXW240161828 BCX0\"> financial transactions.<\/span><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6aff5c0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6aff5c0\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-56eee56\" data-id=\"56eee56\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bd9596d elementor-widget elementor-widget-text-editor\" data-id=\"bd9596d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1><span class=\"TextRun SCXW153111036 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW153111036 BCX0\">Malware-Based Phishing<\/span><\/span><\/h1><p><span class=\"TextRun SCXW153111036 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW153111036 BCX0\">According to the State of the Phish report, 83% of survey respondents reported at least one successful email-based phishing attempt in 2021, <\/span><span class=\"NormalTextRun SCXW153111036 BCX0\">representing<\/span><span class=\"NormalTextRun SCXW153111036 BCX0\"> a 46% increase over 2020.<\/span>\u00a0<\/span><span style=\"background-color: var( --e-global-color-6758e1c );\">Through emails or text messages, these scams trick people into downloading malware by giving them malicious attachments or links. The malware can compromise security, obtain data, or give the attacker unauthorised access once it has been activated on the victim&#8217;s device. These phishing attempts also make use of deceptive pop-up windows or warnings that indicate the user&#8217;s system needs to be updated immediately. By clicking on these prompts, you risk having malware put on your computer or mobile device.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-71adc32 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"71adc32\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1ecf14f\" data-id=\"1ecf14f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-72f0032 elementor-widget elementor-widget-text-editor\" data-id=\"72f0032\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1>Preventive Measures<\/h1><p>Protecting businesses from phishing scams is crucial to safeguard sensitive information, maintain trust with customers, and preventing financial losses.\u00a0<\/p><p><span lang=\"EN-US\" style=\"--tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-scroll-snap-strictness: proximity; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgb(59 130 246 \/ 0.5); --tw-ring-offset-shadow: 0 0 #0000; --tw-ring-shadow: 0 0 #0000; --tw-shadow: 0 0 #0000; --tw-shadow-colored: 0 0 #0000; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; white-space-collapse: preserve; background-color: var( --e-global-color-6758e1c ); margin: 0px; padding: 0px; user-select: text; -webkit-user-drag: none; -webkit-tap-highlight-color: transparent; color: #000000; font-size: 18pt; line-height: 30.2167px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSFontService, sans-serif;\" xml:lang=\"EN-US\" data-contrast=\"none\">\ud83d\udcda<\/span> <strong style=\"color: var( --e-global-color-text ); font-size: 1rem; background-color: var( --e-global-color-6758e1c );\">Educate employees:<\/strong><span style=\"color: var( --e-global-color-text ); font-size: 1rem; background-color: var( --e-global-color-6758e1c );\"> Provide comprehensive training to help employees recognize suspicious emails, links, and attachments. Teach them to scrutinise sender addresses, identify grammatical errors, and avoid clicking on unfamiliar links.<\/span><\/p><p><span lang=\"EN-US\" style=\"background-color: var( --e-global-color-6758e1c ); margin: 0px; padding: 0px; user-select: text; -webkit-user-drag: none; -webkit-tap-highlight-color: transparent; --tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-scroll-snap-strictness: proximity; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgb(59 130 246 \/ 0.5); --tw-ring-offset-shadow: 0 0 #0000; --tw-ring-shadow: 0 0 #0000; --tw-shadow: 0 0 #0000; --tw-shadow-colored: 0 0 #0000; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; color: #000000; white-space-collapse: preserve; font-size: 18pt; line-height: 30.2167px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSFontService, sans-serif;\" xml:lang=\"EN-US\" data-contrast=\"none\">\ud83d\udd10<\/span><span style=\"background-color: var( --e-global-color-6758e1c ); margin: 0px; padding: 0px; user-select: text; -webkit-user-drag: none; -webkit-tap-highlight-color: transparent; --tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-scroll-snap-strictness: proximity; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgb(59 130 246 \/ 0.5); --tw-ring-offset-shadow: 0 0 #0000; --tw-ring-shadow: 0 0 #0000; --tw-shadow: 0 0 #0000; --tw-shadow-colored: 0 0 #0000; color: #000000; white-space-collapse: preserve; font-size: 18pt; line-height: 30.2167px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSFontService, sans-serif;\" data-ccp-props=\"{}\">\u00a0<\/span><strong style=\"background-color: var( --e-global-color-6758e1c ); color: var( --e-global-color-text ); font-size: 1rem;\">Strong passwords and authentication:<\/strong><span style=\"background-color: var( --e-global-color-6758e1c ); color: var( --e-global-color-text ); font-size: 1rem;\"> Encourage employees to create unique, strong passwords and regularly update them. Implement two-factor authentication (2FA) or multi-factor authentication (MFA) for added security.<\/span><\/p><p><span style=\"background-color: rgba(0, 0, 0, 0); color: #000000; font-family: WordVisi_MSFontService, Roboto, Roboto_EmbeddedFont, Roboto_MSFontService, sans-serif; font-size: 24px; font-variant-ligatures: no-common-ligatures no-discretionary-ligatures no-historical-ligatures no-contextual; -webkit-text-fill-color: #000000; -webkit-text-stroke-color: #000000; caret-color: #000000; white-space-collapse: preserve;\">\ud83d\udd0e <\/span><strong style=\"color: var( --e-global-color-text ); font-size: 1rem; background-color: var( --e-global-color-6758e1c );\">Email filters and spam protection:<\/strong><span style=\"color: var( --e-global-color-text ); font-size: 1rem; background-color: var( --e-global-color-6758e1c );\"> Implement filters and mechanisms to reduce phishing emails in employees&#8217; inboxes and block suspicious messages.<\/span><\/p><p><span lang=\"EN-US\" style=\"background-color: var( --e-global-color-6758e1c ); margin: 0px; padding: 0px; user-select: text; -webkit-user-drag: none; -webkit-tap-highlight-color: transparent; --tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-scroll-snap-strictness: proximity; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgb(59 130 246 \/ 0.5); --tw-ring-offset-shadow: 0 0 #0000; --tw-ring-shadow: 0 0 #0000; --tw-shadow: 0 0 #0000; --tw-shadow-colored: 0 0 #0000; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; color: #000000; white-space-collapse: preserve; font-size: 18pt; line-height: 30.2167px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSFontService, sans-serif;\" xml:lang=\"EN-US\" data-contrast=\"none\">\ud83d\udee1\ufe0f<\/span><span style=\"background-color: var( --e-global-color-6758e1c ); margin: 0px; padding: 0px; user-select: text; -webkit-user-drag: none; -webkit-tap-highlight-color: transparent; --tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-scroll-snap-strictness: proximity; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgb(59 130 246 \/ 0.5); --tw-ring-offset-shadow: 0 0 #0000; --tw-ring-shadow: 0 0 #0000; --tw-shadow: 0 0 #0000; --tw-shadow-colored: 0 0 #0000; color: #000000; white-space-collapse: preserve; font-size: 18pt; line-height: 30.2167px; font-family: Roboto, Roboto_EmbeddedFont, Roboto_MSFontService, sans-serif;\" data-ccp-props=\"{}\">\u00a0<\/span><strong style=\"background-color: var( --e-global-color-6758e1c ); color: var( --e-global-color-text ); font-size: 1rem;\">Ongoing security awareness training:<\/strong><span style=\"background-color: var( --e-global-color-6758e1c ); color: var( --e-global-color-text ); font-size: 1rem;\"> Conduct regular training sessions to reinforce best practices, inform employees about emerging phishing techniques, and keep security protocols up to date.<\/span><\/p><p><span style=\"background-color: rgba(0, 0, 0, 0); color: #000000; font-family: WordVisi_MSFontService, Roboto, Roboto_EmbeddedFont, Roboto_MSFontService, sans-serif; font-size: 24px; font-variant-ligatures: no-common-ligatures no-discretionary-ligatures no-historical-ligatures no-contextual; -webkit-text-fill-color: #000000; -webkit-text-stroke-color: #000000; caret-color: #000000; white-space-collapse: preserve;\">\ud83d\udea9 <\/span><strong style=\"color: var( --e-global-color-text ); font-size: 1rem; background-color: var( --e-global-color-6758e1c );\">Cultivate a reporting culture:<\/strong><span style=\"color: var( --e-global-color-text ); font-size: 1rem; background-color: var( --e-global-color-6758e1c );\"> Foster an environment where employees feel comfortable reporting suspicious emails or incidents promptly. Establish clear reporting channels and investigate reported incidents promptly.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<div class='watch-action'><div class='watch-position align-left'><div class='action-like'><a class='lbg-style3 like-31654 jlk' href='javascript:void(0)' data-task='like' data-post_id='31654' data-nonce='3c6d52cef8' rel='nofollow'><img class='wti-pixel' src='https:\/\/www.cos.net.au\/c\/wp-content\/plugins\/wti-like-post\/images\/pixel.gif' title='Did you find this useful?' \/><span class='lc-31654 lc'>+3<\/span><\/a><\/div><div class='action-unlike'><a class='unlbg-style3 unlike-31654 jlk' href='javascript:void(0)' data-task='unlike' data-post_id='31654' data-nonce='3c6d52cef8' rel='nofollow'><img class='wti-pixel' src='https:\/\/www.cos.net.au\/c\/wp-content\/plugins\/wti-like-post\/images\/pixel.gif' title='' \/><span class='unlc-31654 unlc'>0<\/span><\/a><\/div> <\/div> <div class='status-31654 status align-left'><\/div><\/div><div class='wti-clear'><\/div>","protected":false},"excerpt":{"rendered":"<p>Australia, like many other countries, has seen a worrying increase in phishing scams.&nbsp;According to Scamwatch, Australians lost over AU$476 million to scams in 2023. Investment scams led to the most significant financial losses, totaling just over AU$291 million, despite only 8,159 reports being filed. In contrast, phishing scams were much more prevalent, with over 108,000 &#8230; <a title=\"A Complete Guide to Recognising Phishing Scams in Australia\" class=\"read-more\" href=\"https:\/\/www.cos.net.au\/c\/cospedia\/recognising-phishing-scams-in-australia\" aria-label=\"Read more about A Complete Guide to Recognising Phishing Scams in Australia\">Read more<\/a><\/p>\n","protected":false},"author":6,"featured_media":32062,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7,8],"tags":[3006,2650,3003,1889,293,2060,258,260,262,1892,2638,2643,2634,2636,3007,2635,2644,2646,3004,3009,3005],"class_list":["post-31654","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cospedia","category-productivity","tag-australia-phishing-scams","tag-business-email-compromise","tag-clone-phishing","tag-cybercriminals","tag-data-breach-notification-laws","tag-data-loss","tag-data-privacy","tag-data-regulation","tag-data-security-threats","tag-databreach","tag-email-compromise","tag-incentive-scams","tag-phishing-scam","tag-phishing-scams","tag-phishing-scams-in-australia","tag-protect-business-from-scams","tag-scam-reports","tag-scammers","tag-spear-phishing","tag-types-of-phishing-scams","tag-vishing-scam"],"_links":{"self":[{"href":"https:\/\/www.cos.net.au\/c\/wp-json\/wp\/v2\/posts\/31654","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cos.net.au\/c\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cos.net.au\/c\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cos.net.au\/c\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cos.net.au\/c\/wp-json\/wp\/v2\/comments?post=31654"}],"version-history":[{"count":102,"href":"https:\/\/www.cos.net.au\/c\/wp-json\/wp\/v2\/posts\/31654\/revisions"}],"predecessor-version":[{"id":43582,"href":"https:\/\/www.cos.net.au\/c\/wp-json\/wp\/v2\/posts\/31654\/revisions\/43582"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cos.net.au\/c\/wp-json\/wp\/v2\/media\/32062"}],"wp:attachment":[{"href":"https:\/\/www.cos.net.au\/c\/wp-json\/wp\/v2\/media?parent=31654"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cos.net.au\/c\/wp-json\/wp\/v2\/categories?post=31654"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cos.net.au\/c\/wp-json\/wp\/v2\/tags?post=31654"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}