Scan the above QR code to download and install our App on your Android or iOS device.
Hacking
Hacking occurs when a scammer gains access to your personal information
by using technology to break into your computer, mobile device or network.
1. Common examples of hacking methods
Common examples of hacking methods
Once scammers have hacked your computer or mobile device they
can access your personal information, change your passwords, and restrict
access to your system. They will use the information they obtain to commit
fraudulent activities, such as identity theft or they could obtain direct
access to your banking and credit card details.
Warning Signs
Protect Yourself
Have you been scammed?
If you think you have provided your account details, passport, tax file number, licence, Medicare or other personal identification details to a scammer, contact your bank, financial institution, or other relevant agencies immediately.
We encourage you to report scams to the ACCC via the report a scam page. This helps us to warn people about current scams, monitor trends and disrupt scams where possible.
We also provide guidance on protecting yourself from scams and where to get help.
Spread the word to your friends and family to protect your personal & financial information online.
Identity Theft
Identity theft is a type of fraud that involves using someone else’s identity to steal money or gain other benefits.
1. Common methods of identity theft
2. What scammers do with your personal information
With your personal information, scammers can:
Before stealing your identity scammers will target your personal information. Watch out for the following signs.
· You are unable to log into your social media or email account, or your profile has been logged into from an unusual location.
· You are refused a financial service or an application for a loan or your credit card has been declined.
· You receive bills, invoices or receipts addressed to you for goods or services you didn’t purchase yourself.
· You are contacted by businesses or individuals who believe they have been dealing with you even though you have had no contact with them.
·
If you think you have provided your account details, passport, tax file number, licence, Medicare or other personal identification details to a scammer, contact your bank, financial institution, or other relevant agencies immediately.
You can also contact IDCARE – a free government-funded service which will work with you to develop a specific response plan to your situation and support you through the process. Visit the IDCARE website or call 1800 595 160 (if in Australia) or 0800 121 068 (if in New Zealand), or use their free Cyber First Aid Kit.
We encourage you to report scams to the ACCC via the report a scam page. This helps us to warn people about current scams, monitor trends and disrupt scams where possible. Please include details of the scam contact you received, for example, email or screenshot.
Phishing
Phishing scams are attempts by scammers to trick you into giving out personal information such as your bank account numbers, passwords and credit card numbers.
A scammer contacts you pretending to be from a legitimate business such a bank, telephone or internet service provider. You may be contacted by email, social media, phone call, or text message.
Clues for spotting a fake email
The scammer asks you to provide or confirm your personal details. For example, the scammer may say that the bank or organisation is verifying customer records due to a technical error that wiped out customer data. Or, they may ask you to fill out a customer survey and offer a prize for participating.
Alternatively, the scammer may alert you to ‘unauthorised or suspicious activity on your account’. You might be told that a large purchase has been made in a foreign country and asked if you authorised the payment. If you reply that you didn’t, the scammer will ask you to confirm your credit card or bank details so the ‘bank’ can investigate. In some cases the scammer may already have your credit card number and ask you to confirm your identity by quoting the 3 or 4 digit security code printed on the card.
Phishing messages are designed to look genuine, and often copy the format used by the organisation the scammer is pretending to represent, including their branding and logo. They will take you to a fake website that looks like the real deal, but has a slightly different address. For example, if the legitimate site is ‘www.realbank.com.au‘, the scammer may use an address like ‘www.reallbank.com‘.
If you provide the scammer with your details online or over the phone, they will use them to carry out fraudulent activities, such as using your credit cards and stealing your money.
If you think you have provided your account details to a scammer, contact your bank or financial institution immediately.
We encourage you to report scams to the ACCC via the report a scam page. This helps us to warn people about current scams, monitor trends and disrupt scams where possible. Please include details of the scam contact you received, for example, email or screenshot.
We also provide guidance on protecting yourself from scams and where to get help.
Spread the word to your friends and family to protect them.
Remote Access Scams
Remote access scams try to convince you that you have a computer or internet problem and that you need to buy new software to fix the problem.
How this scam works
The scammer will phone you and pretend to be a staff member from a large telecommunications or computer company, such as Telstra, the NBN or Microsoft. Alternatively they may claim to be from a technical support service provider.
They will tell you that your computer has been sending error messages or that it has a virus. They may mention problems with your internet connection or your phone line and say this has affected your computer’s recent performance. They may claim that your broadband connection has been hacked.
The caller will request remote access to your computer to ‘find out what the problem is’.
The scammer may try to talk you into buying unnecessary software or a service to ‘fix’ the computer, or they may ask you for your personal details and your bank or credit card details.
The scammer may initially sound professional and knowledgeable—however they will be very persistent and may become abusive if you don’t do what they ask.
You don’t have to be a Telstra or Microsoft customer to be called by these scammers. You don’t even have to own a computer!
Warning signs
Protect yourself
Note: Many legitimate use remote access programs such as Teamviewer & Log Me In. It is quite safe to use these programs if you are sure who you are dealing with.
Have you been scammed?
If you have given remote access to your computer, or you fear that your computer has been hacked, seek help or advice from a qualified and reputable computer technician.
If you think you have provided your account details to a scammer, contact your bank or financial institution immediately.
We encourage you to report scams to the ACCC via the report a scam page. This helps us to warn people about current scams, monitor trends and disrupt scams where possible.
We also provide guidance on protecting yourself from scams and where to get help.
Spread the word to your friends and family to protect them.