Home / Linux / Phone scammers impersonating the Australian Cyber Security Centre

Phone scammers impersonating the Australian Cyber Security Centre

What’s happened?

Telephone scams – where people pretend to be from a reputable organisation to try to get access to your computer and your bank account – are a constant threat.

We are aware of a telephone scam where people call pretending to be from the Australian Cyber Security Centre to seek your help to act against cyber criminals.

The scammers ask you to enter a URL in your web browser and provide your bank account details, and sometimes they try to entice you to transfer money – in one case, scammers asked for $20,000 to be transferred.

These types of scams are known as ‘remote access scams’ or ‘impersonation scams’ where scammers try to coax individuals into actions that could compromise computers or reveal bank information.

The Australian Cyber Security Centre will never contact you by phone to request access to your computer, ask you to install software, transfer money or request financial information.

What to do if the scammer calls you

If you get an unexpected telephone call from someone claiming to represent the Australian Cyber Security Centre who says your computer has been infected or hacked, hang up immediately.

Never give anyone your personal information such as your bank account number, credit card details or passwords.

More information

If you have been a victim of a cybercrime, report it to the Australian Cybercrime Online Reporting Network (ACORN).

Contact IDCare if you’ve experienced identity theft.

To report a cyber security incident, email the ACSC at asd.assist [at] defence.gov.au or call 1300 CYBER1 (1300 292 371).

Read more about technical support scams (or ‘remote access scams’) – including what to do if you have given personal information to a scammer.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.

x

Check Also

What Are Injection Attacks | Acunetix

What is Code Injection | Acunetix

Code Injection or Remote Code Execution (RCE) enables the attacker to execute malicious code as ...