Australia, June 13, 2022 — Avast (LSE:AVST), a global leader in digital security and privacy is warning Australians to be extra vigilant over the coming months to avoid falling victim to a tax time scammer.
People right across the country will be looking to lodge their tax claims in the next months, giving cybercriminals a prime opportunity to seize, intercept and execute tax-related scams. Often, these scammers pose as someone you know – or an institution you use – and offer an easy “fix” to a problem you have in an official-sounding way or even give the victim a sense of urgency that they must hand over their information to be cleared of a financial issue.
Stephen Kho, cyber security expert at Avast says, “We know these scams have been prevalent in high numbers over the last few years, so it’s important to be on the front foot and know what to look out for when it comes to identifying fraudulent activity online, especially around tax time where we are having conversations around finances with various institutions.”
“Cybercriminals are always looking for new ways to steal your data, personal details or money through increasingly sophisticated scams and online threats and the timeliness hook of tax time helps them seem more legitimate.”
Stephen has shared three examples of prevalent tax scams to look out for, plus ways to avoid them.
How to avoid this scam:
These scams work by impersonating a trustworthy and reputable company or individual to gain access to information such as usernames, passwords or credit card numbers.
In an Australian Taxation Office (ATO) phishing attack, the recipient will typically receive an “urgent” email, SMS or automated phone call claiming to be from the ATO with instructions to follow a link to log in or make a payment on an outstanding tax debt.
How to avoid this scam:
In a business email compromise scam, attackers target those with financial-related roles and sometimes even employees. They then send emails asking for copies of payroll details or PAYG payment summary forms, which include all the personal information a cybercriminal would need to steal someone's identity. These emails start with a friendly greeting before getting to the request, attempting to put those targeted at ease before asking for the forms or details.