Essential Steps To Complete Now – Dealing With Fraud, Takeovers, & Scams

Are you a victim of an online scam or fraud?

In the wake of all the cyber & data breaches that occurred in 2022 from Optus, Medibank, Telstra, and many others, there’s a lot of exposed breach data that is ripe for the picking, hence why it’s so important to know what to do and how to respond if you’ve been hit.

When you get directly impacted by cyber crime – it can feel very scary and unnerving. Knowing what to do, and how to protect yourself quickly becomes critical – hence why I’ve shared this information.

I know a lot of people who have been at the receiving end of a scam or fraud… so have a lot of stories and tips to share.

I’ve provided details to cover two scenarios – “victim response” info for those who are already a victim of a scam (focused on Australian victims specifically), and secondly info for those who have not yet been hit, but want to know more about some of the common techniques that hackers and fraudsters might use against you from a personal fraud / identity takeover perspective.

I’ve tried to provide as much practical advice as possible, however feel free to contact me directly if you need more specific advice or guidance.

If you’re a victim – don’t feel embarrassed, or that you’re stupid….  the reality these days is that the scammers are very slick, well rehearsed, and professional – and have their techniques down to a fine art.

Cyber criminals can convince the smartest of people into becoming victims of a number of social engineering tricks and cons.

This is the important bit…

By you understanding cyber criminal techniques, you will be able to better protect yourself, identify when an identity takeover or fraud is occurring, and most importantly know how best to respond in the event of an incident directly impacting you, your partner, or family.

Information worth sharing with your family and friends, so make sure you use the social sharing buttons at the bottom of this page.

Indications of an identity takeover / fraud:

Online identity takeovers & related fraud is something that no one wants to go through. Let me reveal some indications that you are a victim, so that you can better prepare yourself.

Some are obvious, some not so much. I’m not saying that all of these will be the case, however they are pretty good clues that you might be a victim already:

  1. You receive numerous SMS messages on your mobile phone relating to logins / multi-factor codes that you didn’t request.

2. Friends / colleagues get in touch to let you know that they’ve received unusual emails from you, that contain links or attachments that you don’t know about. If you’re lucky enough to still have access to your compromised email account, you may find it weird that you can’t see any recent sent items, or any emails received. That’s because in some cases, the hackers have set up email ‘rules’ on your account to automatically delete, forward, or move messages sent & received so you can’t see what they’ve done or are doing.

3. You’ve received a phone call to your home phone number or mobile allegedly from Microsoft or another large IT organisation informing you that there’s an issue with your computer. They’ve been trying to contact you by email, and you computer needs sorting…. yeah right! After a few tricks on your machine to convince you that there’s an issue and that the call is authentic, they’ll trick you into giving them your credit card details, driving license, mobile phone details, and / or installing remote software to enable them to connect to “fix” your computer.

They often scare victims by making out your machine has malware / or a virus. They might say that you’ve got some pirated software, or illegal movies (as many people do)!  Some simple tricks include getting victims to confirm they are running Microsoft Windows, and then ask you to hit the Windows “home” button on the machine and type in the command ‘eventvwr’ – whereby they show you a number of highly technical error messages and warnings to trick you into thinking that the issue is real, and the caller is legit. This command runs an event viewer on every version of Windows, and all machines always have some error or warning messages even if your computer seems to be running just fine… it doesn’t mean that you have a problem!

They might convince you to pay for some ‘security’ software using your credit card, and / or to confirm your details with a scan of your driving license. In some cases, they’ll get you to install common remote access tools such as Teamviewer, UltraVNC, or LogMeIn, so that they can remotely connect to your machine and search it for personal documents, scans of driving licenses or passports, or anything that they can use to defraud you.

Microsoft and other large organisations will never contact you like this, so in future if you do receive a call like this just tell them that you know it’s a scam, and you’re reporting them to the police. They’ll move on to the next easier target.

4. You’re not able to access your online accounts, due to password changes you didn’t make. Gulp.

5. You receive messages or calls from your bank or credit card companies, requesting confirmation of unusual transactions that you are not aware of.

6. You receive a text message on your mobile phone informing you that your phone number is about to be “ported” to another service provider, and before you have a chance to do something about it, you can no longer make or receive mobile phone calls. What is going on?!?!…

This is a common technique used by fraudsters, where they use your personal information to request a transfer of your mobile phone service to another provider’s SIM card, and mobile phone in their possession. Why?.. Once the port is complete, they then use your mobile phone number configured on their device to receive SMS codes you may have set up with your bank as a form of second factor (often used for new payee or funds transfers).

Victim response –  what should you do if you’ve been a victim of identity takeover or fraud?

If you believe that you have been a potential victim of an online scam or fraud, it’s best to take action really quickly. The faster the response, the better the chance of minimising the damage & impact to you:

  1. Contact your bank(s) and financial institution(s) asap to inform them that you think you may be the victim of fraud / identity take-over, and ensure you set up a 2nd form of identification or security question for future contact with them.
  2. Change the passwords of ALL your online accounts (and do so only on another device which you’re confident is malware free, fully patched, running up-to-date security software) ensuring you don’t re-use an old password…. sorry to be an inconvenience, however this includes ALL of your accounts…. so your online web mail accounts, your banking and financial accounts, your social media accounts…. etc.
  3. Use a password manager, to create unique, strong complex passwords.
  4. Set up multi-factor across ALL of your accounts. Ideally if the platform / service you use provides strong multi-factor such as Google Authenticator then use that rather than SMS (which is easy as a hacker to get around). This adds an additional layer of protection on your account, so that even if they know your username and password, they still can’t get any further.
  5. If your personal computer has potentially been infected, or you were convinced by the scammer to allow them to remotely connect to your computer, or install software under their instruction, then stop using that computer completely. Ensure you disconnect it from your home network, and prevent it from connecting to the internet asap. You will need to keep the potentially infected machine isolated off your home network, and will need to re-install the operating system before using again. See the malware clean up section below.
  6. Report your incident to Australian Cyber-crime : This is a secure reporting and referral service for cyber-crime and online incidents in Australia.
  7. In Australia, you should also report the incident to ScamWatch:
  8. When possible, provide a written statement at your local police station.
  9. Physically secure your mailbox at home, or alternatively arrange for your mail to be delivered to a secure mailbox or PO box through Australia Post. Fraudsters will try to get hold of utility bills, bank statements, super details so that they have enough info to gain access to your accounts to transfer money out, or to set up new bank accounts, loans, credit cards etc in your name.
  10. Contact IDCARE to assess your risks and build a tailored response plan. IDCare has a wealth of information that can assist Australian and New Zealand victims of identity theft:

Summary of proactive steps to protect yourself from future identity takeovers & fraud:

  1. Ensure you use unique and strong complex passwords for all of your online accounts. Consider using a password manager to do this easily for you. Here’s an article covering the best password managers out there.
  2. Don’t share any of your user credentials.
  3. Make use of strong multi-factor authentication for your key accounts, so that even if your account is compromised, the fraudster will not be able to circumvent this additional protection in place.
  4. Contact your mobile phone service provider, and ask them to confirm that they have blocked the option to port your mobile phone to another provider.
  5. Consider using a PO box or secure mailbox so that your physical mail cannot be easily stolen.
  6. Don’t store or send scans / photos of your driving license, credit cards, passport etc in your email account(s). Never provide your driving license, birth certificate etc to anyone.
  7. Ensure you have set up a 2nd validation / security password with your banks and financial institutions, so that if a fraudster gets hold of your personal & account details, you are still protected.
  8. Many frauds often start with a phishing email. Remember that banks and financial institutions will never send you an email asking you to click on a link and confirm your bank details. Learn how to spot and report a phishing email if you receive one.
  9. Look into your security “hygiene” at home – make sure all of your personal computers and mobile devices are always up-to-date, fully patched, and that you’re running up-to-date antivirus software in order to minimise the potential for malware infection. You also might want to consider what you do to securely back up your important documents and files, and store them offline (e.g. a handful of USB drive that aren’t plugged in to your machine).

Cleaning up your infected computer?

If you’re computer has been infected with malware, or you installed software under the direction of a scammer, don’t bother trying to clean up after the event. You need a fresh install of your computer’s operating system. No other option ensures that your computer is clean. A hard fact to swallow – however be aware that your favorite security software cannot detect every type of malware out there.

You cannot rely on it to completely clean your machine… re-installing the operating system is the only way.

Not so painful these days if you’re running Windows 10 or OSX, however is a vital step to take if you are a victim. Scanning for viruses and cleaning up is not a guaranteed way of removing everything. Disconnect your computer from your home network, or just switch off your internet router to cut all connections,  and perform a full operating system reset, and rebuild.  This guarantees that your machine is free from infection.

Windows re-install instructions are here, and Apple OSX instructions are here. Ensure you install your security software as soon as you have a clean version of the operating system installed, and ensure all patches are installed on your Windows 10 device, or Apple OSX computer before use.

Feel free to contact me directly if you have any issues, or need more help.

Latest articles

Related articles

Keep learning - get cyber advice from Phil Hall

Keep learning - get cyber advice from Phil Hall

Automatically receive the very latest cyber security info & advice by providing your email address:

You have successfully subscribed to