A number of Australian businesses have been forced to close down due to losses sustained in a social engineered email scam, the Australian Cyber Security Centre has revealed. The scammers have made more than $700,000with the approach. The largest amount lost by a firm to date has been $170,000, with average losses somewhere between $30,000 and $100,000. Using spoofed domains, emails and signature blocks of legitimate executives of universities or large Australian enterprises, the scammers approach SMEs requesting quotes and delivery of IT equipment. If the SME responds to the quote request, the scammers attempt to gain credit by either delaying payment through excuses, or requesting payment on the invoice on 30 or 14 days credit. Once the order is agreed, the victim organisation is directed to send the goods to an Australian freight forwarding company and handed-off to another scammer who manages the delivery phase. “The name on the delivery contact is almost always different to the original scammer,” the ACSC said. The scammers then attempt to scam the freight company, by providing payment through stolen credit cards or on credit. “They request shipment to a number of different locations overseas, such as Dagenham, UK, Deira, Dubai, Kuala Lumpur, Malaysia and Singapore,” the ACSC added. An example scam email was given by the ACSC, which appeared to be sent by the University of Sydney’s chief procurement officer, requesting a quote for laptops, projectors and drones. Technical goods such as defibrillators and environmental, gas and electrical monitoring equipment have also featured in the scammer’s requests. One spoof domain change used lendleases.com.auinstead oflendlease.com.au the ACSC said. “Once dispatched, there is little chance of recovery,” the centre noted. The ACSC warned SMEs not to trust cold callers and to do due diligence on new customers. “Always check the domain; contact the company by phone and confirm the order and the contact are genuine; check the Purchase Order carefully, there are often obvious mistakes; validate the customer before providing any credit; and confirm that the delivery address is a genuine address for that company,” they said. Related content opinion Website spoofing: risks, threats, and mitigation strategies for CIOs In this article, we take a look at how CIOs can tackle website spoofing attacks and the best ways to prevent them. By Yash Mehta Dec 01, 2023 5 mins CIO Cyberattacks Security brandpost Sponsored by Catchpoint Systems Inc. Gain full visibility across the Internet Stack with IPM (Internet Performance Monitoring) Today’s IT systems have more points of failure than ever before. Internet Performance Monitoring provides visibility over external networks and services to mitigate outages. By Neal Weinberg Dec 01, 2023 3 mins IT Operations brandpost Sponsored by Zscaler How customers can save money during periods of economic uncertainty Now is the time to overcome the challenges of perimeter-based architectures and reduce costs with zero trust. By Zscaler Dec 01, 2023 4 mins Security feature LexisNexis rises to the generative AI challenge With generative AI, the legal information services giant faces its most formidable disruptor yet. That’s why CTO Jeff Reihl is embracing and enhancing the technology swiftly to keep in front of the competition. By Paula Rooney Dec 01, 2023 6 mins Generative AI Digital Transformation Cloud Computing Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe