skip to log on skip to main content
VoiceOver users please use the tab key when navigating expanded menus

Latest scams, fraud and security alerts

Stay informed on the latest scams, fraud, and security alerts. Learn about emerging cyber threats and important online risks as they arise. If you are a business, make sure to stay updated with the latest business security alerts  that could impact you.

Explore the latest alerts below, and make informed decisions to help keep your personal and banking details safe.
 

 November 2025

Latest alerts scam email

 Posted on 27 November 2025

Fake government emails

Type:  

Scammers are sending extremely convincing fake emails pretending to be from Services Australia and Centrelink. These scams have already hit over 270,000 inboxes nationwide targeting a wide range of organisations including schools, hospitals, law firms, corporations, and even government agencies.

The emails look real and often mention various Australian benefit systems like Superannuation or Family Tax Benefits. These emails are mostly written and sent using various techniques to avoid security or spam filters.

They deceive people into clicking links and entering personal details, which can lead to identity theft, account compromise, or even ransomware attacks.

 

  • Be cautious of unexpected emails or SMS messages, or phone calls, and do not click on any links, or open any attachments.
  • Contact your provider/bank immediately on a listed number if you receive a message from someone saying your account or reward points is at risk, under review, or locked or if you enter personal details into a link that you suspect is a scam.
  • Do not share personal or financial details, and never provide your passwords, account numbers, or one-time passcodes to anyone.
  • Always pause and reassess the situation. Scammers often create a sense of urgency, pressuring you to act quickly.

For more information about bank impersonation scams, visit ANZ Security Hub – types of scams – bank impersonation scams

If you suspect fraud on your account or have shared financial information or transferred money as a result of this scam, please contact us straightaway. Our Customer Protection Team is available 24/7 to help you.

You can also report scams to the Australian Government’s Scamwatch and the Australian Cyber Security Centre’s ReportCyber.

Latest alerts scam SMS

 Posted on 13 November 2025

ANZ Rewards SMS Scam

Type:  

A scam has been identified where individuals are receiving SMS messages impersonating ANZ Rewards. These messages may claim that rewards points are about to expire and include a link to redeem them.

Be cautious of SMS messages, emails or phone calls, claiming to be from ANZ. They may ask you to log in to your account through a link, provide sensitive banking details, download software, transfer money or open another account.

Remember, we will never ask you to:

  • share sensitive banking details (like passwords, PINs, ANZ Shield codes, token codes, or one-time passcodes for payment).
  • click a link to log in to your account.
  • grant remote access to your computer, phone, tablet (or any other mobile device).
  • transfer money to another account.

 

  • Be cautious of unexpected emails or SMS messages, or phone calls, and do not click on any links, or open any attachments.
  • Contact your provider/bank immediately on a listed number if you receive a message from someone saying your account or reward points is at risk, under review, or locked or if you enter personal details into a link that you suspect is a scam.
  • Do not share personal or financial details, and never provide your passwords, account numbers, or one-time passcodes to anyone.
  • Always pause and reassess the situation. Scammers often create a sense of urgency, pressuring you to act quickly.

For more information about bank impersonation scams, visit ANZ Security Hub – types of scams – bank impersonation scams

If you suspect fraud on your account or have shared financial information or transferred money as a result of this scam, please contact us straightaway. Our Customer Protection Team is available 24/7 to help you.

You can also report scams to the Australian Government’s Scamwatch and the Australian Cyber Security Centre’s ReportCyber.

 Business alerts

Latest alerts critical vulnerability

 Posted on 06 November 2025

Information Stealer Malware alert from the Australian Signals Directorate's Australian Cyber Security Centre (ASD's ACSC)

Type:  

ASD’s ACSC has identified corporate network breaches that started in employees accessing work resources or systems from personal devices infected with malware called information stealers.

Info stealers, are a type of malware designed to collect information from a victim’s device.

Organisations that allow employees, contractors, managed service providers or other entities to access their network remotely, including with Bring Your Own Device (BYOD) hardware, need to be aware of the risks and protect themselves from this threat.
 

 

ASD’s ACSC recommends organisations focus on implementing controls to protect themselves from the risk of info stealers targeting user credentials. These mitigations include:

  • Secure corporate accounts (e.g. administrator privileges and multi-factor authentication (MFA))
  • Harden enterprise mobility like (e.g. Bring Your Own Device (BYOD) policies)
  • Review and assess supply chain risks from vendors accessing your networks, including Software-as-a-Service (SaaS) vendors and Managed Service Providers

For more information, please read the Australian Cyber Security Centre’s advisory, The silent heist: cybercriminals use information stealer malware to compromise corporate networks

Latest alerts critical vulnerability

 Posted on 27 October 2025

Critical alert from the Australian Signals Directorate's Australian Cyber Security Centre (ASD's ACSC)

Type:  

The ASD's ACSC has published a critical alert regarding the following vulnerability in the Microsoft Windows Server Update Service:

  • CVE-2025-59287: This vulnerability involves deserialisation of untrusted data in WSUS, which could enable an unauthenticated actor to achieve remote code execution with system privileges.

The vulnerability impacts Microsoft Windows Server Update Service in Windows Server (2012, 2016, 2019, 2022 and 2025). 

 

ASD’s ACSC recommends affected organisations should:

  • review their networks for use of vulnerable instances of the Windows Server Update Service (WSUS); and
  • consult the Microsoft Security Update guide for mitigation advice.

For more information, please read the ASD’s ACSC alert, Critical vulnerability in Microsoft Windows Server Update Service (WSUS).

Latest alerts critical vulnerability

 Posted on 17 October 2025

Critical alert from the Australian Signals Directorate's Australian Cyber Security Centre (ASD's ACSC)

Type:  

The ASD's ACSC has published a critical alert regarding multiple high-severity vulnerabilities in F5 products and an incident impacting F5.

According to the ASD’s ACSC, F5 have released an advisory regarding a cyber security incident that has affected certain F5 systems with recommendation on what customers can do to help protect themselves.

In addition to this advisory, F5 has issued its October 2025 quarterly security notification summarising multiple critical vulnerabilities identified across its product portfolio.

 

ASD’s ACSC recommends affected organisations:

For more information, please read the ASD’s ACSC alert, Multiple high-severity vulnerabilities in F5 products and incident impacting F5.

Latest alerts critical vulnerability

 Posted on 29 September 2025

Critical alert from the Australian Signals Directorate's Australian Cyber Security Centre (ASD's ACSC)

Type:  

The ASD's ACSC has published a critical alert regarding vulnerabilities within Australia impacting Cisco ASA 5500-X Series models, that are running Cisco ASA Software or FTD software:

  • CVE-2025-20333 (Critical) – A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an authenticated, remote attacker to execute arbitrary code on an affected device.
  • CVE-2025-20363 (Critical) – A vulnerability in the web services of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software, Cisco Secure Firewall Threat Defense (FTD) Software, Cisco IOS Software, Cisco IOS XE Software, and Cisco IOS XR Software could allow an unauthenticated, remote attacker (Cisco ASA and FTD Software) or authenticated, remote attacker (Cisco IOS, IOS XE, and IOS XR Software) with low user privileges to execute arbitrary code on an affected device.
  • CVE-2025-20362 (Medium) – A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to access restricted URL endpoints that should otherwise be inaccessible without authentication.

A number of versions of Cisco software releases are affected, including those within the following ranges:

  • Cisco ASA Software releases 9.12 to 9.23x and;
  • Cisco FTD Software releases 7.0 to 7.7x.

ASD’s ACSC encourages Australian organisations should consult the below for investigation and remediation advice:

https://sec.cloudapps.cisco.com/security/center/resources/asa_ftd_continued_attacks

Affected organisations should investigate and monitor connected environments for potential malicious activity.

For more information, please read the Australian Cyber Security Centre’s alert, Multiple vulnerabilities affecting Cisco ASA 5500-X Series devices | Cyber.gov.au

Latest alerts critical vulnerability

 Posted on 22 September 2025

High alert from the Australian Signals Directorate's Australian Cyber Security Centre (ASD's ACSC)

Type:  

The ASD's ACSC has published a high alert regarding increased targeting of online code repositories.

Threat actors have been observed gaining access to online code repositories and have been noted to do the following after gaining access to privileged systems and accounts:

  • Running open-source tools to scan for cryptographic secrets, passwords and sensitive keys stored in online code repositories.
  • Extracting and leaking identified credentials publicly.
  • Migrating private repositories to public repositories.
  • Modifying public packages to initiate supply-chain compromises.

This access provides threat actors a better understanding of internal processes and systems, increasing an organisation’s attack surface and enabling future, novel attacks.

ASD’s ACSC advises organisations to:

  • Investigate affected systems
  • Validate packages
  • Inform users
  • Monitor for secret scanning
  • Rotate potentially exposed secrets

Organisations that have been impacted or require assistance can contact ACSC via 1300 CYBER1 (1300 292 371).

For more information, please read the Australian Cyber Security Centre’s alert, Ongoing targeting of online code repositories.

Latest alerts critical vulnerability

 Posted on 12 September 2025

Critical alert from the Australian Signals Directorate's Australian Cyber Security Centre (ASD's ACSC)

Type:  

The ASD's ACSC has published a critical alert regarding vulnerabilities affecting SonicWall SSL VPNs in Australia (CVE-2024-40766)

According to the ASD’s ACSC, the vulnerability can result in Akira ransomware targeting vulnerable Australian organisations through SonicWall SSL VPNs.

The vulnerability enables an attacker to achieve unauthorised access and in specific conditions causes the firewall to crash. The vulnerability affects the following SonicWall devices:

  • Gen 5 devices
  • Gen 6 devices
  • Gen 7 devices running SonicOS 7.0.1-5035 and older versions

ASD’s ACSC encourages Australian organisations should review their use of vulnerable SonicWall devices, and consult the below for investigation and remediation advice:

The vendor has also urged organisations to change passwords after updating to the latest version.

Organisations remain vulnerable if they have not fully implemented the mitigation advice by updating credentials after updating the firmware.

For more information, please read the Australian Cyber Security Centre’s alert, Ongoing active exploitation of SonicWall SSL VPNs in Australia (CVE-2024-40766) | Cyber.gov.au

Latest alerts critical vulnerability

 Posted on 01 September 2025

Critical alert from the Australian Signals Directorate's Australian Cyber Security Centre (ASD's ACSC)

Type:  

The ASD's ACSC has published an alert regarding multiple vulnerabilities impacting NetScaler ADC (formerly Citrix ADC) and NetScaler Gateway (formerly Citrix Gateway) products:

  • CVE-2025-7775 (Critical) involves a memory overflow vulnerability leading to Remote Code Execution and/or Denial of Service.
  • CVE-2025-7776 (High) involves a memory overflow vulnerability leading to unpredictable or erroneous behaviour and Denial of Service.
  • CVE-2025-8424 (High) involves improper access control on the NetScaler Management Interface.

Citrix reports active exploitation of these vulnerabilities has been observed.
 

Australian organisations should review their networks for use of vulnerable instances of NetScaler ADC and NetScaler Gateway.

Organisations or individuals that have been impacted or require assistance can contact ACSC via 1300 CYBER1 (1300 292 371).

For more information, please read the Australian Cyber Security Centre’s alert: Multiple vulnerabilities affecting NetScaler ADC and NetScaler Gateway devices

App Store is a service mark of Apple Inc. Google Play and the Google Play logo are trademarks of Google LLC

Top