skip to log on skip to main content
VoiceOver users please use the tab key when navigating expanded menus
Article related to:

Types of scams

Remote access scams: 6 steps to help you protect yourself

Security specialist

2024-02-28 05:30

Estimated reading time
5 min

Key points

  • Remote access scams occur when cybercriminals take control of your device to steal personal data, financial information, or money.
  • Avoid granting remote access to strangers - regardless of their claims.
  • Report scams immediately.

video

Have you ever had a tech support expert remotely access your computer to fix a problem? Remote access technology can be helpful but unfortunately, cybercriminals can use it to take advantage of unsuspecting people.

Remote access scams are becoming increasingly sophisticated, making it essential to stay informed and vigilant. Let’s look at how these scams usually play out, red flags to watch out for, and how you can keep yourself and loved ones safe when using your tech.

 

What are remote access scams?

A remote access scam is where a scammer tricks you into giving them access to your computer or device from a distance. They often act like representatives from familiar companies or agencies to convince you to grant them access.

Once connected, scammers can:

  • Steal personal and financial information.
  • Install malicious software.
  • Perform transactions (if they have access to online banking).

 

How do remote access scams work?

Scammers typically follow a pattern:

  1. Initiate contact (through an unsolicited phone call, email, SMS or internet browser pop-up) pretending to be from a reputable company or organisation.
  2. Create urgency by claiming your device has a virus or security issue that needs urgent attention and offer to “fix” it by accessing your system remotely.
  3. Request remote access using software disguised as legitimate tools (e.g. live chat apps).
  4. Take control of the device using remote access software to spy on your online or device activity, capture financial and personal information, install malware or ransomware or even steal money.

 

How to spot a remote access scam

It takes vigilance to spot a remote access scam, so let’s look at some of the big red flags to watch for.

  • Unsolicited contact: Be cautious of unexpected contact from tech support of a telecom or computer company, especially if they claim to have detected issues on your device. Legitimate companies don't initiate contact in this manner.

  • Unexpected pop-up messages and emails: These messages or emails will warn you that you have a computer virus. But they could be phishing attempts, designed to trick you into granting remote access to your computer.

  • Pressure tactics: Scammers may claim an issue is urgent, requiring immediate resolution. Genuine tech support should always be accommodating of identity and security checks.

  • Request for remote access: Cybercriminals pose as trustworthy organisations, asking for remote access to your computer. While many genuine tech companies do use this technology, they won’t be the ones initiating contact.

  • Inconsistencies in communication: Keep an eye out for poor grammar, spelling errors, or generic language. Legitimate tech support communicates professionally, while cybercriminals can come across as unprofessional.

  • Unconventional payment methods: Be suspicious if the technician asks you to buy software or sign up for a service to fix your computer. They may also request payment through unconventional methods like gift cards. Legitimate companies will follow standard payment procedures.

  • Sudden device changes: New changes to your computer or mobile device’s performance, settings, or files might come from unauthorised access. Stay alert and investigate any unexpected changes like a mouse cursor moving unexpectedly on the screen.

  • Request access to your banking: While the scammer is using your device remotely, they might ask for you to log in to your online banking so they can make a test payment or refund. Genuine companies will never ask you to do this.

 

6 steps to protect yourself against remote access scams.

We get it, sometimes it’s hard to know who to trust. But there are some actions you and your loved ones can do to stay safe online.

1. Beware of unsolicited calls, emails or messages

Never grant remote access to your computer or mobile device or share personal information like bank account details in response to unsolicited contact. Legitimate organisations will not request sensitive information or call you out of the blue requesting access.

2. Never grant remote access to unknown people

Only allow remote access for tech support from reputable sources that you have initiated contact with, and whose identify you have verified.

3.Regularly update software and security programs

Ensure that your operating system, antivirus software, and other security programs are kept up to date. Regular updates often include fixes for vulnerabilities. Better yet, set it and forget it by turning on automatic updates.

4. Educate yourself

Stay across the latest scams, fraud and security alerts from ANZ.

5. Verify the identity of the caller

Legitimate tech support companies will never contact you unexpectedly. If you get an unsolicited call, hang up and contact the company directly using the support number on their official website.

6. Enable Multi-Factor Authentication (MFA)

This adds an extra layer of protection should someone access your devices or accounts remotely. MFA requires an additional verification step, such as a code sent to your mobile, in addition to entering your password.

 

What can you do if you think you’ve been scammed?

If you have been targeted by a remote access scam, you are not alone. We’re here to take you through some ways to protect yourself from further financial harm. The first step is to disconnect your device from the internet.

Next, run a thorough security scan, change passwords for all sensitive accounts on a separate device.

Contact ANZ immediately if you have shared financial information or transferred money as a result of this scam.

Report the scam to the Australian Signals Directorate’s ReportCyber portal. This resource is there for reports of scams where money or personal information has been lost.

Help others by reporting to Scamwatch to help them prevent future losses, monitor trends and educate the population about emerging threats.

Further support for victims of remote access scams:

  • For phishing or identity theft associated with government accounts such as Centrelink, Medicare, or Child Support, contact the Services Australia Scams and Identity Helpdesk on 1800 941 126 or find out more via their website.
  • You can also contact IDCare, a not-for-profit organisation providing support to those experiencing identity and cyber security concerns.
anzcomau:content-hubs/security/scams,anzcomau:content-hubs/security/business-scams-and-fraud
Remote access scams: 6 steps to help you protect yourself
ANZ
Security specialist
2024-02-28
/content/dam/anzcomau/images/security-hub/types-of-scams/scams-remote-access-1200-800.jpg

Stay scam safe

Being aware of remote access scams is the first line of defence – but there’s more you can do to protect yourself online.

Tell me more

 

 

The information set out above is general in nature and has been prepared without taking into account your objectives, financial situation or needs. Before acting on the information, you should consider whether the information is appropriate for you having regard to your objectives, financial situation and needs. By providing this information ANZ does not intend to provide any financial advice or other advice or recommendations. You should seek independent financial, legal, tax and other relevant advice having regard to your particular circumstances.

Top