Monday, May 17, 2021

myGovId: Phishing scam impersonating myGov to harvest personal details

 Colonial Pipeline didn’t tell CISA about ransomware incident, highlighting questions about information sharing Cyberscoop

Money laundering, Innisfail

Detectives from Cassowary Coast Criminal Investigation Branch with assistance from the Financial and Cyber Crime Group have charged a 61-year-old Innisfail woman as part of an investigation into money laundering activities.

Several complaints had been received from businesses and individuals in Queensland and Victoria as well as the United States in relation to fraudulent activity on their bank accounts, starting in January 2017.

As part of the investigation, detectives issued a search warrant on a Belvedere residence on May 1, where financial documentation and electronic items were seized.



Police claim Innisfail woman behind international money laundering scam - Police have charged a 61-year- old

The Australian Taxation Office and Services Australia have issued a warning regarding a phishing scam that has been impersonating the government via email.

The fake emails claim to be from myGov, and contain screenshots of the myGovID app. The emails ask recipients to click a link to verify their identity using a ‘secure form’. The link goes to a fake myGov page requesting personal information and banking details

Phishing scam impersonating myGov to harvest personal details


The government hasn’t yet explained just how drastically different this “enhanced myGov” will be. Things get confusing when different Budget documents use the words “enhanced” and “new” interchangeably, and sometimes in tandem. Probably approved by several executives who are tripping over the if risk landscapes.

However, the fact that so much of the language surrounding this myGov revamp praises the existing service says it all.

Nobody who’s ever used (or even heard of) myGov would consider it something worth building upon. The website’s a mess, and the emails are truly terrifying.

The Govt Is Spending $200M On ‘Enhancing’ myGov & Let’s Hope That Means Changing The Email


Dark web drug dealer awaiting sentence was ‘confident’ he would stay anonymous

Six months before he was arrested over a $17 million drug ring run out of his rental cottage on the NSW South Coast, Cody Ronald Ward was interviewed in a news article under his alias as a dealer on the dark web.



An eye-watering $20 million has been scammed from NSW taxpayers while other online criminals have been busted for sick crimes. Here are some of NSW’s worst online offenders.

    A staggering number of criminals have turned to the internet, often preying on the community’s most vulnerable.

    The people guilty of online crimes in NSW - ING and ATO’s Plutus are part of the three


    A Victorian fraudster who posed as a stock broker and financial Adviser scammed family members and friends out of more than $2.7m and splashed the cash at Kmart, Gucci and strip clubs. 

    Matthew Waij, also known as Matthew Way, pleaded guilty to more than a dozen charges of financial advantage by deception and other offences in the County Court of Victoria on Wednesday

    The 38-year-old also defrauded acquaintances in the scam that ran between 2006 and 2017.



    The Australian Cyber Law Map aims to create an online map of Australian laws that affect cyber security and cyber resilience. Different areas of law (e.g. telecommunications, directors' duties) are organised into separate topics. Within each topic, the Map provides commentary and links to the relevant legal frameworks, regulations and policies, and materials relating to industry practices.

    Contributions to the Map are made by invited academics and experts working in the field of cyber law and cyber security.

    Cybercrime Map 🗺



    Watch out for this new malware that steals passwords, webcam and browser data

    ZDNET – “Microsoft has issued an alert over a remote access tool (RAT) dubbed RevengeRAT that it says has been used to target aerospace and travel sectors with spear-phishing emails.  RevengeRAT, also known as AsyncRAT, is being distributed via carefully crafted email messages that prompt employees to open a file masquerading as an Adobe PDF file attachment that in fact downloads a malicious visual basic (VB) file.  Security firm Morphisec recently flagged the two RATs as part of a sophisticated Crypter-as-a-Service that delivers multiple RAT families…”