How to spot Tax Scams and how to deal with them

News_img7.jpg

As we head towards the deadline for lodging your tax return, we’re also heading into peak season for the army of scammers looking to hoodwink individuals and small businesses into parting with their money, their identity or both by claiming to be from the ATO.

Tax scams can take many forms and new ones emerge all the time. The latest involves the fraudsters initiating a three-way telephone conversation between the scammer, the victim, and another scammer impersonating the victim’s tax agent. In one instance, an H&R Block client received such a call whilst actually in our office, meeting their tax consultant! Needless to say, the fraudulent nature of the call was obvious from the outset!

During July and August, the ATO states that nearly $190,000 was paid to scammers and over 1600 people handed over their personal or financial information.

Another common scam involves a text message supposedly from ‘ATO Refund’ offering a tax refund to the recipient.  If the victim clicks on the link, they’ll be asked for their personal details, Tax File Number (TFN) and credit card number, including the three digit security code on the back. Supposedly, this is so the refund can be deposited in the account. In reality, it’s so that the scammer can start stealing money from the credit card.

A slight variation on the same scheme involves the scammer asking for a small fee to be paid via the credit card in order to access the refund. Shortly after paying, much larger deductions will be charged to their card.

In reality, the ATO will never ask for personal information, including credit card details and TFN, by text or email. Nor will they ask you to pay money to access a refund.

Meanwhile, older scams continue to proliferate.

Over the past few years, thousands of people and businesses have received fake emails purporting to be from the ATO, asking them to click on a link or attachment to access further details. That one click can lead to disaster, allowing the scammers to access your computer system and potentially hold you or your business to ransom.