Scam watch

Public news

The ACCC has revealed that losses in 2019 in relation to NBN scams are already higher than the losses reported last year.

Consumers and businesses lost an average of more than $110,000 per month between January and May and with the NBN still being rolled out in many South Australian areas, businesses need to be aware of these types of scams.

Common types of NBN scams include:

  • Someone pretending to be from NBN Co or an internet provider calls a victim and claims there is a problem with their phone or internet connection, which requires remote access to fix. The scammer can then install malware or steal valuable personal information, including banking details.
  • Scammers pretending to be the NBN attempting to sell NBN services, often at a discount, or equipment to you over the phone.
  • Scammers may also call or visit people at their homes to sign them up to the NBN, get them a better deal or test the speed of their connection. They may ask people to provide personal details such as their name, address, date of birth and Medicare number or ask for payment through gift cards.
  • Scammers calling you during a blackout offering you the ability to stay connected during a blackout for an extra fee.
  • It is important to remember NBN Co is a wholesale-only company and does not sell services directly to consumers.

NBN Co Chief Security Officer Darren Kane said, “We will never make unsolicited calls or door knock to sell broadband services to the public. People need to contact their preferred phone and internet service provider to make the switch.”

“We will never request remote access to a resident’s computer and we will never make unsolicited requests for payment or financial information.”

The NBN Co’s advice is to hang up if someone calls you claiming to be from NBN Co and tries to sell you anything.

If your business has been impacted by a scam in relation to this, click here to access NBN Co’s scam watch page.

You can also report any scam direct to the ACCC by clicking here or to us by clicking here.