Email purporting to be from the Australian Securities and Investments Commission (ASIC), claims that you have requested a reprint of an ASIC correspondence and can click a link to retrieve a copy of the document.
Subject: Request for ASIC correspondence reprintDear Customer,Thank you for your request to reprint this correspondencePlease select this link to retrieve a copy.For more information, please visit www.asic.gov.au/question.
Please do not reply to this email as it has been sent from an unattended mailbox.
Australian Securities and Investments Commission
Please consider the environment before printing this document
This e-mail and any attachments are intended for the addressee(s) only and may be confidential. They may contain legally privileged or copyright material. You should not read, copy, use or disclose them without authorisation. If you are not the intended recipient please contact the sender as soon as possible by return e-mail and then please delete both messages. This notice should not be removed.
According to this email, which claims to be from the Australian Securities and Investments Commission (ASIC), you have requested a reprint of an ASIC correspondence. The email instructs you to click a link to retrieve a copy of the supposed ASIC correspondence.
However, the email is not from ASIC and clicking the link will not retrieve an ASIC document. ASIC has published the following warning about the attack on its website:
We’ve become aware of scam email designed to mislead our customers […]. The email is titled ‘Request for ASIC correspondence reprint’ and states that the customer has requested an invoice reprint. The email also contains a link to download the invoice.
The invoice has not been issued by ASIC. If you receive this fraudulent email, please delete it
AISC is Australia’s corporate regulator and deals with a number of business related issues such as business name registration and renewal as well as company and financial services regulation. And, AISC does communicate with users via email. Thus, staff and owners of Australian businesses may be vulnerable to this malware attack.
If you receive one of these emails, do not click any links or open any attachments that it contains.
Last updated: September 1, 2016
First published: September 1, 2016
By Brett M. Christensen
Importance NoticeAfter considerable thought and with an ache in my heart, I have decided that the time has come to close down the Hoax-Slayer website.
These days, the site does not generate enough revenue to cover expenses, and I do not have the financial resources to sustain it going forward.
Moreover, I now work long hours in a full-time and physically taxing job, so maintaining and managing the website and publishing new material has become difficult for me.
And finally, after 18 years of writing about scams and hoaxes, I feel that it is time for me to take my fingers off the keyboard and focus on other projects and pastimes.
When I first started Hoax-Slayer, I never dreamed that I would still be working on the project all these years later or that it would become such an important part of my life. It's been a fantastic and engaging experience and one that I will always treasure.
I hope that my work over the years has helped to make the Internet a little safer and thwarted the activities of at least a few scammers and malicious pranksters.
A Big Thank YouI would also like to thank all of those wonderful people who have supported the project by sharing information from the site, contributing examples of scams and hoaxes, offering suggestions, donating funds, or helping behind the scenes.
I would especially like to thank David White for his tireless contribution to the Hoax-Slayer Facebook Page over many years. David's support has been invaluable, and I can not thank him enough.
Closing DateHoax-Slayer will still be around for a few weeks while I wind things down. The site will go offline on May 31, 2021. While I will not be publishing any new posts, you can still access existing material on the site until the date of closure.
Thank you, one and all!