Explore how PORGiESOFT’s intelligence and technology uncover emerging fraud threats and empower organisations to stay ahead of them — from global financial institutions tracked in our Fraud Risk Intelligence Portfolio (FRIP) to enterprise customers transforming their fraud defences with our solutions
Real-World Insights. Real-World Impact.
Case Study: Intelligence - Smishing Surge: Inside the AUD 30 Million Banking SMS-driven Fraud Targeting Australia
INDUSTRY: Financial Services | SECTOR: Banking | COUNTRY: Australia
BANKS:
Smishing Down Under — How Australian Banks Were Targeted in Global Fraud Campaigns
SUMMARY
PORGiESOFT Security’s Fraud Risk Intelligence Portfolio (FRIP) from 2020-2025 has tracked a significant rise in smishing campaigns targeting Australian financial institutions, including ANZ, Commonwealth Bank (CommBank), and Westpac. These campaigns mirrored similar ones in the UK, US and Canada, sharing domains, language templates, and infrastructure patterns — a sign of cross-regional threat actor coordination.
Fraudsters exploited cost-of-living pressures and digital banking convenience to drive social-engineering success rates, using SMS lures that directed users to cloned login portals designed to harvest credentials and authorise fraudulent transfers.
1. Background
Australia is a high-income, digitally connected nation of about 26.9 million people. Internet use is near-universal, and over 93% of adults access online services daily. Its economy is highly cashless, with around 98% of consumer transactions occurring electronically through major banks such as Commonwealth Bank, Westpac, ANZ, and NAB.
Cybercrime has become a major concern. Regional reports estimate Australians lost more than AUD 2.5 billion to scams in 2023, with fraud and identity theft rising sharply. The government’s Cyber Security Strategy 2023–2030 promotes world-class threat sharing and closer collaboration between banks, telecoms, and law enforcement to counter phishing, smishing, and other digital-fraud threats.
Australia’s banking sector is one of the most stable and technologically advanced in the world. It is dominated by the “Big Four” institutions — Commonwealth Bank of Australia (CBA), Westpac Banking Corporation, Australia and New Zealand Banking Group (ANZ), and National Australia Bank (NAB) — which collectively hold the majority of retail deposits and lending.
2. Key Findings
Using verified FRIP data and average loss ratios from regional intelligence, PORGiESOFT Security estimates total financial exposure at AUD 30–32 million, including direct and potential losses. This represents approximately 1–2% of the nation’s annual reported scam losses.
3. Intelligence Implications
4. Attack Analysis
Textual analysis shows that Australian smishing messages overwhelmingly follow a credential-harvest pattern built around urgency and service interruption:
Common Themes:
Other Tactics:
PORGiESOFT Security’s Fraud Risk Intelligence Portfolio (FRIP) uses a structured taxonomy to classify each smishing message by attack vector, method and delivery mechanism. The framework, first introduced in our Smishing Threat Intelligence Report 2022, helps separate URL-driven phishing attempts from hybrid or phone-based lures and other complex tactics.
5. How PORGiESOFT Security's Anti-Fraud Solutions Could Have Helped
In the face of sophisticated Australian banking smishing campaigns, PORGiESOFT Security’s suite of anti-fraud solutions offers multi-layered defence — to analyse, monitor and aggregate fraud and scam trends before it spreads.
1. SenseText™ Portal & API risk scoring
For bank customers, fraud analysts, telecom security leads and customer protection teams combating smishing and message-based scams - SenseText™ would have provided an AI-driven layer of protection, scanning and explaining the risk level of each SMS before action is taken. Banks could have achieved -
2. Fraud OS — Cyber Fraud Fusion
Australian banks often worked in silos — fraud, security, cyber, customer, risk and compliance teams investigating separately. Fraud OS would have connected these units through a single platform, aligning strategy, data, and investigation workflows. With Fraud OS, Australian financial institutions could have achieved:
3. Fraud Intelligence — News Monitoring
For threat intelligence analysts, fraud teams, risk officers, and compliance leaders monitoring emerging fraud threats, smishing and phishing campaigns evolved faster than traditional awareness cycles. Fraud Intelligence would have tracked and analysed new fraud narratives, scam wording, and domain trends across regions delivering -
4. Fraud Awareness — AI Avatars
Bank Security Awareness, HR learning, and Customer Education teams focus on improving fraud literacy but have consistently discovered that written training is often ignored. PORGiESOFT Security’s AI Avatars deliver video-based, scenario-driven anti-fraud education using real smishing examples, improving engagement and long-term retention, which could achieve -
6. Conclusion
The fraud threat landscape will continue to evolve locally and globally. Australia’s smishing surge shows how fast cyber-enabled fraud evolves when language, technology, and trust intersect. Most attacks were URL-based, but the rise of hybrid and callback variants marks a shift toward coordinated, multi-channel fraud — exploiting both human, institutional and system vulnerabilities.
Across the attacks analysed, PORGiESOFT Security estimates links to over AUD 30M in confirmed and potential fraud losses, affecting thousands of victims across banking ecosystems. This scale underscores that fraud has become a national resilience issue, that
is demanding joined-up responses between banks, tech companies, telecoms, government and regulators.
The findings confirm that language is the new infrastructure of fraud. Attackers reuse tone, urgency, and phrasing faster than they can deploy new domains — turning communication itself into the weapon. Defence now depends on connected systems that merge detection, intelligence, and education. PORGiESOFT Security's anti-fraud solutions deliver this layered defence. Together, these solutions can cut fraud exposure by over 35%, reduce customer fraud losses and accelerate incident response, building human resilience at scale.
The lesson from Australia’s case is clear — fraud resilience depends not only on stronger technology, but on smarter, connected fraud intelligence systems and human readiness.
Download the Full Case Study
Download our Intelligence, Case Study - Smishing Down Under — How Australian Banks Were Targeted in Global Fraud Campaigns
Read or download our Banking Case Study: Smishing Down Under — How Australian Banks Were Targeted in Global Fraud Campaigns