If you’re job-hunting in 2025, you’re not just up against other applicants; you’re up against criminals. Employment and “side hustle” scams have surged across Australia, fuelled by social media, encrypted messaging apps and slick fake websites.
The National Anti-Scam Centre (NASC) even ran a dedicated Job Scam Fusion Cell to disrupt these rackets, taking down hundreds of fake job sites and thousands of scam accounts in just six months.
At SMS Personnel, we connect skilled professionals with real roles every day. Here’s a straight-up guide so you can sniff out dodgy offers, protect your identity and know exactly what to do if something feels off.
The state of play: why job scams are booming
It’s a perfect storm. Cost-of-living pressure plus the allure of remote “easy money” gigs make scammers’ hooks more tempting, especially for students, migrants and people between jobs. NASC describes job scams as the fastest-growing scam type in 2023, with harms that go well beyond lost cash: think identity theft and shattered confidence.
Real disruption is happening, but it’s whack-a-mole. Between September 2024 and early 2025, the Job Scam Fusion Cell worked with banks, recruiters and platforms to disrupt enablers, referring 935 job-scam websites for removal (768 down at the time of reporting) and onboarding direct takedown channels with TikTok and LinkedIn.
The official advice is clear: learn the patterns and report what you see. Scamwatch (run by the ACCC) publishes up-to-date warnings and data so Australians can recognise, avoid and report scams.
The three big job-scam playbooks (and how they look in the wild)
1) Task-based / fake “quality-boosting” gigs
You’re offered micro-tasks (liking, rating, “optimising” listings) with a promise of quick commission. It starts small, then they steer you to a slick portal and request payments to “unlock higher tiers”. Victims often lose thousands before they realise there’s no real employer. The Fusion Cell details this anatomy, including copy-paste ad templates and bogus dashboards.
Red flags to watch include guaranteed returns, pay-to-participate structures, pressure to switch to Telegram or WhatsApp, and “screenshots” of others’ earnings that are always suspiciously high.
2) Up-front fee / equipment scams
You’re “hired” quickly and told to pay for police checks, software licences or shipping for home-office gear. Real employers don’t ask you to pay them first. Scamwatch’s jobs and employment page calls this out bluntly.
Watch for requests for fees, gift cards or crypto payments, invoices that don’t show a valid ABN, and links to payment pages on unfamiliar domains.
3) Money-mule recruiting (the criminal trap)
Fraudsters pose as recruiters and ask you to “process payments” or “test a payments system” from your bank account or crypto wallet. This is money-laundering. People (often international students) are targeted with promises of remote admin work. The NASC report and campaign training emphasise this risk.
The red flags here are being asked to move money, accept packages, or open new bank or crypto accounts “for the company”. If a job involves handling money that isn’t yours, walk away.
Where scammers try to find you (and what legitimate providers say)
Social media and messaging apps are prime hunting grounds. The fusion cell removed 29,000+ scam social media accounts during its push. If the “recruiter” insists on Telegram or WhatsApp only, treat it as high risk.
Job boards get hit via impersonation. SEEK publicly warns that it won’t contact you on WhatsApp or Telegram, and doesn’t send linky SMS except in tightly defined cases (SEEK Pass reference checks). If you get a “SEEK” message asking you to click a link or chat off-platform, it’s likely bogus.
Email domains matter too. Big recruiters (e.g., Hays) say they won’t ask for payment and emails come from official domains (e.g., @hays.com.au). Check the sender’s email carefully, hover over links, and search the sender’s name on LinkedIn or ABN Lookup.
No ABN? No job.
Use the official ABN Lookup or ASIC registers; don’t rely on third-party “lookup” sites.
A quick sniff test for any role
Cross-check against the website and email domain.
Are they asking for money or sensitive IDs up front? Up-front fees are a classic red flag. Genuine employers pay for checks or deduct agreed-upon costs only once you’re employed, never via gift cards or crypto. Scamwatch explicitly warns about fee-for-job schemes.
Check the contact method. WhatsApp or Telegram-only “interviews”? Sudden switch to encrypted apps? SEEK says that’s not how they operate. If the job sounds too good to be true (low hours, sky-high pay, “no experience needed”, “guaranteed” commissions), this language features heavily in the scam ads NASC analysed.
Finally, are they asking for your myGov or bank login? Never share myGov, banking or MFA codes. Government agencies warn that identity theft often starts with credential harvesting. If you’ve handed these over, call the Services Australia Scams & Identity Theft Helpdesk on 1800 941 126.
The paperwork test: verify an employer properly
Confirm the business exists and is active. For companies, check ASIC’s Company and Organisation Registers. Mismatched names or addresses are a huge red flag. Ring the landline listed on the official website, not numbers given in a text or WhatsApp message.
Email domains tell you a lot: firstname.lastname@CompanyName.com.au beats CompanyName.recruit@gmail.com every time. And if a job ad undercuts minimum rates, it’s unlawful. The Fair Work Ombudsman has fined employers for dodgy job ads and pushed job sites to lift their game.
What scammers want from you (and why identity matters)
Beyond money, scammers chase data: passports, licences, TFNs, bank logins, selfies, everything needed for identity takeover. The OAIC explains how identity fraud enables criminals to open accounts or apply for credit in your name. Once your credentials leak, the risk can linger for years.
Good practice during applications means providing the minimum necessary, via secure portals. Never share live codes. If asked for excessive info at the “pre-interview” stage (e.g., scanned passport, bank statements), that’s a red flag.
A step-by-step list if you’ve been targeted or scammed
- Kill the contact and capture evidence. Stop chatting, screenshot everything (profiles, messages, URLs).
- Lock down accounts. Change email/bank/myGov passwords; enable MFA. Follow the ACSC’s recovery steps and report via ReportCyber (this routes to law enforcement).
- Report to Scamwatch (NASC). Submitting a report helps disrupt campaigns and warn others.
- Get identity help. Contact IDCARE (free national service) for tailored guidance on identity protection and recovery. myGov’s official guidance also points victims to IDCARE.
- Consider a credit-report ban. To block fraudulent credit applications, request a credit ban (initially 21 days, extendable) with Equifax, Experian or illion; one bureau can notify the others. OAIC sets out your rights here.
- If government credentials were shared, call 1800 941 126. That’s Services Australia’s Scams & Identity Theft Helpdesk for Centrelink/Medicare/myGov issues.
- Tell your bank immediately. Ask for chargebacks, account monitoring and replacement cards. Banks like NAB have dedicated job-scam advice; use it.
Red-flag checklist
- “Recruiter” sometimess pushes you to Telegram/WhatsApp to “fast-track” an interview.
- You’re asked to pay for checks, training, equipment or “unlocking tiers”.
- The “company” has no valid ABN/ACN or the ABN details don’t match the website.
- They want banking/myGov logins or one-time codes.
- The ad promises unreal pay for tiny hours; “no experience” and “guaranteed” commissions.
- The role is “payments processing” from home: money-mule risk.
