Sorry, javascript is required to use this site! Please turn on javascript in your browser's settings.
Find out more about enabling JavaScript.

Common security threats

Help keep your business safe by understanding the main types of online fraud. Money Move IT has identified several known security threats in the online environment to watch out for:
  • Money mules
  • Internet job scams
  • Social engineering
  • Phishing
  • Trojan horse
  • Viruses
  • Worms
  • Card skimming
If you have any concerns or suspect a security breach of any kind, please change your Money Move IT website password immediately, then contact our support team by completing our online form, stating the exact nature of the problem.

Money mules

Fraudsters often look to recruit money mules, or money transfer agents, to launder funds.
They can be recruited through many methods, including spam emails, recruitment websites and newspaper advertisements.
After being recruited, money mules receive funds into their account, which they then withdraw and send overseas, usually minus a commission payment.
Remember that you will be the easiest part of the chain to track down and supplying any information to the fraudsters may also put you at risk from identity fraud.
If you see an opportunity to make some easy money and the offer seems too good to be true, then it probably is.

Internet job scams

Scammers send out spam emails suggesting they are looking for potential 'employees' to receive funds into their bank account online.
They emulate or copy legitimate websites, which are used to give a face and some apparent credibility to their fictitious company.
The funds however have been fraudulently transferred from other customers’ accounts that have had their access code and password details compromised.
The scammers generally then ask for the funds to be sent overseas, using an international money transfer, in return for a small commission.
This however is considered a method of money laundering.

Social engineering

A practice involving deceiving individuals for the purpose of obtaining information or access to a system.
This practice is very popular and is commonly used in attacks like phishing.


An attack that combines social and technical deception to get an individual's personal and financial information.
For example:
A fraudster sends an email to a large number of email addresses. The email may appear to be from the email recipient's bank.
The message urges the recipient to click on a link to update their personal profile or carry out some transaction.
The link takes the recipient to a fake website designed to look like the real thing.
However, any personal or financial information entered on this website is directed straight to the fraudster.

You should always ensure you type the website link into your browser, and once you have typed it in, save it to your favourites on your web browser, and always use that to access the site.

Trojan horse

This is a software program that disguises itself as an application on an individual's computer.
It does not replicate itself like a virus or worm, but it can be just as harmful.
For example, one known Trojan horse promotes the idea it will attempt to remove viruses from a computer, however, instead of removing them it infects the computer further.


A software program that is able to replicate itself when a set of conditions have been satisfied. These conditions usually involve human interaction.
When a virus is activated it can be destructive, such as overwriting the files of the local hard disk.


A self-replicating software program which attempts to spread to other computers connected to the infected computer.
As with a virus, a worm can be very destructive.

What to watch out for

  1. Generic greetings. Many spoof emails begin with a general greeting, such as: "Dear Money Move IT member."
  2. A false sense of urgency. Most spoof emails try to deceive you with the threat that your account is in jeopardy if you don’t update it ASAP.
  3. Fake links. The text in a link looks valid, but then sends you to a spoof address. Always check where a link is going before you click. Move your mouse over it and look at the URL in your browser or email status bar. If the link looks suspicious, do not click on it, and be aware that a fake link may even have the text "Money Move IT" in it. If you are not sure about an email, copy the text of the email and paster it into the comment section of our support form, so that we can analyse it further.

activity indicator
Your session has been locked for your security. To unlock, simply enter your pin below and click OK.