MYSEC.TV

Home   /   RESOURCES   /   MYSEC.TV   / Four stages of a phone scam: Introduction, Assistance, Threat, Payment/Close

Four stages of a phone scam: Introduction, Assistance, Threat, Payment/Close

Tech & Sec Weekly
SHARE:

IN THIS VIDEO

New Macquarie University research into phone scams has identified the scripts and emotions that drive most calls.

A team of researchers from Macquarie University’s Cyber Security Hub has analysed the content of more than 100 hours of scam phone calls to identify clear call ‘stages’ and pinpoint the social engineering techniques scammers use on their victims.

The team, headed by Professor Dali Kaafar, used machine-learning techniques and natural language processing to uncover scam ‘scripts’ that use various topics and emotions.

These findings will help develop better ways to detect and prevent scams which account for the human element which is critical to scammers’ success.

The team found that scripts used by scammers contain multiple paths, which can be simplified into four different stages:

Stage 1 – Introduction
The scammer establishes themselves as credible and in a position of authority, then talks about a serious threat to the recipient in a matter-of-fact way – with the threat supposedly from a higher authority (eg the legal system or tax office).

Stage 2 – Assistance
The scammer poses as a helpful instructor, using rapport-building conversations, ostensibly helping the recipient to resolve the supposed problem, giving step-by-step guidance to navigate to a website, install software or fill out online forms.

Stage 3 – Threat
Emotions can ramp up at this stage, as the scammer reinforces threats for non-compliance, citing police, court orders, arrest warrants, jail and other negative consequences, using legal sounding terms, talking over the victim to defer questions and introducing time pressure to prevent the victim thinking it through.

Stage 4 – Payment / Close
Once the scammer gets what they want – like a credit card payment or enticing the victim to download malicious software – the conversation becomes less organised, and scammers finish the call, sometimes promising to call back with confirmation.

We spoke with Professor Dali Kaafar is Executive Director of the Cyber Security Hub in the School of Computing.

OTHER VIDEOS IN THIS SERIES

spban
December 10, 2025
We speak with Professor Andrew Dempster, Director of the Australian Centre for Space Engineering Research discussing the PNT 2026 Conference – 4-6 February 2026 at Royal Randwick, Sydney.Watch Now
bann
December 10, 2025
We speak with Deepak Waghmare, CTO for APAC at Dell Technologies at Canalys APAC Forum 2025, held in Da Nang, Vietnam. Deepak, breaks down the rapidly evolving AI landscape, stressing that AI is still in its early stages and must deliver real business outcomes to gain lasting traction.Watch Now
banner-1
December 8, 2025
Luke Taylor, CEO of New Zealand–based managed security provider SSS, joins us on the sidelines of Canalys APAC Forum 2025, held in Da Nang, Vietnam to discuss the company’s sharp focus on identity, access, PKI and privileged access management.Watch Now
techsec-01
November 28, 2025
We cross to Orlando, Florida and speak with Yuriy Tsibere, Product Manager at ThreatLocker. We dive into the ThreatLocker DAC dashboard, built right into the ThreatLocker agent.Watch Now