NZ Lost $12.4M to Email Scams in Q3 2025 | NCSC Report

Dayna-Jean Broeders

17 December 2025

5 min

Read

Q3 2025 Cyber Reality Check: When Email Becomes a $12 Million Problem

 

Last quarter, New Zealand businesses lost $12.4 million to cybercrime. That's not a typo and it's not even the scary part.

The scary part? Most of it happened through something we all use every single day: email.

 

The Numbers That Should Concern You

Between July and September 2025, the NCSC recorded financial losses of $12.4 million, a 118% jump from the previous quarter's $5.7 million. Before you think "that's just a few big companies," let me stop you. They received 1,249 incident reports from individuals, businesses, and organisations across the country.

This isn't happening to other people. It's happening to people like you.

 

How It Actually Happens

Here's the pattern we're seeing over and over:

Someone gets access to a legitimate email account. Not a fake one, a real account that people trust. Then they wait, they watch, they learn how your business works, who pays what, and when invoices are due.

Then they strike. A fake invoice goes out, payment details get changed and money gets redirected to their account.

Mike Jagusch from the NCSC put it plainly: attackers gain access to email accounts and send fake invoices or change payment details to redirect payments.

Your finance team gets an email from what looks like your supplier, same email address, same tone, same format, except the bank account number is different and by the time anyone notices, the money's gone.

 

The "Too Small to Target" Myth Dies Here

We hear this all the time: "We're not big enough to be a target."

Let us be blunt: that's wrong and it's expensive to be wrong about.

The NCSC triaged 110 incidents as potentially nationally significant this quarter, a 96% increase from Q2's 56 incidents. These weren't all massive corporates. Some were smaller organisations that happened to be in the wrong place at the wrong time.

The increase? Unauthorised access to email accounts and a general uptick in activity from financially motivated criminals.

Translation: They're getting better at this and they don't care how big you are.

 

The Real Problem: Crime Just Got Easier

Remember when you needed actual technical skills to be a cybercriminal? Yeah, those days are over.

Criminal groups now offer malware-as-a-service platforms that let people with no technical skills deploy malicious software. Think of it like Uber for cybercrime, you don't need to own a car to drive for Uber, you don't need to code malware to deploy it anymore.

This isn't good news. It means the pool of potential attackers just got exponentially larger.

 

What's Actually Getting Hit

Let's look at what people reported:

Incident Type

Reports

What It Means

Scams & Fraud

446 reports

The most common threat. Over a third of all incidents.

Phishing & Credential Harvesting

355 reports

They're after your passwords and access.

Employment Scams

50% increase

Fake job offers, "remote work" cons, bogus partnerships.

Business Email Compromise

Multiple high-value cases

The big money maker. Your email is the target.

Employment and business opportunity scams saw a 50% increase, often promising lucrative jobs, remote work, or investment partnerships.

 

What You Should Actually Do About This

I'm not going to give you a 47-point checklist. Here's what matters:

1. Verify payment changes in person or by phone If someone emails you new bank details, pick up the phone. Call the number you already have on file, not the one in the email. Yes, even if it's your regular supplier.

2. Multi-factor authentication on email accounts This is non-negotiable. If someone gets your password but can't get past the second authentication step, you just stopped a $12 million problem.

3. Train your team to spot the weird That email from your CEO asking for an urgent payment at 7pm on a Friday? That's weird. Weird deserves a phone call to verify.

4. Assume compromise, not security Stop asking "Could we get hacked?" Start asking "When we get compromised, how quickly will we know?"

5. Back up your data properly When (not if) something goes wrong, backups are the difference between a bad day and a catastrophic month.

 

The Bottom Line

The cyber threat environment is evolving quickly, and criminals who lack advanced technical skills now have access to sophisticated tools.

This quarter's numbers aren't an anomaly. They're a trend and trends don't reverse themselves, they accelerate until someone does something about it.

You can prepare for it.

The $12.4 million question is: will you?

 

Need help figuring out where your gaps are? We've been handling this stuff since cyber threats were just nerds in basements. Get in touch and we'll show you where you're actually vulnerable, not where a checklist says you should be.

Sources:

This article is based on data from the National Cyber Security Centre's Q3 2025 Cyber Security Insights report, covering incidents reported between 1 July and 30 September 2025.

Let’s stay in touch!

Enter your details below to stay up-to-date with the latest IT solutions and security measures.