Search This Blog

Powered by Blogger.

Blog Archive

Labels

Footer About

Footer About

Labels

Showing posts with label Cyber Fraud. Show all posts

Investment Scams Surge Across the US as Fraudsters Exploit Social Media, Texts, and Crypto Boom

 

If you've ever received a random “Hi, how are you?” message from a stranger on text or social media, it may not be an accident. While sometimes harmless, these unexpected greetings are increasingly being used by cybercriminals attempting to draw victims into investment schemes.

According to data from broker comparison platform Broker Chooser, investment-related fraud has become the fifth most common scam in the US. In just the first six months of 2025, more than 66,700 incidents were reported, with losses surpassing $3.5 billion. Cryptocurrencies remain a major target, and scammers pocketed $939 million in digital assets—an increase of $261 million from the same period last year.

Because these schemes prey on individuals hoping to grow their money quickly, the financial damage is substantial. The median loss per victim hit $10,000 in early 2025, rising from 2024’s median of $9,300. Broker Chooser notes this is the highest median loss of any scam category, dwarfing the second-highest—business and job fraud—by 376%.

Certain states are being hit harder than others. Nevada ranks first, logging 211 cases per million residents and more than $40.4 million in losses. Arizona follows with 202 cases per million and over $95.1 million lost. Florida comes in third with 185 reports per million residents and a staggering $241 million in total losses.

A major tactic driving these numbers is the “pig butchering” scam. In this approach, criminals initiate contact on dating platforms or social networks and spend months building trust. Once they establish a rapport, they persuade their targets to invest in fake cryptocurrency platforms, often showing fabricated account growth. As the victim invests more, the scammer eventually disappears with the funds, leaving the person with nothing.

Social media remains the leading gateway for these scams, with 13,577 reports and $589.1 million in losses in the first half of 2025. Many victims turn to these platforms for financial guidance, making them easy targets. Fraudulent websites and apps—often made more convincing through AI—rank second, with 6,007 incidents and $266 million in losses.

Text messages are another tool scammers use to start conversations. A simple, friendly opener can quickly evolve into targeted manipulation once the criminal identifies an opportunity.

Tech Park Operation in Bengaluru Uncovered in Cross-Border Malware Scam


 

The Bengaluru police have made a major breakthrough in their fight against a far-reaching cybercrime syndicate that was operating inside one of the city's bustling technology parks by uncovering and dismantling an alleged tech-support fraud operation that was operating within. 

The officials stated that the group, which is based out of an office operating under the name Musk Communications situated on the sixth floor of the Delta building in Sigma Soft Tech Park, Whitefield, was posing as Microsoft technical support representatives to terrorize unsuspecting victims in the United States by issuing fabricated Federal Trade Commission (FTC) violation alerts. 

Using a judicial search warrant as well as credible intelligence, Cyber Command's special cell and Whitefield division cyber crime police mounted a series of coordinated raids on Friday and Saturday following the receipt of credible intelligence. According to investigators, the operation was sophisticated, and it siphoned off several crores of rupees by largely using cryptocurrency channels, a process that investigators believe is highly sophisticated. 

It was found, according to the Times of India, that the fraud network employed a carefully choreographed playbook of deception, which included utilizing fake security pop-ups and falsified FTC violation notifications to convince victims into transferring money by using counterfeit security pop-ups and false FTC violation notices. It was found that the Cyber Command's special cell, along with Whitefield division officers, were receiving a credible tip-off which prompted a swift and coordinated response to the operation. 

Upon receiving the intelligence, police conducted a court-ordered search over the weekend at Musk Communications headquarters on the sixth floor of the Delta building, which is located on Whitefield Main Road within Sigma Soft Tech Park. There was a cache of computers, laptops, hard drives, mobile phones, and other digital tools seized inside the building that were thought to have powered the scam. All of the employees present at the scene were detained and later appeared in court, where they were remanded to police custody while the investigation was being conducted.

It was noted by law enforcement officials that the company's owner, who recruited and trained the detained employees, remains on the loose even though the police have arrested only six people in connection with the operation. According to investigators, there may have been more than 500, possibly more than 1,000, US citizens defrauded by this network, based upon preliminary estimates. Investigators believe the network went far beyond the 21 employees caught at the scene. 

As the head of the CCU and DGP, Pronab Mohanty, has stated that the scam involved a carefully layered approach to social engineering combined with deceptive technology that led to a successful exploitation scheme. The officers observed that the group began by deploying malicious Facebook advertisements aimed at users living in the United States. The advertisements were designed to deliver harmful code embedded in links disguised as legitimate company notifications to American users.

It was designed to lock the victim's computer once they clicked on the code, triggering a fake alert, posing as "Microsoft Global Technical Support," complete with a fraudulent helpline number, to click OK. The trained impersonators who greeted victims when they contacted them escalated their fears by claiming they had been compromised, their IP addresses had been breached and that sensitive financial data was about to be exposed. 

Upon attempting to resolve fictitious FTC compliance violations and urgent security fixes, the callers were then coerced into transferring significant amounts of money, often in cryptocurrency, under the guise of resolving fictitious compliance violations. Various CCU teams had been placed under discreet surveillance by the SSTP detectives after receiving specific intelligence regarding the operation of the scam in a 4,500 square foot building that masqueraded as a call center in the Delta building at Sigma Soft Tech Park, which had been operating under the cover of a call centre.

In the case of a suo motu lawsuit filed under the provisions of the Information Technology Act, a team led by Superintendent Savitha Srinivas, the Superintendent of Police, stepped in and conducted a planned raid that lasted from Friday night until Saturday morning. According to the authorities, the arrested employees had been hired for unusually high salaries and had been provided with systematic training. Their educational and professional histories are being verified now. 

Investigators are currently examining all digital devices recovered from the premises in order to identify the individual members who are still involved with the operation. In addition, investigators will attempt to identify those individuals responsible for creating the malicious software, the trainers, and those who manage the network's finances. 

In addition, it is necessary to determine the total extent of the fraud by analyzing all the digital devices recovered from the premises. A senior officer of the company described the operation as a meticulously planned fraud network, one which relied heavily on deception and psychological pressure to perpetrate the fraud. As reported by investigators, the group ran targeted Facebook ads targeted towards U.S. users, encrypting malicious code in messages that appeared to be routine service messages or security alerts, and directing them to them. 

One click of the mouse was enough for a victim's computer to freeze and trigger a pop-up that appeared to mimic the appearance of a genuine technical support warning from Microsoft, including a fake helpline number. Upon calling victims and seeking assistance, trained impersonators dressed as Microsoft technicians spun alarming narratives claiming their computers had been hacked, their IP addresses had been compromised, and their sensitive banking information was immediately at risk. They used fabricated FTC violation notices that enticed the victims to pay hefty amounts for supposed security fixes or compliance procedures that never existed in the first place. 

Upon preliminary analysis of the financial flows, it seems that the syndicate may have siphoned off hundreds of crores through cryptocurrency channels, with Director General of Police, Cyber Command Unit, Mr. Pronab Mohanty noting that he believes the crypto transactions might have been of a large scale. 

A more complete picture of the case would emerge as the suspects were further questioned, he said, adding that investigators already had significant electronic evidence at their disposal. According to official officials, the sophisticated nature of the operation, as well as its technological infrastructure, as well as its widespread reach, suggest that it may be linked to a wider transnational cybercrime network. 

A team of experts is currently reviewing seized devices, tracking cryptocurrency wallets, reviewing communications logs, and mapping the victim footprints across multiple jurisdictions as part of the investigation. Authorities are coordinating with central agencies in order to determine if the group had counterparts operating outside of the city or overseas as part of the investigation. The scope of the investigation has continued to expand. 

There is also an investigation underway into whether shell companies, falsified paperwork, or layered financial channels were used to conceal the true leadership and funding network of the operation. As new leads emerge from digital forensics as well as financial analysis in the coming days, officers expect that the investigation will grow significantly in the coming days. According to the authorities who are investigating the incident, tech parks, digital advertisers, and online platforms are being urged to strengthen monitoring systems in order to prevent similar infiltration attempts in the future. 

Cybersecurity experts say the case underscores the growing need to raise public awareness of deceptive pop-ups, unsolicited alerts, and remote support scams—tactics that are becoming more sophisticated as time goes by. As a reminder to users, legitimate agencies will never charge money for compliance or security fixes, and users are advised to verify helplines directly through official websites to ensure they are trustworthy. It is expected that the crackdown will set a critical precedent in dismantling multi-national cyber-fraud operations by setting a critical precedent in international coordination.

Multi-Crore Fake GST Registration Racket Busted Across 23 States

 

A sophisticated fake GST registration racket operating across 23 Indian states has resulted in a multi-crore tax evasion scam, exploiting weaknesses in the Goods and Services Tax (GST) system to generate fraudulent input tax credit (ITC) and evade government revenue on a large scale.

The modus operandi largely involves creating fake GST registrations using forged documentation, including bogus Aadhaar and PAN cards, to establish shell entities with no actual business operations. These entities then issue fabricated invoices and generate e-way bills for non-existent transactions, facilitating the fraudulent input tax credit claims across genuine and shell companies.

Regulatory authorities, including the Directorate General of GST Intelligence (DGGI), have uncovered several instances where syndicates employed layered transaction trails and fictitious suppliers to divert and siphon funds through systematic bogus invoicing. 

Major raids and investigations in cities such as Chennai and Belagavi have led to the arrest of key accused individuals, recovery of fake documents, freezing of bank accounts, and seizure of property documents linked to the scam. For example, one case in Belagavi revealed fake invoices totaling approximately ₹145 crore, leading to the arrest of an individual under the CGST Act.

This GST fraud network targets not just government revenue, but also paves the way for large multinational firms to benefit from inflated ITC, according to Enforcement Directorate findings. This cross-border and multi-entity approach compounds the scale and complexity of investigations, with dummy entities being used to link bogus invoices and move money through multiple shell companies across several states.

In response, the government has intensified compliance drives and implemented reforms, such as biometric Aadhaar authentication for GST registration in select states and more stringent registration checks. Authorities warn that unsuspecting individuals could have their PAN and Aadhaar details misused for fake GST registrations, making vigilance essential for both businesses and citizens. 

The ongoing investigations continue to unravel the extent of the network, highlighting the need for robust digital authentication, proactive monitoring, and inter-agency coordination to tackle these sophisticated financial crimes.

Cybercrime Gang Busted for Massive Fake Welfare Portal Scam in India

 

A massive inter-state cybercrime syndicate targeting government welfare schemes in India was busted by police under an operation code-named “Shutterdown,” revealing one of the largest frauds of recent years involving over 36 arrests and millions siphoned off from government funds intended for farmers, pensioners, and low-income citizens.

The gang, which included government employees and technically skilled individuals, exploited structural vulnerabilities in official portals of welfare schemes such as PM Kisan Samman Nidhi, Social Security Pension, and various compensation programs.

Sophisticated modus operandi

The perpetrators manipulated government databases, using unauthorized IDs to activate fraudulent accounts and reroute OTPs to agents, ensuring transactions remained undetected during operational hours. 

Fake beneficiaries were created by purchasing bank account details and identity documents from ineligible persons, who were promised welfare funds in exchange for providing their credentials. Large sums were systematically withdrawn using forged identities and quick cash transactions, backed by real-time data manipulation on government digital platforms.

Scale and impact

Police investigations uncovered over 11,000 fake beneficiary accounts, with evidence of systematic syphoning through a web of financial activity stretching across districts such as Jodhpur, Kota, Bundi, Dausa, and beyond. The operation led to the seizure of more than ₹52 lakh in cash, luxury vehicles, hundreds of SIM cards, biometric devices, and documents linked to thousands of accounts.

Police credited the success of the crackdown to proactive citizen informants, technical surveillance, and coordination between state police and banking institutions, including immediate freezing of suspect accounts and deployment of forensic audit teams by leading banks.

Key masterminds and ongoing probe

The fraud’s mastermind, Ramavatar Saini, leveraged intimate knowledge of welfare portals to orchestrate the scam, aided by collaborators like Mohammad Laeeq (with access to nodal office systems) and Subhash (who sourced bulk data of ineligible beneficiaries). 

Additional suspects from multiple states remain at large, with police announcing rewards for their capture. The breakthrough is expected to spark reforms addressing high-tech vulnerabilities in digital welfare delivery platforms and improve coordination for inter-state financial crime investigations.

Authorities have emphasized the need for urgent technical upgrades to official systems and more robust verification protocols to prevent future cyber-enabled misuse of welfare funds. Public vigilance, rapid intelligence sharing, and cross-agency collaboration played a vital role in uncovering the racket and containing its financial fallout.

ClickFix Attack Tricks Users into Infecting Their Own Devices

 

Cybercriminals are increasingly using a social engineering attack called ClickFix, which manipulates victims into unknowingly initiating cyberattacks on their own systems. According to Microsoft’s 2025 Digital Defense Report, ClickFix has become the most common initial access technique, recorded in 47% of attacks tracked by Microsoft Defender Experts over the past year. This rise is largely attributed to attackers’ growing ability to bypass traditional anti-phishing protections and successfully exploit human behavior.

What is ClickFix?

ClickFix is a deceptive tactic that capitalizes on users' desire to solve perceived simple technical problems. It typically starts with a phishing email or fraudulent website designed to look like a legitimate service—one notable example was seen in spoofed Booking.com emails during the 2024 holiday season. 

The victim is prompted through a fake notification to resolve an issue, often by copying and pasting a code snippet or clicking through a sequence mimicking technical support instructions. Unbeknownst to the user, these instructions result in executing malicious PowerShell or mshta.exe commands, which launch malware directly into system memory—bypassing the need for a downloaded file and evading common antivirus solutions.

Changing threat landscape

ClickFix is especially concerning because it reflects a broader shift in cybercriminal tactics: exploiting human psychology over technical vulnerabilities. Security vendors highlight that this trend is amplified by the use of artificial intelligence, which enables attackers to craft highly convincing phishing lures and even simulate full conversation threads for business email compromise schemes. 

The payloads delivered through ClickFix attacks are diverse and dangerous, including ransomware, information stealers, remote access trojans (RATs), and worms such as Xorm, Danabot, and NetSupport RAT. Reports from security vendors indicate a 500% surge in ClickFix incidents in the first half of 2025, making up an estimated 8% of all attacks during that period.

Defense strategies and user awareness

Traditional defenses based on blocking suspicious attachments, network traffic, or sender domains cannot reliably stop ClickFix. Instead, organizations and individuals must focus on behavioral change: never follow unsolicited technical instructions without independent verification, and always treat requests for manual intervention—like pasting unfamiliar code—with skepticism.

Security awareness training and updated incident response plans are crucial for combating this new wave of attacks. As threat actors continue to refine their methods, education and skepticism remain the frontline defenses against self-induced cyber threats.

Noosa Council Hit by $2.3 Million AI Fraud: Mayor Calls It “Unprecedented” Cyber Attack

 

Noosa Council in Queensland has disclosed that it fell victim to an advanced cyber fraud in December 2024, resulting in $2.3 million being transferred overseas through deceptive means. According to Mayor Frank Wilkie, the perpetrators leveraged AI-based imitation tools to convincingly mimic council executives, tricking staff into approving the unauthorized transactions.

Roughly $400,000 of the stolen amount has been recovered so far, leaving a loss of around $1.9 million. The council has emphasized that no employees are being held responsible and assured residents that ratepayer information and operational systems remain secure.

Statements from the Mayor and CEO
Mayor Wilkie described the incident as “unprecedented,” warning of the increasing sophistication of technology-enabled crime:

“It enables skilled fraudsters to imitate personalities and individuals to a very high degree.”

Council CEO Larry Sengstock confirmed that while investigations are ongoing, external forensic IT specialists have found no evidence of a system breach or compromise of public data. Sengstock also explained that the council’s delay in making the matter public was due to restrictions imposed by law enforcement.

Cybersecurity analysts believe the criminals may have used AI-driven tactics—such as deepfake videos, voice cloning, or impersonation through emails and calls—to deceive staff. Dr. Dennis Desmond, a former FBI investigator, suggested that publicly available data might have been collected to craft realistic impersonations of senior officials.

These scams often exploit human trust rather than system vulnerabilities, manipulating employees into approving large transfers under false pretenses.

India’s Expanding Digital Reach Brings New Cybersecurity Challenges

 



India’s digital transformation has advanced rapidly over the past decade. With more than 86% of households now online, the Digital India initiative has helped connect citizens, businesses, and services like never before. However, this growing connectivity has also exposed millions to rising cybersecurity risks and financial fraud.

According to official government data, reported cybersecurity incidents have more than doubled, from 10.29 lakh in 2022 to 22.68 lakh in 2024. Experts say this rise not only reflects a more complex threat environment but also improved mechanisms for tracking and reporting attacks.

By February 2025, complaints worth ₹36.45 lakh in total had been filed on the National Cyber Crime Reporting Portal (NCRP), revealing the scale of digital financial fraud in the country.


The Changing Face of Cyber Frauds

Cybercriminals are constantly evolving their methods. Traditional scams like phishing and spoofing where fraudsters pretend to represent banks or companies are now being replaced by more advanced schemes. Some use artificial intelligence to generate convincing fake voices or videos, making deception harder to detect.

A major area of exploitation involves India’s popular Unified Payments Interface (UPI). Attackers have been using compromised mobile numbers to steal funds. In response, the Department of Telecommunications introduced the Financial Fraud Risk Indicator (FRI), which identifies phone numbers showing suspicious financial activity.

Another serious concern is the surge of illegal online betting and gaming applications. Investigations suggest these platforms have collectively generated over ₹400 crore through deceptive schemes. To address this, the government passed the Promotion and Regulation of Online Gaming Bill, 2025, which bans online money gaming while supporting legitimate e-sports and social gaming activities.

India’s legal and institutional framework for cybersecurity continues to expand. The Information Technology Act, 2000, remains the backbone of cyber law, supported by newer policies such as the Digital Personal Data Protection Act, 2023, which reinforces users’ privacy rights and lawful data handling. The Intermediary Guidelines and Digital Media Ethics Code, 2021, also make digital platforms more accountable for the content they host.

The Union Budget 2025–26 allocated ₹782 crore for national cybersecurity initiatives. The government has already blocked over 9.42 lakh SIM cards and 2.63 lakh IMEIs associated with fraudulent activity. Through the CyTrain portal, over one lakh police officers have received training in digital forensics and cybercrime investigation.


National Coordination and Citizen Awareness

Agencies like CERT-In and the Indian Cyber Crime Coordination Centre (I4C) are central to India’s cyber response system. CERT-In has conducted over 100 cyber drills involving more than 1,400 organizations to assess preparedness. I4C’s “Samanvaya” and “Sahyog” platforms enable coordination across states and assist in removing harmful online content.

The government’s helpline number 1930 and the cybercrime portal cybercrime.gov.in provide citizens with direct channels to report cyber incidents. Awareness campaigns through radio, newspapers, and social media further aim to educate the public on online safety.


A Shared Responsibility

India’s expanding digital frontier holds immense promise, but it also demands shared responsibility. With stronger laws, institutional coordination, and public vigilance, India can continue to drive its digital progress while keeping citizens safe from cyber threats.



How Reporting Spam Calls and Texts Helps Stop Scammers for Everyone

 

 

Almost everyone has experienced an unexpected call or text from an unknown number. While some turn out to be harmless misdials, many are actually spam or phishing attempts aimed at stealing personal or financial information. In some cases, the scam is obvious—like a caller asking for banking or credit card details—but other times, it’s much harder to tell.

To combat this, tech giants like Apple and Google allow users to mark suspicious calls or texts as spam or junk. Once flagged, your mobile carrier, the device manufacturer, third-party databases, and sometimes even federal bodies like the FCC and FTC, are notified.

On the network side, reported numbers are added to a centralized spam database. That’s why some calls appear on your screen labeled “Spam Likely.” It means that enough users have flagged the number, prompting your carrier to take preventive action. Essentially, every report you make contributes to a safer network for all users.

Modern carriers also use AI and machine learning to detect and block spam activity. For example, Google’s AI-based scam detection system becomes smarter and more accurate the more users report suspicious calls and messages.

Third-party apps like Truecaller, RoboKiller, and Hiya also rely on user reports to strengthen their own spam-blocking databases. This collective effort creates a ripple effect—when users flag spam, these systems improve their ability to identify and prevent future scams.

Unfortunately, scammers are evolving too. One of their most common tricks is “neighbor spoofing,” where they disguise their number to look like a local one. This creates a false sense of trust (“It’s a call from my area, it must be legitimate”). Fraudsters may even impersonate government bodies or organizations like the IRS or local police to extract personal data.

If you’re uncertain about the legitimacy of a call or text, the safest move is to hang up and contact the organization directly using verified contact details. Chances are, they’ll confirm it was a scam attempt.

To stay protected, you can also use your phone’s in-built spam filters:

  • For iPhone users: Go to Settings > Messages > Message Filtering > Unknown & Spam > Filter Unknown Senders. To block a number, tap the info icon next to it and select Block Contact, or long-press a spam text and block it directly.

  • For Android users: Open Google Messages > Settings > Spam Protection > Enable Spam Protection. To block, open Phone > More > Call history, choose the number, and tap Block/Report Spam. You can also block a number directly from your text messages by long-pressing the conversation.

Additionally, you can report spam directly to your mobile carrier by forwarding the suspicious message to 7726 (SPAM). If you believe you’ve encountered fraudulent activity, you can file a report with both the FTC and FCC for further investigation.

By consistently reporting spam, users help improve detection tools, reduce fraud, and make communication networks safer for everyone.


AI Turns Personal: Criminals Now Cloning Loved Ones to Steal Money, Warns Police

 



Police forces in the United Kingdom are alerting the public to a surge in online fraud cases, warning that criminals are now exploiting artificial intelligence and deepfake technology to impersonate relatives, friends, and even public figures. The warning, issued by West Mercia Police, stresses upon how technology is being used to deceive people into sharing sensitive information or transferring money.

According to the force’s Economic Crime Unit, criminals are constantly developing new strategies to exploit internet users. With the rapid evolution of AI, scams are becoming more convincing and harder to detect. To help people stay informed, officers have shared a list of common fraud-related terms and explained how each method works.

One of the most alarming developments is the use of AI-generated deepfakes, realistic videos or voice clips that make it appear as if a known person is speaking. These are often used in romance scams, investment frauds, or emotional blackmail schemes to gain a victim’s trust before asking for money.

Another growing threat is keylogging, where fraudsters trick victims into downloading malicious software that secretly records every keystroke. This allows criminals to steal passwords, banking details, and other private information. The software is often installed through fake links or phishing emails that look legitimate.

Account takeover, or ATO, remains one of the most common types of identity theft. Once scammers access an individual’s online account, they can change login credentials, reset security settings, and impersonate the victim to access bank or credit card information.

Police also warned about SIM swapping, a method in which criminals gather personal details from social media or scam calls and use them to convince mobile providers to transfer a victim’s number to a new SIM card. This gives the fraudster control over the victim’s messages and verification codes, making it easier to access online accounts.

Other scams include courier fraud, where offenders pose as police officers or bank representatives and instruct victims to withdraw money or purchase expensive goods. A “courier” then collects the items directly from the victim’s home. In many cases, scammers even ask for bank cards and PIN numbers.

The force’s notice also included reminders about malware and ransomware, malicious programs that can steal or lock files. Criminals may also encourage victims to install legitimate-looking remote access tools such as AnyDesk, allowing them full control of a victim’s device.

Additionally, spoofing — the act of disguising phone numbers, email addresses, or website links to appear genuine, continues to deceive users. Fraudsters often combine spoofing with AI to make fake communication appear even more authentic.

Police advise the public to remain vigilant, verify any unusual requests, and avoid clicking on suspicious links. Anyone seeking more information or help can visit trusted resources such as Action Fraud or Get Safe Online, which provide updates on current scams and guidance on reporting cybercrime.



SpamGPT: AI-Powered Phishing Tool Puts Cybersecurity at Risk

 

While most people have heard of ChatGPT, a new threat called SpamGPT is now making headlines. Security researchers at Varonis have discovered that this professional-grade email campaign tool is designed specifically for cybercriminals. The platform, they report, offers “all the conveniences a Fortune 500 marketer might expect, but adapted for cybercrime.”

SpamGPT’s dashboard closely mimics legitimate email marketing software, allowing attackers to plan, schedule, and track large-scale spam and phishing campaigns with minimal effort. By embedding AI-powered features, the tool can craft realistic phishing emails, optimize subject lines, and fine-tune scams—making it accessible even to criminals with little technical background.

"SpamGPT is essentially a CRM for cybercriminals, automating phishing at scale, personalizing attacks with stolen data, and optimizing conversion rates much like a seasoned marketer would. It's also a chilling reminder that threat actors are embracing AI tools just as fast as defenders are," explained Rob Sobers, CMO at Varonis.

The toolkit includes built-in modules for SMTP/IMAP configuration, inbox monitoring, and deliverability testing. Attackers can upload stolen SMTP credentials, verify them through an integrated checker, and rotate multiple servers to avoid detection. IMAP monitoring further allows criminals to track replies, bounces, and email placement.

A real-time inbox check feature sends test emails and confirms whether they land in inboxes or spam folders. Combined with campaign analytics, SpamGPT functions much like a legitimate customer relationship management (CRM) platform—but is weaponized for phishing, ransomware, and other cyberattacks.

Marketed as a “spam-as-a-service” solution, SpamGPT lowers the skill barrier for cybercrime. Tutorials such as “SMTP cracking mastery” guide users in obtaining or hacking servers, while custom header options make it easier to spoof trusted brands or domains. This means even inexperienced attackers can bypass common email authentication methods and run large-scale campaigns.

Experts warn that the rise of SpamGPT could trigger a surge in phishing, ransomware, and malware attacks. Its ability to slip past spam filters and disguise malicious payloads as legitimate correspondence makes it especially dangerous for both individuals and businesses.

To counter threats like SpamGPT, cybersecurity experts recommend:

  • Enforcing DMARC, SPF, and DKIM to block spoofed emails.

  • Deploying AI-driven phishing detection tools.

  • Maintaining regular backups and malware removal protocols.

  • Implementing multi-factor authentication (MFA) across all accounts.

  • Providing ongoing phishing awareness training for employees.

  • Using network segmentation and least-privilege access controls.

  • Keeping software and security patches updated.

  • Testing and refining incident response plans for rapid recovery.

SpamGPT demonstrates how cybercriminals are harnessing AI to evolve their tactics. As defenses improve, attackers are adapting just as quickly—making vigilance and layered security strategies more critical than ever.

Rising Online Scams: From Phishing Emails to Fake News Feeds

 

Cybercriminals are increasingly using sophisticated tactics to target unsuspecting users through phishing emails and fake news stories, security experts warn. Recent examples highlight how hackers exploit urgency, impersonation, and malicious attachments to trick victims into revealing sensitive information or downloading harmful software.

A phishing attempt can come in the form of an email with the subject line “Quick favor needed.” According to cybersecurity analysts, such subject lines are designed to create urgency and prompt quick responses.

The sender’s name was unfamiliar, and closer inspection of the email address revealed an impersonation attempt. The address used the name of a well-known food delivery service, Deliveroo, but with a deliberate spelling error to appear legitimate.

The email included what was described as a “screenshot” attachment. However, the file was not an image but an HTML document disguised as one. Code inside the file redirected to a counterfeit Deliveroo website featuring a message that appeared to be loading content, along with a button instructing users to “Click here if your page does not load automatically.”

Experts note that clicking such links often leads to malicious websites capable of installing malware. The email displayed nearly all the hallmarks of a phishing attack: urgency, impersonation, and a misleading attachment.

Fake News Article Used to Spread Malware

Another case emerged through Google Discover, where a story about daylight savings time surfaced in the feed. Upon clicking, users were greeted with a pop-up warning that their device was infected with “two harmful viruses.”

The fraudulent message further claimed that the infections originated from “recent adult sites” and warned that a phone’s SIM card, contacts, and data could be damaged unless a recommended app was installed. Instead of directing users to the Google Play Store, the link led to a third-party website prompting the download of an APK file.

Such apps often request unnecessary permissions, potentially granting cybercriminals access to personal data or enabling them to install dangerous malware under the guise of system updates.


Security specialists emphasize the importance of staying calm and skeptical when encountering suspicious messages. Hackers often attempt to provoke emotional responses to drive quick, careless actions. Warning signs include:

  • Messages creating a sense of urgency
  • Suspicious or misspelled sender addresses
  • Unexpected attachments or links
  • Poor spelling and grammar

To minimize risks, experts recommend using password managers to generate and store unique credentials, installing reputable antivirus software, and regularly updating knowledge on emerging cyber threats.

Cybercriminals frequently recycle tactics across different platforms, making awareness and vigilance the strongest defenses.

South Korea Intensifies Crackdown with Return of Casino Crime Suspects

 


A sweeping move which underscores both the scale of organised gambling operations in Asia as well as the increasing threat of cross-border crime is South Korean authorities dismantling an illicit casino network that funnelled the equivalent of KRW 44 billion through secretive online platforms over the past 18 months, to highlight the problem with cross-border crime in the region. 

A total of ten people, including seven of whom are facing criminal charges under the National Sport Promotion Act in Korea, have been arrested for orchestrating and managing the gambling ring, which originated in Cambodia, but managed to attract more than 11,000 users despite South Korea's strict ban on online gambling. 

There have been several arrests of those involved in this network, including the alleged ringleader whose identity is still being withheld by investigators as they pursue more leads about the network's overseas connections. This case not only demonstrates the government's determination to curb illegal gambling but also intensifies debate around South Korea's restrictive regulatory framework, which critics argue could become increasingly vulnerable as neighbouring jurisdictions liberalise their gambling laws and compete for market share with one another. 

The National Police Agency (NPA) also commented that the operation marked the largest overseas repatriation of criminal suspects in South Korean history, as 49 fugitives were trapped in the Philippines, a crime hub that has been used for years by criminals seeking to evade justice. In total, there were 25 individuals who were allegedly involved in fraud schemes, including voice phishing networks that have caused a large amount of financial damage in recent years. 

Moreover, 17 suspects have been linked to illegal online gambling platforms, while three individuals have been charged with violent crimes. Also, authorities confirmed that one suspect was returned from a series of crimes, including embezzlement, foreign exchange abuse, tax evasion, and sex crimes, all of which are being investigated. 

It was noted by investigators that the average length of time that the suspects had been evading was three years and six months, which underscores both the persistence of transnational fugitives as well as the scope of coordinated efforts that need to be undertaken to locate them. 

There has been a confirmation from the National Police Agency regarding the repatriation of 49 suspects linked to what has been regarded as the largest illegal casino operation ever uncovered, worth approximately 5.3 trillion KRW ($3.8 billion), and one of the largest illegal casino operations ever discovered.
Several suspected ringleaders who were returned were suspected of carrying out activities across borders and attracting the attention of international authorities, including the United Nations and the International Criminal Court. There are reports that forty-five of the individuals were subjects of Interpol Red Notices, reflecting the scope of the investigation, while domestic investigators have issued 154 warrants related to the case, indicating the scale of the investigation. 

As a result of this coordinated crackdown, a wide variety of charges have now been filed against these suspects, ranging from cybercrime to fraud to organised gambling to large-scale tax evasion, emphasising just how intricate and extensive the criminal enterprise was that had been dismantled. 

During the discussion, South Korean Ambassador Lee Sang-hwa highlighted the operation's broader significance as a turning point in Seoul and Manila's strategic partnership, describing it as a key moment in Seoul's relationship with Manila. 

A lot of attention has been paid to the mass repatriation, which served as a clear signal to fugitives that the Philippines would no longer serve as a sanctuary for them, and that offenders seeking refuge abroad would eventually be brought to justice if they were found guilty. 

It is worth noting that one of the fugitives returned, after successfully evading capture for more than sixteen years, had spent the majority of his time in hiding before he was found, while the remainder spent more than three years hiding before they were found. It is worth noting that the coordination of this action was the largest simultaneous return of fugitives from a single country ever, which demonstrates the degree of collaboration between the international community. 

Additionally, the ambassador noted that by collaborating with the Philippine Bureau of Immigration and the Korean National Police Agency, the Embassy was strengthening the bilateral cooperation as well as significantly enhancing the safety of citizens of both nations through enhanced cooperation between these organisations. 

During a recent policy forum organised jointly by The Korea Times and the Tourism Sciences Society of Korea, leading industry experts urged that an official task force be created in order to address the mounting issue of Korean nationals engaging in overseas gambling on an increasing scale. There has been an increase in South Korean gamblers overseas in 2017, according to data provided by the National Gambling Control Commission, with Macau and the Philippines being the most frequent destinations among South Koreans in 2017. 

According to Professor Lee Jae-seok of Gangneung-Wonju National University, it is believed that gambling markets are expanding far beyond these traditional hubs to emerging centers like Laos, Cambodia, and Vietnam while simultaneously shifting toward rapidly evolving online gambling platforms that are rapidly evolving.

It is of utmost importance that there be a permanent regulatory body that monitors and oversees gambling activities throughout the wider ASEAN region. A call for reform comes at a time when enforcement has been ramped up in recent years, with a gambling ring in Cambodia being dismantled recently and increased scrutiny of payment networks linked to illegal betting operations being intensified. 

As the latest wave of arrests and repatriations has demonstrated, not only is the South Korean government determined to rip apart sprawling gambling and fraud networks, but it is also an indication of how critical regional cooperation has become in fighting transnational crimes such as this. Due to the profusion of gambling hubs that are being established across Southeast Asia, as well as the rapid development of online platforms, law enforcement alone cannot carry the burden of deterrence. 

In order for South Korea to complement its compliance campaigns, there must be structural reforms-for example, the establishment of a permanent regulatory body that has the ability to track financial flows and monitor online platforms to coordinate intelligence with its ASEAN partners. Having a framework like this could aid in curbing illegal gambling at its root, reducing the costs and harms resulting from these operations, and boosting trust between governments and their citizens, working to protect them from these operations.

In addition to enforcement, a public awareness campaign and enhanced financial monitoring are also imperative in order to prevent such enterprises from getting the funding they need. These initiatives are ultimately going to be successful if South Korea is able to strike a balance between strong domestic regulation and proactive international engagement, thereby ensuring that criminal networks have fewer hiding places.

Muzaffarpur Man Loses ₹3.5 Lakh in Remote Access App Bank Fraud

 

A resident of Muzaffarpur, Bihar fell victim to a sophisticated remote access application scam that resulted in the loss of ₹3.5 lakh from his bank account. The cybercrime incident occurred when the victim was searching online for courier service assistance and discovered what appeared to be a legitimate customer support contact number through Google search results. 

Scam operation 

The fraudsters posed as courier service agents and initiated contact with the unsuspecting victim. During the conversation, the criminals convinced the man to download and install a remote access application on his mobile device, claiming it would help resolve his delivery-related issues. Once the victim granted remote access permissions to the application, the cybercriminals gained complete control over his smartphone and banking applications . 

Financial impact  

Within minutes of installing the malicious remote access software, the fraudsters executed multiple unauthorized transactions from the victim's bank account. The scammers managed to conduct seven separate high-value financial transfers, draining a total amount of ₹3.5 lakh from the man's banking accounts. The transactions were processed rapidly, taking advantage of the victim's digital banking credentials that were accessible through the compromised device . 

Broader criminal network 

Local police investigations have revealed that this incident is part of a larger interstate fraud syndicate operating across multiple states. The cyber crime cell has traced the fraudulent transactions to various bank accounts, suggesting a well-organized criminal network. Law enforcement agencies suspect that the scammers strategically place fake customer service numbers on internet search platforms, impersonating official service providers to target unsuspecting consumers.

Rising threat 

This case represents an alarming trend in cybercrime where fraudsters exploit remote desktop applications like AnyDesk and TeamViewer to gain unauthorized access to victims' devices. The scammers often target individuals seeking customer support for various services, including courier deliveries, utility bills, and other common consumer needs. These social engineering attacks have become increasingly sophisticated, with criminals creating convincing scenarios to pressure victims into installing malicious software. 

Prevention and safety measures 

Cybersecurity experts emphasize the importance of digital awareness and caution when dealing with unsolicited support calls or online search results. Users should verify customer service numbers directly from official websites rather than relying on search engine results. 

Additionally, individuals should never install remote access applications unless they are completely certain about the legitimacy of the requesting party. Financial institutions and telecom providers are working to implement enhanced fraud detection systems to identify and prevent such scams in real-time .

Fake eSIM Activation Fraud in India Raises Cybersecurity Concerns

 

The Indian Cybercrime Coordination Centre (I4C), operating under the Ministry of Home Affairs, has issued a warning about a new and highly sophisticated digital scam that leverages fake eSIM activation to commit financial fraud. Unlike traditional methods of cybercrime that require OTPs or ATM PINs, this scheme enables criminals to bypass such checks entirely, making it one of the most dangerous fraud tactics currently emerging.  

Authorities revealed that the scam typically begins with fraudsters making calls to potential victims, convincing them to click on a deceptive eSIM activation link. Once the user follows through, the individual’s physical SIM card is disabled and the number is seamlessly transferred to an eSIM-enabled device controlled by the attacker. This maneuver effectively gives the fraudster complete control over the victim’s mobile number, allowing them to intercept bank OTPs and authorize financial transactions without the user’s knowledge. In one case under investigation, close to ₹4 lakh was illegally withdrawn from an account using this method. 

The fraud takes advantage of the rising adoption of eSIM technology, which has been promoted as a convenient alternative to physical SIM cards since it allows remote provisioning. However, the same convenience has created a new opportunity for exploitation by cybercriminals. By seizing control of a victim’s number, scammers gain access to digital banking and payment systems with alarming ease. 

The alert follows closely after the Department of Telecommunications’ Financial Fraud Risk Indicator system flagged and blacklisted between 300,000 and 400,000 SIM cards suspected of being tied to financial scams. This system, supported by AI-driven tools, identifies around 2,000 high-risk numbers every day, with many linked to fraudulent activities such as fake investment opportunities and bogus job offers. 

Authorities have urged citizens to remain cautious when receiving unexpected calls or links related to eSIM activation. They emphasized that if a mobile device suddenly loses connectivity without explanation, users should treat it as a red flag. Immediate reporting to the telecom operator and the bank could prevent financial losses by cutting off the criminal’s access to transactions.  

Since its launch in January 2020, the I4C portal has functioned as a central platform for reporting and monitoring cybercrimes across the country. As digital transactions continue to grow and smartphones dominate personal and professional life, India has witnessed a sharp increase in online fraud cases. The latest warning from I4C highlights the need for vigilance as technology evolves, reminding users that convenience must always be balanced with awareness of potential risks.

Deepfake Video of Sadhguru Used to Defraud Bengaluru Woman of Rs 3.75 Crore


 

As a striking example of how emerging technologies are used as weapons for deception, a Bengaluru-based woman of 57 was deceived out of Rs 3.75 crore by an AI-generated deepfake video supposedly showing the spiritual leader Sadhguru. The video was reportedly generated by an AI-driven machine learning algorithm, which led to her loss of Rs 3.75 crore. 

During the interview, the woman, identifying herself as Varsha Gupta from CV Raman Nagar, said she did not know that deepfakes existed when she saw a social media reel that appeared to show Sadhguru promoting investments in stocks through a trading platform, encouraging viewers to start with as little as $250. She had no idea what deepfakes were when she saw the reel. 

The video and subsequent interactions convinced her of its authenticity, which led to her investing heavily over the period of February to April, only to discover later that she had been deceived by the video and subsequent interactions. During that time, it has been noted that multiple fake advertisements involving artificial intelligence-generated voices and images of Sadhguru were circulating on the internet, leading police to confirm the case and launch an investigation. 

It is important to note that the incident not only emphasises the escalation of financial risk resulting from deepfake technology, but also the growing ethical and legal issues associated with it, as Sadhguru had recently filed a petition with the Delhi High Court to protect his rights against unauthorised artificial intelligence-generated content that may harm his persona. 

Varsha was immediately contacted by an individual who claimed to be Waleed B, who claimed to be an agent of Mirrox, and who identified himself as Waleed B. In order to tutor her, he used multiple UK phone numbers to add her to a WhatsApp group that had close to 100 members, as well as setting up trading tutorials over Zoom. After Waleed withdrew, another man named Michael C took over as her trainer when Waleed later withdrew. 

Using fake profit screenshots and credit information within a trading application, the fraudsters allegedly constructed credibility by convincing her to make repeated transfers into their bank accounts, in an effort to gain her trust. Throughout the period February to April, she invested more than Rs 3.75 crore in a number of transactions. 

 After she declined to withdraw what she believed to be her returns, everything ceased abruptly after she was informed that additional fees and taxes would be due. When she refused, things escalated. Despite the fact that the investigation has begun, investigators are partnering with banks to freeze accounts linked to the scam, but recovery remains uncertain since the complaint was filed nearly five months after the last transfer, when it was initially filed. 

Under the Bharatiya Nyaya Sanhita as well as Section 318(4) of the Information Technology Act, the case has been filed. Meanwhile, Sadhguru Jaggi Vasudev and the Isha Foundation formally filed a petition in June with the Delhi High Court asking the court to provide him with safeguards against misappropriation of his name and identity by deepfake content publishers. 

Moreover, the Foundation issued a public advisory regarding social media platform X, warning about scams that were being perpetrated using manipulated videos and cloned voices of Sadhguru, while reaffirming that he is not and will not endorse any financial schemes or commercial products. It was also part of the elaborate scheme in which Varsha was added to a WhatsApp group containing almost one hundred members and invited to a Zoom tutorial regarding online trading. 

It is suspected that the organisers of these sessions - who later became known as fraudsters - projected screenshots of profits and staged discussions aimed at motivating participants to act as positive leaders. In addition to the apparent success stories, she felt reassured by what seemed like a legitimate platform, so she transferred a total of 3.75 crore in several instalments across different bank accounts as a result of her confidence in the platform. 

Despite everything, however, the illusion collapsed when she attempted to withdraw her supposed earnings from her account. A new demand was made by the scammers for payment of tax and processing charges, but she refused to pay it, and when she did, all communication was abruptly cut off. It has been confirmed by police officials that her complaint was filed almost five months after the last transaction, resulting in a delay which has made it more challenging to recover the funds, even though efforts are currently being made to freeze the accounts involved in the scam. 

It was also noted that the incident occurred during a period when concern over artificial intelligence-driven fraud is on the rise, with deepfake technology increasingly being used to enhance the credibility of such schemes, authorities noted. In April of this year, Sadhguru Jaggi Vasudev and the Isha Foundation argued that the Delhi High Court should be able to protect them from being manipulated against their likeness and voice in deepfake videos. 

In a public advisory issued by the Foundation, Sadhguru was advised to citizens not to promote financial schemes or commercial products, and to warn them against becoming victims of fraudulent marketing campaigns circulating on social media platforms. Considering that artificial intelligence is increasingly being used for malicious purposes in this age, there is a growing need for greater digital literacy and vigilance in the digital age. 

Despite the fact that law enforcement agencies are continuing to strengthen their cybercrime units, the first line of defence continues to be at the individual level. Experts suggest that citizens exercise caution when receiving unsolicited financial offers, especially those appearing on social media platforms or messaging applications. It can be highly effective to conduct independent verification through official channels, maintain multi-factor authentication on sensitive accounts, and avoid clicking on suspicious links on an impulsive basis to reduce exposure to such traps. 

Financial institutions and banks should be equally encouraged to implement advanced artificial intelligence-based monitoring systems that can detect irregular patterns of transactions and identify fraudulent networks before they cause significant losses. Aside from technology, there must also be consistent public awareness campaigns and stricter regulations governing digital platforms that display misleading advertisements. 

It is now crucial that individuals keep an eye out for emerging threats such as deepfakes in order to protect their personal wealth and trust from these threats. Due to the sophistication of fraudsters, as demonstrated in this case, it is becoming increasingly difficult to protect oneself in this digital era without a combination of diligence, education, and more robust systemic safeguards.

Ghaziabad eSIM Fraud: Woman Loses ₹18.5 Lakh in Sophisticated SIM Swap Scam

 

A 54-year-old resident of Shipra Suncity, Indirapuram, Ghaziabad, fell victim to a sophisticated eSIM fraud that resulted in the loss of ₹18.48 lakh from her bank accounts. Arti Kaul was targeted by cybercriminals who posed as Airtel customer service representatives to execute an elaborate SIM swap scam. 

Fraudulent call 

On August 29, 2025, at approximately 1:00 PM, Kaul received a phone call from fraudsters claiming to be Airtel representatives. The callers convinced her that she needed to upgrade her SIM card from 4G to 5G as per company policy, presenting the upgrade as mandatory. Unaware of the deceptive nature of the call, Kaul stayed on the line with the fraudsters throughout the process.

Technical manipulation

At 1:10 PM, Kaul received an SMS from Airtel containing an OTP for eSIM card activation. Following this, she received a long numerical message on WhatsApp, along with subsequent SIM card update-related messages and additional calls from both the fraudsters and legitimate Airtel representatives. The victim shared the OTP with the callers, inadvertently giving them access to activate an eSIM on their own device, effectively hijacking her phone number. 

Once the fraudsters gained control of Kaul's phone number through the eSIM activation, they systematically drained her bank accounts. The theft occurred through more than 50 separate transactions between August 31 and September 1, 2025, targeting both her Axis Bank and HDFC Bank accounts. The total amount stolen reached ₹18.48 lakh. 

Discovery and legal action

Kaul discovered the fraud when her SIM card became inactive and she stopped receiving messages. Upon visiting her banks, employees informed her about the unauthorized transactions that had occurred over the previous days. She subsequently filed a complaint with the cyber crime police station, and an investigation has been launched.

This incident highlights the growing threat of eSIM-based fraud in India, where criminals exploit the convenience of digital SIM technology to rapidly hijack mobile numbers and access victims' financial accounts through intercepted OTPs. 

Safety tips 

Never share OTPs or activation codes: Avoid sharing one-time passwords (OTPs), eSIM activation codes, or QR codes with anyone, even if they claim to be from your telecom provider. No legitimate company will request these details over phone or SMS. 

Use only official channels: Always request eSIM conversions or upgrades directly through official carrier apps, websites, or physical stores. Do not click on unknown links, and never proceed with eSIM activation from unsolicited messages or calls . 

Act fast on signal loss: If your phone unexpectedly loses network signal or displays “No Service,” immediately report the issue to your mobile operator and notify your bank. This could indicate that your number has been hijacked.

Stay alert for phishing attempts: Be wary of calls, emails, or texts asking for personal, banking, or SIM-related information. Always verify the identity of the sender by reaching out through the provider’s verified customer care number. 

Monitor account activity: Regularly review bank and mobile account activity for unauthorized transactions or account changes. Set up alerts where available for any transaction or SIM change activity.

Following these safety steps drastically reduces the risk of eSIM-based fraud and helps in swift detection of account compromise.

Hackers Target Brazilian Payments Provider in Attempted $130 Million Theft

 



A concerning cyber incident has shaken Brazil’s financial technology sector after criminals attempted to steal nearly $130 million through the country’s real-time payments network, Pix. The breach was detected on August 29, 2025, when Sinqia S.A., a São Paulo-based financial software company owned by Evertec, noticed unauthorized activity in its systems.


What Happened

According to Evertec’s disclosure to the U.S. Securities and Exchange Commission, attackers gained entry into Sinqia’s Pix environment and tried to initiate unauthorized business-to-business transfers. Pix, operated by the Central Bank of Brazil, is an instant payments platform that has become the country’s most widely used method for digital transfers since its launch in 2020.

The attempted theft targeted two financial institutions connected to Sinqia’s services. Once the suspicious activity was detected, Sinqia suspended all Pix-related transactions and brought in external cybersecurity experts to investigate.


How the Attackers Broke In

Initial findings show that the hackers gained access by using stolen credentials belonging to an IT service provider. By leveraging legitimate login details, they were able to penetrate Sinqia’s Pix environment and attempt large-scale transfers. This method, often referred to as a supply chain or vendor compromise, has become increasingly common in financial cyberattacks because it exploits trusted third-party relationships.

So far, Evertec has found no evidence that the breach extended beyond Sinqia’s Pix systems or that customer data was exposed.


Response and Recovery

As a precaution, the Central Bank of Brazil revoked Sinqia’s access to Pix until it can confirm the environment is secure. This suspension directly affects 24 financial institutions that rely on Sinqia to process instant transfers. The company has stated that some of the stolen funds have already been recovered, though it has not disclosed the amount. Recovery efforts are still underway, and the overall financial and reputational impact remains uncertain.

Evertec acknowledged that the consequences could be “material,” particularly in relation to customer trust and the company’s internal controls. Investigations are ongoing, and Sinqia continues to work with regulators and forensic experts to restore secure access to Pix.


Why This Matters

The case stresses upon the risks facing modern payment systems that operate at high speed and high volume. Pix is widely used in Brazil for everything from personal transfers to business payments, making it an attractive target for cybercriminals. By exploiting vendor credentials, attackers can bypass traditional defenses and reach critical financial infrastructure.

For banks, service providers, and regulators, the incident underscores the importance of constant vigilance, strict vendor oversight, and layered defenses against credential theft. For users, it is a reminder of both the convenience and the risks that come with instant payment systems.

Investigations are still unfolding, and more details are expected in the coming weeks as Evertec and Brazilian authorities work to close the breach and strengthen protections.