Search This Blog

Powered by Blogger.

Blog Archive

Labels

Footer About

Footer About

Labels

Showing posts with label cybercrime awareness. Show all posts

Fake eSIM Activation Fraud in India Raises Cybersecurity Concerns

 

The Indian Cybercrime Coordination Centre (I4C), operating under the Ministry of Home Affairs, has issued a warning about a new and highly sophisticated digital scam that leverages fake eSIM activation to commit financial fraud. Unlike traditional methods of cybercrime that require OTPs or ATM PINs, this scheme enables criminals to bypass such checks entirely, making it one of the most dangerous fraud tactics currently emerging.  

Authorities revealed that the scam typically begins with fraudsters making calls to potential victims, convincing them to click on a deceptive eSIM activation link. Once the user follows through, the individual’s physical SIM card is disabled and the number is seamlessly transferred to an eSIM-enabled device controlled by the attacker. This maneuver effectively gives the fraudster complete control over the victim’s mobile number, allowing them to intercept bank OTPs and authorize financial transactions without the user’s knowledge. In one case under investigation, close to ₹4 lakh was illegally withdrawn from an account using this method. 

The fraud takes advantage of the rising adoption of eSIM technology, which has been promoted as a convenient alternative to physical SIM cards since it allows remote provisioning. However, the same convenience has created a new opportunity for exploitation by cybercriminals. By seizing control of a victim’s number, scammers gain access to digital banking and payment systems with alarming ease. 

The alert follows closely after the Department of Telecommunications’ Financial Fraud Risk Indicator system flagged and blacklisted between 300,000 and 400,000 SIM cards suspected of being tied to financial scams. This system, supported by AI-driven tools, identifies around 2,000 high-risk numbers every day, with many linked to fraudulent activities such as fake investment opportunities and bogus job offers. 

Authorities have urged citizens to remain cautious when receiving unexpected calls or links related to eSIM activation. They emphasized that if a mobile device suddenly loses connectivity without explanation, users should treat it as a red flag. Immediate reporting to the telecom operator and the bank could prevent financial losses by cutting off the criminal’s access to transactions.  

Since its launch in January 2020, the I4C portal has functioned as a central platform for reporting and monitoring cybercrimes across the country. As digital transactions continue to grow and smartphones dominate personal and professional life, India has witnessed a sharp increase in online fraud cases. The latest warning from I4C highlights the need for vigilance as technology evolves, reminding users that convenience must always be balanced with awareness of potential risks.

New Phishing Scam Uses Fake Credit Card Emails to Spread Info-Stealing Malware

 

A new wave of phishing emails is targeting unsuspecting users with what appears to be a harmless message from their credit card company—but behind that official-looking facade lies a dangerous malware threat.

According to a report by Cybernews, cybercriminals are sending fake emails that warn recipients about recent credit card activity, urging them to confirm or verify a transaction. These emails mimic genuine alerts from financial institutions and appear convincing at first glance. However, the real danger lies within the attachment or link included in the message.

Rather than a standard PDF or receipt, the attachment hides a .LNK file—commonly used for Windows shortcuts—disguised as an HTML page or pop-up. When clicked, it redirects the user to a seemingly legitimate website designed to hold their attention. Meanwhile, in the background, a multi-stage malware infection quietly begins.

One of the key techniques used in this attack is known as Reflective DLL Injection, which loads malicious code directly into the system's memory—specifically targeting Chrome browsers. This allows hackers to bypass traditional antivirus detection and gain deep access to the user’s device.

“The hackers can then proceed with any additional attacks including keylogging, data theft and creating a backdoor on the infected computer,” the report notes.

Once compromised, the infected device becomes a goldmine for attackers. They can log keystrokes, steal browser history, capture passwords, harvest credit card numbers, and even take over accounts—leading to financial fraud or identity theft.

To avoid falling victim, users are advised to exercise caution with any unexpected email that urges action, especially those involving money or security. Instead of clicking on links or attachments, visit the company’s official website by manually entering the URL, or access your account via their official app.

Additional cybersecurity measures can offer crucial layers of protection:

  • Enable two-factor or multi-factor authentication to block unauthorized access even if credentials are stolen.
  • Use a password manager to create and securely store complex, unique passwords across all online accounts.
  • Install trusted antivirus software with features like browser protection, real-time scanning, and a VPN to guard against shady websites and network threats.

As phishing scams continue to evolve, staying alert and informed is the best defense. If an email seems too urgent, too alarming, or too convenient—pause, verify, and protect your data.

FBI Busts 270 in Operation RapTor to Disrupt Dark Web Drug Trade

 

Efforts to dismantle the criminal networks operating on the dark web are always welcome, especially when those networks serve as hubs for stolen credentials, ransomware brokers, and cybercrime gangs. However, the dangers extend far beyond digital crime. A substantial portion of the dark web also facilitates the illicit drug trade, involving some of the most lethal substances available, including fentanyl, cocaine, and methamphetamine. In a major international crackdown, the FBI led an operation targeting top-tier drug vendors on the dark web. 

The coordinated effort, known as Operation RapTor, resulted in 270 arrests worldwide, disrupting a network responsible for trafficking deadly narcotics. The operation spanned the U.S., Europe, South America, and Asia, and confiscated over 317 pounds of fentanyl—a quantity with the potential to cause mass fatalities, given that just 2 pounds of fentanyl can be lethal to hundreds of thousands of people. While the dark web does provide a secure communication channel for those living under oppressive regimes or at risk, it also harbors some of the most heinous activities on the internet. 

From illegal arms and drug sales to human trafficking and the distribution of stolen data, this hidden layer of the web has become a haven for high-level criminal enterprises. Despite the anonymity tools used to access it, such as Tor browsers and encryption layers, law enforcement agencies have made significant strides in infiltrating these underground markets. According to FBI Director Kash Patel, many of the individuals arrested believed they were untouchable due to the secrecy of their operations. “These traffickers hid behind technology, fueling both the fentanyl epidemic and associated violence in our communities. But that ends now,” he stated. 

Aaron Pinder, unit chief of the FBI’s Joint Criminal Opioid and Darknet Enforcement team, emphasized the agency’s growing expertise in unmasking those behind darknet marketplaces. Whether an individual’s role was that of a buyer, vendor, administrator, or money launderer, authorities are now better equipped than ever to identify and apprehend them. Although this operation will not completely eliminate the drug trade on the dark web, it marks a significant disruption of its infrastructure. 

Taking down major players and administrators sends a powerful message and temporarily slows down illegal operations—offering at least some relief in the fight against drug-related cybercrime.

India Blocks 17,000 WhatsApp Accounts to Combat Digital Arrest Fraud

 

In a decisive move against rising cyber fraud, the Ministry of Home Affairs (MHA) has blocked over 17,000 WhatsApp accounts allegedly involved in digital arrest scams. Sources revealed that many of these accounts were traced to countries such as Cambodia, Myanmar, Laos, and Thailand, where they were reportedly used for fraudulent activities.

This crackdown was spearheaded by the Home Ministry's cybercrime coordination centre, acting on complaints submitted by victims through online platforms. The Ministry reviewed these complaints, identified suspicious accounts, and instructed WhatsApp to take action.

The action follows an investigative report by India Today, which uncovered operations of fraudulent call centres based in Cambodia, Myanmar, and Laos. These call centres, often located in Chinese-owned casinos in Cambodia, are linked to large-scale cyber fraud. Investigations also revealed a disturbing connection to human trafficking, where Indian citizens are lured to Cambodia with job promises and then coerced into executing online scams.

"Digital arrest" scams involve fraudsters impersonating law enforcement officials, such as CBI agents, income tax officers, or customs agents, to extort money. Victims are intimidated with false accusations of illegal activities and pressured to transfer large sums of money.

Prime Minister Narendra Modi recently issued a public warning, urging citizens to stay vigilant and report such incidents to the cyber helpline.

Home Ministry cyber wing sources estimate that scammers have been siphoning off approximately ₹6 crore daily through these frauds. Between January and October this year, digital arrest scams accounted for ₹2,140 crore in losses, with 92,334 cases reported during the period.