Delhi Police busted a fake call centre involved in duping people on the pretext of redeeming gift cards. The police have arrested 12 people linked with the case.
The arrested people have been identified as Adarsh, Naveen, Pradeep, Md. Saifuddin, Nitin, Praveen Chauhan, Rahul, Brijesh, Sahiba Khatun alias Twinkle, Abha, Monika and Mohit Verma.
Police had received information that a call centre involved in duping US citizens was operating at IGNOU Road, Neb Sarai. Following that a team was formed and a trap was laid on the intervening night of June 30 near Balhara Hospital, IGNOU Road. “On pointing out of informer a raid was conducted and it was found that a setup of computers and accessories were installed in the premises. Several persons were receiving the calls and were engaged in communicating with the victims. They were impersonating themselves as Amazon representative,” stated the police release.
Police have also recovered nine desktop systems along with an internet router and TP-link modems from the accused’s possession.
“By using computer Apps- Team Viewer, Zoho Assist, they dupe the victim and cause the wrongful loss through gift cards redeemed on Amazon,” said police.
Cases have been registered under Sections 419/420/120B/34 of IPC.
Last month, the Pune police filed a charge sheet against a former IPS offer and a cyber expert in connection with an alleged multi-crore cryptocurrency fraud, following their arrest in March for cheating investigators by fraudulently transferring money worth crores from digital wallets to their accounts, the police had said.
Patil, who had taken voluntary retirement from the Indian Police Service, and Ghode were roped in by the Pune police to investigate two cryptocurrency cases registered in 2018 as digital currency was a technical issue.
The police had alleged that Patil, during the course of the investigation, transferred some of the cryptocurrencies in his account and Ghode provided screenshots of the accounts to police by manipulating the figures.
Paytm Shares Jump to Six-Month High on Increased Monthly Users, More Payment Devices, Surge in Revenue
Shares of Indian digital payments firm Paytm jumped more than 6 percent on Monday to their highest levels in nearly six months, after the company’s parent firm One 97 Communications Ltd posted an 89 percent surge in its quarterly revenue.
Higher number of monthly users, additional payment devices, and more disbursal of loans lifted the company’s revenue to Rs 1,680 crore, from Rs. 891 crore last year.
Investors appeared to show scant response to the company’s wider loss of Rs. 644 crore posted in its quarterly update after market close on Friday.
“The notable print in the results was a sharply increased gross margin print in payments business resulting in expansion in contribution margins to 13bps,” JP Morgan analysts said in a note on Monday.
Processing charges of the company, backed by China’s Ant Group and Japan’s SoftBank Group, fell 10.4 percent to Rs. 694 crore sequentially.
“The management clarified that it could negotiate better deals with their bank partners, and rationalised certain low margin online merchant accounts that resulted in lower payment processing charges,” Macquarie analysts said in a note.
Shares of the company were up 6 percent at Rs. 830, as of 06:48am GMT (12:18pm IST).
“Earlier this year, we had shared that we would achieve operating profitability by September 2023, driven by better monetisation, as well as moderating growth in costs. The first quarter of the financial year 2023 results exhibit our strategy is well-in-place, with focused improvement on unit economics, better expense management and an increasing mix of higher margin businesses (such as financial services and commerce) steering us on the path to profitability,” the firm stated on Friday.
Hackers Plant Chinese Flag on Taiwan Government Websites Over Nancy Pelosi Visit
In response to US House Speaker Nancy Pelosi’s visit to Taiwan, Chinese hackers planted the flag of China on the websites of several local government agencies across Taiwan. While China’s live-fire drills encircling Taiwan were taking place from Thursday, Chinese hackers covered a Kaohsiung government website with a China flag picture for over 10 hours from late Friday to Saturday morning, reported Taiwan News.
On Friday morning, it was admitted that the website of Taiwan’s Ministry of Foreign Affairs crashed for a few hours on Aug 2, 4, and 5.
The ministry explained there was a brute force attempt to crash the server, with up to 17 million times per minute access attempts from numerous Chinese and Russian IP addresses, reported Taiwan News.
As a result, central government agencies were told to stay on high alert for malicious internet activities.
People familiar with the matter told Taiwan News that central government agencies have been ordered to keep tabs on websites and report problems up the chain of command to the Cabinet, every hour from Friday to noon on Monday (August 8).
Emergency response guidelines issued by the Cabinet on Friday say a website has to be taken down immediately if it has been hacked.
Furthermore, the Ministry of Education informed schools nationwide of its own emergency response guidelines to ensure cybersecurity, in which 24-hour security monitoring of each school website and an hourly update is required until next Monday, reported Taiwan News.
As the tensions in the Taiwan strait heightened soon with US House Speaker Nancy Pelosi’s visit to Taiwan, China has been increasing its military activities.
Multiple Chinese planes and ships were detected around Taiwan Strait, simulating an attack on its main island, the Defence Ministry said on Saturday adding that some of them have crossed the median line.
According to the Ministry of National Defense, the armed forces responded to such a situation accordingly with surveillance systems, CAP aircraft, naval vessels and missile systems.
“Multiple PLA craft were detected around Taiwan Strait, some have crossed the median line. Possible simulated attack against HVA. #ROCArmedForces have utilized alert broadcast, aircraft in CAP, patrolling naval vessels, and land-based missile systems in response to this situation,” Taiwan’s Ministry of National Defence tweeted today.
Yesterday, Taiwan’s Defence Ministry said that 68 Chinese military planes and 13 warships crossed over the median line to participate in drills.
Taiwan Premier Su Tseng-chang blasted what he called “the evil neighbour” after China encircled the self-ruled island with a series of huge military drills that were condemned by the United States and other Western allies.
China is holding threatening military exercises in six zones off Taiwan’s coasts that it says will run through Sunday. Missiles have also been fired over Taiwan, defence officials told state media. The speaker is the highest-ranking US politician to visit Taiwan in 25 years.
China opposes the self-governing island having its own contacts with foreign governments, but its response to the Pelosi visit has been unusually vociferous.
Provident Fund Data of 28 Crore Indians Leaked By Hackers, Claims Ukraine Based Researcher
Provident Fund (PF) data of about 28 crore Indians was found to have been leaked by hackers earlier this month. A cybersecurity researcher from Ukraine, Bob Diachenko, made the discovery on August 1 and found that details such as Universal Account Number (UANs), names, marital status, Aadhaar details, gender, and bank account details were exposed online. According to Diachenko, he found two different internet protocol (IP) addresses hosting two clusters of leaked data. Both of these IPs were hosted on Microsoft’s Azure cloud storage service.
Cybersecurity researcher Bob Diachenko detailed the leak in a post on LinkedIn. On August 2, Diachenko discovered two separate IP clusters of data that contained indices called UAN. Upon reviewing the clusters, he found that the first cluster contained 280,472,941 records, whereas the second IP contained 8,390,524 records.
“After quick review of the samples (using a simple browser), I was sure that I am looking at something big and important”, Diachenko said in his post. However, he was not able to find who owned the data. Both the IP addresses were hosted on Microsoft’s Azure platform and were India-based. He wasn’t able to obtain other information via a reverse DNS analysis.
The Shodan and Censys search engines from Diachenko’s SecurityDiscovery firm found these clusters on August 1. However, it is not clear how long the information was available online. The data could’ve been misused by hackers to gain access to the PF account. Data such as name, gender, Aadhaar details, could also be used to create fake identities and documents.
The researcher tagged the Indian Computer Emergency Response Team (CERT-In) in a tweet informing them about the leak. The CERT-In replied to his tweet asking him to provide a report of the hack in an email. Both IP addresses were taken down within 12 hours after his tweet. Diachenko says that since August 3, no company or agency has come forward to take responsibility for the hack
social3 weeks ago
Sendit, Yolo, NGL: Anonymous Social Apps Are Taking Over Once More, but They Aren’t Without Risks
social4 weeks ago
US Senators Fear Facebook, Instagram Parent Meta Censoring Abortion Posts
mobiles4 weeks ago
Nokia C21 Plus With 13-Megapixel Dual Cameras, 3-Day Battery Life Launched in India: Price, Specifications
Tablets4 weeks ago
Nokia T10 Tablet With 8-Inch HD Display, 5,100mAh Battery Announced: All Details
Cryptocurrency4 weeks ago
S. Korea’s SK Telecom to Develop Web3-Powered Crypto Wallet Despite Ongoing Slump
Android3 weeks ago
How to reserve a Samsung Galaxy Z Fold 4 or Flip 4 & get up to $200 in credit
Android3 weeks ago
Should you buy the new Google Pixel 6a or the OG Pixel 6?
Android3 weeks ago
Get a 256GB Samsung Galaxy S22 for just $100