मोबाइल चोरी और फिर UPI से अकाउंट खाली.. मार्केट में आया सबसे लेटेस्ट फ्रॉड

मोबाइल चोरी और फिर UPI से अकाउंट खाली.. मार्केट में आया सबसे लेटेस्ट फ्रॉड

Brief Summary

Amit bhai is talking about the latest cyber fraud trends, focusing on how criminals exploit vulnerabilities in UPI and other systems. He also discusses mule accounts, data breaches, and the importance of awareness and prevention. Key takeaways include securing your SIM card, disabling SMS visibility in lock mode, and understanding that you are not immune to cyber threats.

  • Securing your SIM card with a PIN is crucial.
  • Disabling SMS visibility in lock mode prevents OTP theft.
  • Mule accounts are used to launder money, making it difficult to trace.
  • Data breaches are a significant source of information for criminals.
  • Awareness and prevention are key to protecting yourself from cyber fraud.

Latest UPI Fraud and Prevention

Amit bhai shares a recent case from Nagpur where criminals are stealing money via UPI after stealing iPhones. They exploit a feature that allows UPI payments on feature phones using *99#, and reset UPI PINs without the old PIN. To prevent this, he suggests setting a PIN lock on your SIM card, using an eSIM, and disabling SMS visibility in lock mode to protect OTPs.

The Mindset Behind Cybercrime

Amit bhai talks about how criminals are driven by easy money and operate within organized systems involving lakhs of people internationally. Masterminds are often located in places like Dubai and Singapore, living lavish lifestyles. India loses approximately ₹1 lakh crore annually to cybercrime, with only a small fraction being recovered. He also mentions cases of people being lured to countries like Laos and forced to commit cyber fraud under torture.

Mule Accounts and How They Work

Amit bhai explains how mule accounts are created and used to launder money. This involves recruiting students with promises of easy money, or opening accounts using fake KYC documents with the help of corrupt bank employees. These accounts are then used to receive and transfer illicit funds, making it difficult to trace the money back to the criminals. The individuals involved are often unaware of the larger scheme.

The Importance of Data Privacy and Awareness

Amit bhai highlights that cybercrime often starts with data breaches. Criminals use stolen personal information, such as insurance details or pizza order history, to gain trust and trick people into installing malicious apps or sharing sensitive information. He emphasizes the importance of being aware of data leaks and understanding how criminals use this information to exploit vulnerabilities.

Real-World Example of Security Vulnerabilities

Amit bhai shares an experience from a security assessment at a US bank. Despite the bank's long history without incidents, he found a vulnerability by focusing on their third-party vendors. He discovered that the bank's law firm had a non-DMARC compliant email server, allowing him to spoof emails and obtain sensitive documents from the bank's CFO. This illustrates that security extends beyond an organization's own defenses and includes the security of its partners and vendors.

Share

Summarize Anything ! Download Summ App

Download on the Apple Store
Get it on Google Play
© 2024 Summ