Sunday, October 26, 2008

CYBERSTALKING

CASE OF CYBERSTALKING

Little did Seema Khanna (name changed), an employee with an embassy in New Delhi, know that web surfing would lead to an invasion of her privacy.In an apparent case of cyber stalking, Khanna (32) received a series of e-mails from a man asking her to either pose in the nude for him or pay Rs 1 lakh to him. In her complaint to Delhi Police, the woman said she started receiving these mails in the third week of November.
The accused threatened Khanna that he would put her morphed pictures on display at sex websites , along with her telephone number and address. He also allegedly threatened to put up these pictures in her neighbourhood in southwest Delhi."Initially, she ignored the mails , but soon she started receiving letters through post, repeating the same threat. She was forced to report the matter to the police," said an officer with cyber crime cell.That, however, was not the end of her ordeal. The accused mailed the woman her photographs. The woman claimed these were the same photographs which she had kept in her mail folder. The police said the accused had hacked her e-mail password which enabled him to access the pictures.
A preliminary inquiry into the complaint has revealed that the mails were sent to the victim from a cyber cafe in south Delhi. "We hope to trace the accused soon," said deputy commissioner of police (crime) Dependra Pathak. The police feel the accused might be known to the victim as he seemed to know a lot about her.The cyber stalker can be booked under Section 509 of the IPC for outraging the modesty of a woman and also under the Information Technology Act, 2000.
NET CRIME
• Woman threatened by cyber stalker who managed to get her photographs from her mail folder.
• In another case, a housewife started receiving obscene calls from across the world after a hacker flashed her details on the Net.
• Delhi Police set up two computer training centres this year to enable its staff to investigate cyber crime.
• The police admit IT Act, 2000 is not enough to deal with cyber crime.
USEFUL LINKS

Thursday, October 9, 2008

Techie turns credit card crook

Techie turns credit card crook

30 Aug 2008, 0624 hrs IST,TNN
HYDERABAD: The Task Force police apprehended a techie who used his skills to cheat many by withdrawing money from their credit cards through fraudulent means. Suggishetti Venkata Naga Rajesh, 27, is the proprietor of Pragathi Enterprises and Tanmayi Enterprises in SR Nagar. On Tuesday the Task Force officials raided his flat at Gagan Vihar, Begumpet, and seized a car, laptop, scannercum-printer , fake driving licences , PAN cards, credit cards obtained in a fraudulent manner, gold jewellery and 10 cell phones.
Rajesh, a native of Eluru town in West Godavari, finished B Com (computers) at KAHL Degree College in 2002. After finishing the course, he enhanced his software skills by learning software like Visual basic, VC++, Oracle, SAP, .Net, Java, core Java, 2D and 3D animation. Rajesh worked as a faculty member at various institutes in New Delhi for four years before he came here and settled down in April 2006. In the city, he started a software company Dhanush InfoTech at Shyamlal Building, Begumpet, and designed database management software for various business establishments like Blue Fox, Minerva, Chutneys and Intelli Group. According to Task Force DCP V B Kamalasan Reddy, Rajesh used his 'soft skills' to gain money in illegal ways. To begin with, the accused started a direct sales agency Pragathi Enterprises and Tanmayi Enterprises at SR Nagar.
By taking up freelance work from various registered direct sales agencies, who get credit card promotion works from various banks, Rajesh exploited loopholes in the system for wrongful gain. Rajesh then gave advertisements in newspapers and appointed four telecallers and an office boy. The telecallers used to target credit card holders . They called on the phone numbers in yellow pages and those found on a website, and enquired whether the creditcard holders needed credit cards of other banks. "Once a customer shows inclination, Rajesh used to send one of his employees to collect all the particulars of the person, including the details of the existing card," Task Force inspector V Shyam Babu said. Using this method, Rajesh collected credit card particulars of 140 persons in the city and chose a few high value credit cards for cheating. After the selection of 'targets' , Rajesh used to take a house on rent in an upmarket locality, call the call centre of a particular credit card customer , request for change of the address of the original cardholder to his temporary rented house, by furnishing the personal details of the card holder and with that he obtained new credit cards of his 'targets' .
Once he obtained a card, within two days he used to withdraw the cash up to the credit limit. Rajesh also took personal loan in the name of the credit card holders and received the demand draft at the changed address. After encashing it, he used to vacate the house immediately. "He used to collect passport size photos of unknown persons from photo studios by paying huge amounts, make calls to the banks for requesting change of address from the SIM cards purchased on fake names," Shyam Babu said.In the last one year, Rajesh cheated 12 persons of Rs 21 lakh. The accused along with the seized property were handed over to the Begumpet police for investigation.

Tuesday, October 7, 2008

Infinity Fraud case of Rs. 2 Million

Infinity Fraud case of Rs. 2 Million – Name Mr.Kumar (name changed), Savings A/c no- 123456

There were Internet transactions in a savings bank a/c123456 of a customer Mr. Kumar within a week amounting to Rs 20, 00,000. The amount has been transferred to same Bank’s a/c no 100100 of Mr. Super tramp .As per customer these transactions were not done by him.
Total of 20.0 L were transferred to the account of Mr. Super Tramp, the beneficiary a/c was frozen after knowing about the unauthorized transaction. The culprit had withdrawn 2L via ATM by the time it was detected and a/c got freezed.
Modus Operandi of the accused and findings:

About Hacker (Mr. Super tramp)
The accused was a 20 years 12th failed guy from a very low economic background. He started as a passion to learn hacking after doing a brief course in computer basics. He used to chat on yahoo messenger posing as a girl. He started learning hacking from other chat friends and through them came to know about a site called www.prorat.net .This site offers software packages which if used for negative purpose can be used for hacking. He used the free prorat version 1.9 which is available on the site.

The Trap
He used to chat with people posing as girl and when they would request for his photo he used to give Trojan infected photo along with a blinder, in .exe format.
When the requester used to download the photo on his system the Trojan virus would infect his system and work as a key- logger and prepare a log file of the system recording each keystroke .All the details on this infected system would automatically be updated to the hacker.
By using this data he used to get details like user name password transaction password of the person .In this case he was chatting with some Mr. Sharma and through the system of Mr. Sharma he found out details of Mr. Kumar’s account. Mr. Kumar when he was in India had checked his account balance on this system of his friend..

With details collected from hacking, he logged into Bank Internet banking a/c of Mr. Kumar, and came to know that given account had large balance in it. He then planned to transfer the amount to some dummy a/c, then he chose Saving A/c of the same bank as it easy way to do transfers from same bank a/c. He prepared fake documents by paying agent of RTO for driving license, and with the help of branch walking-in, he received the joining kit, and started the process of transferring the money from Mr. Kumars a/c.
Internet Money Transfer
Going through Mr. Kumar’s a/c he came to know that no mobile number has been registered for this a/c and hence he got dummy pre-paid mobile number as prepaid card did not require any document during activation, he got the same easily. He added the same mobile number and registered Mr. Kumar for mobile alerts.
The accused also managed to bribe a bank insider to get few more details which he needed to validate the transfer.
The accused Mr. Super tramp was able to hack many a/c’s with different banks, and was lucky to find an account with a large balance.
With the help of ATM clippings of the withdrawals on the accused a/c, the accused was recognized by one of the bank official and was later caught and was put to police remand.
This case of internet fraud happened with an MNC known for its robust and intact internet banking website with all filters to check a fraudster to enter the system.
The logic and efforts put in by a 12th fail, 20 yrs guy highlighted the vulnerability of public awareness and banking security systems.