Hot Deal

No OTPs Asked, Just Missed Calls! Delhi Man Loses Rs. 50 Lakh in Cyber-Fraud

698°
Savings Mentor
some1anywhere

No OTPs Asked, Just Missed Calls! Delhi Man Loses Rs. 50 Lakh in Cyber-Fraud: https://www.indiatimes.com/trending/wtf/jamtara...

Cybercriminals stole Rs 50 lakh from the director of a security services company in south Delhi by constantly calling his phone and leaving blank and unanswered voicemails. 

Strangely, they didn't ask for a one-time password.

The victim received multiple calls between 7 and 8:45 p.m. on 10th October. He picked up some while ignoring others when there was silence on the other side.

His only texts when he checked his phone were regarding RTGS (instant fund transfer) transactions amounting to nearly half a crore.

According to reports, the police suspect the criminals may have used a technique known as a "SIM switch."

It's possible that they called in to initiate the RTGS transfer and activate the OTP. It's possible that they overheard the IVR of a nearby call mentioning the OTP.

It would mean that cybercriminals have been going after people all over the country in this way, which is a relatively new way of doing things.

Expired
40 Comments  |  
27 Dimers
  • Sort By
Finance Ninja Finance Ninja
Link Copied

Thanks,ab kisiko call bhi nahi karunga from my Banking Number unamused

that's why I use 2 SIMs (Calling SIMs should not be linked to any Finance Related things)

Deal Cadet Deal Cadet
Link Copied

WTF unamused

Benevolent Benevolent
Link Copied

OMG....
Desh Badd rah hai...
I receive calls from more than 5 unknown numbers on daily basis o.O
What if they loot my 100 crs toungueout (But this is an issue of conern sad )

Flame Flame
Link Copied

Baat jitni bhi gambhir kyun na hoo...

DD pe khas kar aap usme thoda humor mila hi dethe ho smile

View 4 more replies
Flame Flame
Link Copied

Technically very smart guys... Without otp such big amount can be transferred??

No call from Bank for huge transactions...

Banking SIM no never share with anyone...

Tech Guru Tech Guru
Link Copied

Mostly hoaxes n urban myths. 

View 2 more replies
Benevolent Benevolent
Link Copied
Otp in sms itself is unsecure banks should move to authenticator apps
Deal Subedar Deal Subedar
Link Copied

I really don't understand, how is it possible to get the OTP by calling a person?

Tech Guru Tech Guru
Link Copied

Bhai jhoot bolta hoga. 

View 6 more replies
Deal Subedar Deal Subedar
Link Copied

Whenever fraud happen people dont say complete story thinking Bank wale ko pata hi kya chalega which leads to investigation in another way. 

Tech Guru Tech Guru
Link Copied

The truth. Koi apni galati thodina bataega. Bich me ATM card ke craze ke time Weise stories are the. Card gharme hai n paise ATM se nikal gaya. Card Jeb me tha(pre EMV chip time cards), pos machine lagwa ke le liya Paisa. Etc etc. 

Helpful Helpful
Link Copied

It was not missed calls, it was blank calls

Preliminary investigations suggested that the masterminds of this fraud might be based in the Jamtara area of Jharkhand. Reports suggest that the recipients could be just the account holders who may have given their accounts on rent to the crooks.


The BIG TRAP: What Had Happened?

The incident took place on October 10.

Director of a security services firm received missed calls between 7 PM-8:44 PM.

He responded to some calls and ignored others.

He checked his phone to check messages of RTGS transactions worthy of nearly Rs 50 lakh.

Target find multiple text messages from the bank informing about transactions.

A number of RTGS transactions worth over Rs 50 lakh carried out by crooks from current account of man's company, reported Times of India.

Probe Underway: What Cops Suspect?

Police suspect a 'SIM swap' may have been carried out by the crooks.

They may have initiated RTGS transfer and enabled OTP over the phone.

They may have overheard the OTP being mentioned via IVR through a parallel call.

What is SIM Swap/SIM Cloning?

Fraudsters gain access to the customer's Subscriber Identity Module (SIM) card or may obtain a duplicate SIM card (including electronic-SIM) for the registered mobile number connected to the customer's bank account.

Fraudsters use the OTP received on such duplicate SIM to carry out unauthorised transactions.

Fraudsters generally collect the personal / identity details from the customer by posing as a telephone / mobile network staff and request the customer details in the name of offers such as - to provide free upgrade of SIM card from 3G to 4G or to provide additional benefits on the SIM card.

Precautions

Never share identity credentials pertaining to your SIM card.

Be watchful regarding mobile network access in your phone.

If there is no mobile network in your phone for a considerable amount of time in a regular environment, immediately contact the mobile operator to ensure that no duplicate SIM is being / has been issued for your mobile number.



Deal Cadet Deal Cadet
Link Copied
Pan card and Aadhar card details of many people are already available in the public domain, then how to ensure safety bro?
View 1 more reply
Finance Mentor Finance Mentor
Link Copied

Yeh to double dhamaka ho gaya! Pehle paisa loot gaya ( if really at all, not fabricated event ), doosra - security services company ki director ke! Ab resign karne pe bhi business band ho jayega! Kaun trust karega aise security services ko, jo khud hi loot jaaye?

Mujhe banaya hua event lag raha hai, may have ulterior motives...

Deal Captain Deal Captain
Link Copied

ALL SIM PROVIDERS BLOCK INCOMING OTP FOR 24 HOURS WHEN THEY ISSUE DUPLICATE SIM , THEN HOW IS IT EVEN POSSIBLE ?

Super Stud Super Stud
Link Copied

Look @ this case

https://dainik-b.in/SlV2w...vb

Benevolent Benevolent
Link Copied

May be blank calls were made to keep his phone busy/engaged so that he doesn't receive any bank verification call from his bank regarding the high value transactions or to check whether the sim swap is effected or not, before doing the transactions.

If sim card was swapped then he wouldn't have received the SMS for RTGS transactions immediately on his device.

The only possibility is of a screen sharing/any desk malware installed on his device earlier by clicking on a link sent by crooks and following their instructions.

The transactions could have been made from his own device being controlled by crooks.

May be he carried two phones and crooks called on 2nd number in parallel when doing RTGS with OTP request by call. Then they overheard the OTP announced on the other phone. 

Incident happened on 10th October and reported in media on 12 December 😬

Coupon Baba Coupon Baba
Link Copied

I also got missed calls yesterday and some I have lifted and other side no sound... Silence..... Nothing happened... Bank sim.. Seems this is another thing happened....

Deal Cadet Deal Cadet
Link Copied

The fraud in question could happen only because it was a current account. You should not worry about this particular fraud. Just be careful about sharing OTP with anyone. Even the most innocuous ones may land you in trouble. 


This happened to me just the other day. Uber I had ordered for my old mom (in a different city than mine) arrived at the pick up location as shown inside Uber app and the driver called me after 7-8 minutes and told me he has already picked up my mom and to give him the OTP, I shared the OTP in message inside Uber app and the trip started. My mom called a little later saying her Uber still has not arrived. Then the Uber kept on going somewhere completely unrelated to my mom's drop off. I called multiple times and the driver didn't answer. Finally the trip ended more than 20 kms away from her desired destination and then I got a huge bill including a INR 40 waiting charge. The payment mode was set online using Axis card as I get 4% cashback for Uber trips. I registered a complaint immediately after the trip was ended (no option while ongoing) and did not pay the bill yet (which requires OTP confirmation by the Axis credit card every time, in spite of being added in the app). I'd not be able to book the next ride until I clear the dues. I cannot say what exactly happened and if some other old lady mistakenly took that Uber or it was a fraud.

Benevolent Benevolent
Link Copied

I think people running security/manpower contracts have to make frequent large multiple payments and have no option but to have a current account. They may also be sharing their banking credentials with some trusted employees for offloading their responsibility, which is misused.

Most cases happen after sim swap or sim deactivation by service provider on telephonic request.


Benevolent Benevolent
Link Copied

Lol I have to sometimes spend 2 days to transfer much less than this amount on my own account.

Add beneficiary, wait for 24 hours to transfer big amount. Increase netbanking/mobile banking limits. Then again wait for limit increase approval. And then transfer. All this require password and multiple OTP and security questions.

How are they doing it so easily?

Deal Cadet Deal Cadet
Link Copied

1. Most reporting in the press is pathetic. And to compound this folks who have lost money are rarely coherent and cannot remember all the actions they did prior to losing money. They fail to recall that they may have clicked/installed something earlier in the day.

Bottom line - we do not know what really happened.

2. Phone security has to be taken seriously. The guy thinks he just got a call. Does he know if he installed some dis-reputed app earlier in the day which in turn pulled in some other rogue content. Despite umpteen cautionary messages, even tech aware folks routinely click on links in email trusting the email sender name they see is the REAL sender. Just the other day one of my close friends clicked on a link from an acquaintance and was staring at a blank screen. Later he ran a malware scanner to detect some trojans had been planted.

3. Finally READING SMS has to be declined by the OS. No 3rd party App has any need to read SMS. Sadly from the early days Android phones allowed every app developer free access to read SMS. These days it is done after seeking permissions. But no user notices these. If a rogue 3rd party App can read my SMS and also delete it, all 2-factor auth is compromised. iOS has denied apps the privilege to read SMS.

Savings Mentor Savings Mentor
Link Copied

Agree 💯%. It is very much possible that his phone was already compromised with some app "co-ordinating" with the callers to hand over OTPs or doing device/SIM binding by sending SMS.

There have been instances in Android's past where simply visiting a link to an ad-ridden malware-ridden page with malicious JavaScript in Google Chrome on Android infected the browser and started opening pop-ups on the phone.

Agree about the SMS part too. For your transaction accounts with high balance, you could resort to some secure OTP/app-based TOTP so the OTP is generated on device in the app, not sent by SMS, nor read by apps with SMS read access.

replyuser
Click here to reply
Reply