Achive.php thecybershark, Author at The Cyber Shark

ED raids in Gujarat, Maharashtra in cyber fraud probe over ₹100 cr scam

ED raids in Gujarat, Maharashtra in cyber fraud probe over ₹100 cr scam

On 25 June 2025, the Enforcement Directorate (ED) carried out raids in Gujarat and Maharashtra as part of a money laundering probe linked to cyber frauds worth over ₹100 crore. The operation targeted individuals allegedly involved in digital arrest scams, crypto frauds, and fake law enforcement threats, with money funnelled abroad using hawala routes. According to ED sources, searches were conducted in Mumbai, Ahmedabad, and Surat under the Prevention of Money Laundering Act (PMLA). The probe was based on an FIR filed by the Gujarat Police against multiple accused, including Makbul Doctor, Kaashif Doctor, Bassam Doctor, Mahesh Desai, and Maaz Abdul Raheem Nada. The fraudsters allegedly: Used fake USDT (cryptocurrency) trading schemes. Orchestrated “digital arrests”, impersonating law agencies. Sent fake notices to threaten and extract money from victims. Collected funds through accounts opened with forged or dummy KYCs. Converted black money into cryptocurrency via Angadiya (hawala) operators. Transferred over ₹100 crore abroad, officials suspect. “This is a deeply rooted cyber laundering network involving identity theft, crypto misuse, and psychological extortion,” said a senior ED official. The investigation is ongoing, with digital evidence, devices, and suspicious bank transactions being examined. Key Highlights: ₹100 crore cyber scam involved fake arrests, crypto fraud, and hawala transfers. The ED conducted raids in several Gujarati and Maharashtra cities. FIR filed against key suspects with a link to forged KYC accounts. Cyber Safety Advice: Never trust calls or emails claiming law enforcement without verification. Avoid crypto investments from unknown or unregulated sources. Secure your identity documents and avoid sharing KYC info online. Call 1930 or report questionable transactions or scams to cybercrime.gov.in.

Artificial Intelligence Will Reshape the Workforce, Skills, and Communication, Warns LinkedIn CEO

Artificial Intelligence Will Reshape the Workforce, Skills, and Communication, Warns LinkedIn CEO

In a recent interview with Bloomberg, LinkedIn CEO Ryan Roslansky discussed how artificial intelligence is changing workplace communication, skill development, and the job market. This week’s interview demonstrates how AI technologies are affecting top executives at Microsoft and other organisations, as well as entry-level job applicants. According to Roslansky, artificial intelligence is both disrupting and facilitating advancement in fields including self-paced skill development, remote learning, and entrepreneurship. As AI transforms traditional roles and work expectations, he emphasised the necessity of ongoing reskilling. “A lot of uncertainty and disruption are going to occur. But in the long term, it’s advantageous,” Roslansky told Bloomberg. As an example of how AI tools are now helping even senior leadership with communication, he acknowledged in a light-hearted moment that he had used Microsoft’s Co-pilot AI to improve the tone of his emails to Microsoft CEO Satya Nadella. LinkedIn trends reveal: Surge in AI-related job listings. More users are adding AI skills to their profiles. LinkedIn is rolling out AI resume builders and job analysis tools. However, users remain cautious. Overuse of AI-generated posts and profiles has affected credibility, prompting LinkedIn to roll out ID and work email verification tools. Roslansky stated that while LinkedIn is implementing an “AI-first mindset” throughout all organisations going forward, the layoffs were not connected to AI. Advice Key Highlights: AI is both disrupting and enabling the job market. In the AI era, flexibility and retraining are crucial. LinkedIn is using AI technologies to improve communication and job readiness. Career Advice in the AI Age: Take tech-focused and AI-focused courses to keep your abilities up to date. Don’t seem robotic when using AI tools, such as resume builders. Verify your LinkedIn profile to boost trust. Keep up with the latest developments in AI that affect your sector. AI should be used as a tool, not a substitute.

Cyber Police Hunt Online Blackmailer Targeting Delhi Businessman

Cyber Police Hunt Online Blackmailer Targeting Delhi Businessman

The Central Division Cyber Crime Police have registered a case this week in India against an unknown individual for blackmailing a Delhi businessman using morphed images of his daughter on a dating site. Following the victim’s complaint, which was made public on Saturday, officials launched an inquiry under Section 67 of the IT Act. The complaint alleges that the accused called the businessman from three different mobile phones and claimed that his daughter’s naked pictures had been posted online. To give the threat more legitimacy, a dating website link was included. To exert further pressure and demand ransom money, the accused also altered pictures of other family members and threatened to release the images further if his demands were not fulfilled. Under Section 67 of the Information Technology Act of 2000, which addresses the publication of pornographic material online, police have filed a formal complaint. To identify the blackmailer, the Cyber Crime Unit is now examining the Call Detail Records (CDR) of the phone numbers he used. “Such cases highlight the dark misuse of AI tools and social platforms for extortion. We urge victims to report immediately,” said a senior cybercrime official. Advice Cyber police are actively investigating the case to trace the blackmailer. Victims are urged to stay vigilant and report cyber threats promptly. Key Highlights: Morphed photos used for extortion in Delhi. FIR registered under IT Act Section 67. Cyber police are tracking the accused via CDR analysis. Cyber Safety Tips: Set social media accounts to private. Avoid sharing personal images or data online. Educate family members about digital impersonation risks. Report such threats to cybercrime.gov.in. Do not respond to or pay cyber blackmailers.

NCCF Hosts Cybersecurity Training for Cooperatives Ahead of IYC 2025

NCCF Hosts Cybersecurity Training for Cooperatives Ahead of IYC 2025

The National Cooperative Consumers’ Federation of India Ltd. (NCCF) held a cybersecurity training session this week in India as part of preparations for the International Year of Cooperatives (IYC) 2025. Organised under the Ministry of Cooperation, the session aimed to equip cooperative officials with the tools to combat rising cyber threats, ensure cyber hygiene, and enhance digital safety. The training focused on Cyber Security Awareness and Cyber Swachhata (Cyber Cleanliness), teaching cooperative officials how to protect sensitive data, recognise scams, and adopt safer digital practices. According to NCCF sources, the program covered topics such as: Cyber hygiene measures such as software updates and creating secure passwords. Data protection protocols. Phishing and scam awareness. The Ministry of Cooperation, which guided the training, praised the effort as a key milestone in securing cooperative systems and boosting digital literacy. “Cyber awareness is the foundation of secure cooperative growth in the digital age,” said an NCCF spokesperson. The initiative aligns with India’s broader digital goals, ensuring that even grassroots cooperative institutions are protected from cybercrime threats. Experts from cybersecurity teams and cooperative boards jointly facilitated the program. Advice Key Highlights: In front of IYC 2025, NCCF began offering cyber training. Aim: Strengthen cyber safety across India’s cooperatives. The Ministry of Cooperation supports the initiative. Cyber Safety Advice: Use strong, unique passwords for official systems. All cooperative accounts should have two-factor authentication enabled. Never open dubious attachments or URLs. Report any suspicious activity to cybercrime.gov.in.

5 arrested in Delhi operations targeting Chinese cyber scam networks

5 arrested in Delhi operations targeting Chinese cyber scam networks

Delhi Police arrested five people linked to Chinese-operated cyber scam networks involving fake investment and online job frauds. In a major crackdown, Delhi Police arrested five individuals this week involved in separate cyber fraud networks linked to Chinese handlers, operating via Telegram and WhatsApp. The accused reportedly laundered over ₹36 lakh using fake investment platforms, cryptocurrency, and money mules across India and Nepal. In North-West Delhi, Cyber Police arrested Pawan and Mankiraat Dhillon for cheating a victim of ₹21 lakh through a fake share market investment app. The app mimicked legitimate brokerage platforms to display fake returns, while transactions were made into bank accounts tied to cybercriminals. The accused maintained contact via Telegram and allegedly supplied Indian bank accounts to Chinese nationals. The fraudsters were traced and arrested in Mohali, Punjab, with police recovering SIM cards, cheque books, ATM cards, mobile phones, and evidence of travel to Nepal, where some of the scammed funds were received. In a separate operation, the Cyber Police Station of the South-West District busted an interstate fraud syndicate. Three accused—Mahender Singh Rajawat, Ariph Khan, and Laxmi Narayan Vaishy—from Jaipur were arrested after duping a man of ₹15.8 lakh through a fake online review job scam. Initially paid small amounts for tasks, the victim was later lured into paying large sums under pretexts like “welfare tasks” and “credit improvement.” The investigation revealed that the gang used USDT (cryptocurrency) to route money out of India within 20 minutes of receipt, evading traceability. “The fraud network had direct links to a Chinese national operating via Telegram from abroad,” stated the police press release. Security Advice: These arrests highlight how foreign-linked cyber scams exploit Telegram, fake apps, and cryptocurrency to defraud Indian citizens. Protect Yourself from Cyber Fraud: Refrain from downloading unknown apps or opening dubious links. Never invest based on WhatsApp/Telegram promotions Be cautious of too-good-to-be-true online job offers Enable 2FA and monitor financial transactions Report scams at: www.cybercrime.gov.in

Shoplifters are apprehended by this AI technology before they even steal anything

Shoplifters are apprehended by this AI technology before they even steal anything

A Paris-based start-up, Veesion, has created an AI surveillance system that can detect suspicious gestures before shoplifting occurs. Launched in 2018, the tech is now used in over 5,000 stores across Europe, the US, and Canada, helping retailers prevent theft before it happens. Without keeping personal information or utilising biometrics, Veesion’s gesture-recognition AI examines body movement to identify questionable behaviour.  The solution delivers personnel real-time notifications through a mobile app and connects with current CCTV setups. “The algorithm is indifferent to people’s appearance.  As stated by Benoit Koenig, a co-founder of Veesion, “It only cares about how your body parts move over time.” It detects actions like concealing items or irregular handling of products, and immediately alerts the security team with video evidence. Within three months, a shop in the United States reduced losses in the health and beauty department by fifty per cent. The startup recently raised ₹373 crore ($43 million) in Series B funding to expand globally. The tech also helps detect employee theft, which accounts for similar losses as customer shoplifting. “It acts as a deterrent. Staff know AI is watching,” Koenig added. Advice: Veesion’s AI shows how gesture-based surveillance could revolutionise theft prevention in physical stores, without invading privacy. Security Insights for Retailers: Upgrade to AI-enhanced CCTV systems Train staff to respond to real-time alerts Use non-biometric solutions to respect privacy laws Regularly audit security footage for internal theft

Lucknow police bust ₹80 lakh crypto fraud racket, eight arrested

Lucknow police bust ₹80 lakh crypto fraud racket, eight arrested

Lucknow Police uncovered a ₹80 lakh crypto fraud and arrested 8 people involved in illegal USDT trading via Telegram. In a breakthrough against digital fraud, Lucknow Police arrested eight individuals on June 21, 2025, for siphoning off nearly ₹80 lakh through fake USDT (Tether) crypto trading. The racket operated from Lucknow and nearby districts, exploiting loopholes in crypto laws and bank verification systems, as revealed by the Cyber Crime Police. The accused were part of a well-organised cyber racket that transferred illicit money via anonymous Telegram channels operated by Chinese handlers, according to a press release by the Cyber Crime Police Station, Lucknow. They used TRC-20 blockchain network wallets, bypassing Indian legal scrutiny by avoiding KYC. Local “mule” accounts were created to receive money via NEFT, RTGS, and IMPS, withdraw the same day and convert into USDT through peer-to-peer crypto brokers. “These criminals exploited P2P wallets that function without verification, making it nearly impossible to trace funds,” said Inspector Brijesh Kumar Yadav, Cyber Crime Police. During raids, police recovered: ₹1.85 lakh in cash 16 mobile phones 2 laptops and a tablet 4 cars Cheque books and bank passbooks The arrested include youth aged 21–40 years from Lucknow, Basti, Rae Bareli, Gonda, and Barabanki. The accused failed to present any valid crypto exchange records or KYC documents, which confirmed the illegitimacy of their operations. Police booked them under BNS Sections 317(2), 318(4), 61(2), and 111(2) (B) and IT Act Sections 66C and 66D, commonly used for cyber and identity-related fraud. Security Advice: This case exposes how cross-border digital scams are being run under the cover of “crypto trading,” exploiting unregulated platforms and mule accounts in India. Stay protected with these tips: Avoid P2P crypto deals without KYC Do not share bank details or receive suspicious deposits Always verify apps and trading platforms Enable two-factor authentication Report fraud at: www.cybercrime.gov.in

16 Billion Logins Stolen In Mega Data Breach Threatening Apple, Google and More

16 Billion Logins Stolen In Mega Data Breach Threatening Apple, Google and More

In a massive global data breach, hackers have leaked 16 billion login credentials, exposing users of platforms like Apple, Google, Facebook, GitHub, and even government services, according to Forbes. The breach was uncovered this week by cybersecurity researchers who found the records in 30 unprotected datasets, some containing up to 3.5 billion entries each. Cybersecurity experts first noticed a mysterious open database containing 184 million records, which has now proven to be only a small part of a much larger breach. Researchers have since confirmed 30+ datasets leaked online, containing VPN logins, social media accounts, and developer platform access. The breach is not a recycling of old data but fresh, high-value information collected throughout 2025, making it dangerous and exploitable for phishing attacks, account takeovers, and business email compromise (BEC) schemes. “This is not just a leak — it’s a blueprint for mass exploitation,” warned the research team cited in Forbes. Darren Guccie, CEO of Keeper Security, emphasised that the leak’s scale and nature pose “far-reaching risks” to users across sectors. Google has responded by urging users to move beyond traditional passwords and 2FA, and instead adopt passkeys, which are biometric login systems using fingerprint or facial recognition. “Passkeys are phishing-resistant and safer than passwords,” Google stated. Advice: This mega breach highlights how credential leaks remain one of the top cyber threats globally. The fact that the stolen logins are fresh and tied to major platforms increases the urgency for users to act. Cyber Safety Tips: Switch to Passkeys or biometric login methods wherever possible Update your passwords immediately, especially for sensitive accounts Enable multi-factor authentication (MFA) Avoid clicking on suspicious links or emails asking for logins Report scams or suspicious activity at cybercrime.gov.in

IIT graduate among 15 held in Telangana for circulating child porn

IIT graduate among 15 held in Telangana for circulating child porn

TGCSB arrests repeat offenders in state-wide operation; links to trafficking uncovered. Telangana Police arrested 15 individuals, including an IIT graduate, on 18 Jun 2025 for the possession and circulation of child sexual abuse material (CSEAM). The operation followed 57 cyber tip-offs, resulting in 34 FIRs across multiple districts, with cases registered under the IT Act and POCSO laws. The Telangana Cyber Security Bureau (TGCSB), acting on inputs from the Cyber Tip line and in collaboration with NCMEC, ICMEC, and I4C, carried out a coordinated state-wide crackdown. Offenders were arrested from Hyderabad, Warangal, Karimnagar, Jagtial, Jagadgirigutta, and Yadagirigutta. The arrested individuals, aged between 19 and 50, largely belonged to working or middle-class backgrounds. Shockingly, an IIT graduate from Nizamabad, employed at a reputed company, was among those caught. Investigators revealed that the content was being downloaded, stored, and sometimes shared via encrypted platforms. Many of the accused were repeat offenders, tracked using digital forensic evidence and shared intelligence. Further investigation uncovered human trafficking links, with tribal women from remote Telangana mandals like Kerameri and Tiryani being targeted and sold to brothels. One victim managed to escape from Madhya Pradesh and returned home last month. In a related case, Asifabad police arrested six people, including a police constable, while three more remain absconding. Constable Haridas, one of the accused, had prior involvement in similar crimes. Quote from Official: “This is a warning that online child abuse will not go unpunished. We are using every resource to trace and prosecute offenders,” said a senior TGCSB official. Advice: This case highlights the alarming rise in online child exploitation and trafficking, even involving educated individuals and repeat offenders. TGCSB’s CPU unit, launched in February 2025, has already registered 294 FIRs and made 110 arrests, a sharp increase from prior years. Public Safety Tips: Report suspicious online content or activity involving children on cybercrime.gov.in (Women & Child tab) or dial helpline 1930 Do not download or forward any explicit or suspicious content — it’s illegal Educate children and parents about online safety, digital boundaries, and privacy settings Enable parental controls and monitor app permissions regularly

Tea stall owner loses Rs 2.36 lakh in UPI fraud; cyber police nab accused in North-East Delhi

Tea stall owner loses Rs 2.36 lakh in UPI fraud; cyber police nab accused in North-East Delhi

Cyber Police arrest a 21-year-old in North-East Delhi for exploiting a lost SIM card to drain the victim’s bank account via UPI. After his SIM card vanished, a tea shop owner in Seelampur, New Delhi, lost ₹2.36 lakh in a UPI scam.  On June 19, a 21-year-old suspect was taken into custody by the North-East District Cyber Police of Delhi, who also retrieved important evidence, such as SIM cards and a cell phone used in the scam. On June 4, days after discovering unauthorised UPI transactions from his wife’s bank account, the victim, Gareeb Nath Gupta, reported the crime.  His Samsung keypad phone with an active SIM card vanished on May 27. Fraudulent transactions were conducted using the lost SIM between May 28 and June 2. To link the activity to an Airtel Payments Bank account, a special cybercrime unit under the direction of Inspector Rahul Kumar and overseen by ACP Mangesh Gedam employed digital forensics and technical surveillance. The culprit, Md. Monish, a mobile phone repairer from Delhi’s Janta Mazdoor Colony, acknowledged buying stolen phones with SIM cards still in working order.  He transferred money using UPI apps and accessed connected bank accounts using them. One cell phone and two SIM cards have been found by the police, and ₹35,000 has been frozen. They are now investigating a wider network, possibly involved in similar cybercrimes. Quote: “This case shows how even basic phone users are vulnerable. People must immediately block SIM cards if lost and monitor bank accounts closely,” said an official from Cyber PS, North-East Delhi. Advice: The instance demonstrates how low-tech thefts, such as lost phones, can be taken advantage of online, particularly with SIM cards connected to UPI. It also demonstrates how cybercriminals target non-technical individuals as well. Cyber Safety Tips: If your SIM card is lost or stolen, block it right away. Make sure all UPI and banking apps have two-factor authentication (2FA) enabled. Don’t store bank account information or UPI credentials on outdated or unprotected phones. Observe bank statements regularly and report any questionable activity on cybercrime.gov.in.