Achive.php thecybershark - The Cyber Shark - Page 5 of 14

Phishing Attack Hits General Dynamics, Exposing Employee Data

Cybersecurity Framework

Aerospace and defense giant General Dynamics has revealed that a phishing attack targeted its employees, compromising dozens of employee benefits accounts. The breach, discovered on October 10, exposed sensitive personal information, including Social Security numbers, bank account details, and government-issued IDs. The attack began with a fraudulent advertising campaign that directed employees to a fake login portal mimicking a legitimate third-party platform. Unsuspecting employees entered their credentials, granting attackers access to their accounts. General Dynamics reported the breach to the Maine Attorney General’s Office, confirming that 37 individuals were affected. Once inside the compromised accounts, the attackers manipulated personal data, including bank account information. General Dynamics promptly suspended access to the service upon discovering the unauthorized activity and began notifying affected employees the same day. Written notifications were sent this week to all impacted individuals. The company clarified that the breach occurred through a third-party login portal and not its internal systems. “Available evidence indicates that the unauthorized access was authenticated through the third party, not directly through any General Dynamics business units,” the company stated. To mitigate the impact, General Dynamics is offering two years of complimentary credit monitoring to affected employees. They have also urged individuals to reset their login credentials for Fidelity NetBenefits accounts and avoid reusing compromised passwords. The phishing attack marks another incident involving Fidelity this year. Earlier, the financial services company disclosed breaches affecting over 100,000 customers across its insurance and investment platforms. Cybersecurity experts continue to emphasize the importance of vigilance against phishing campaigns, which remain a significant threat to organizations and their employees.

Promises of high returns on cryptocurrency investment makes Pune man lose Rs 9 lakh in cyber fraud

Cybersecurity Framework 2

Using a fake social media profile of a British national settled in Noida with family business in Singapore, cyber criminals duped a Pune pharmacist of over Rs 9 lakh by manipulating him to invest in cryptocurrency with promises of very high returns. Earlier this week, a 30-year-old pharmacist, a resident of Bhor taluka, registered a complaint at Bhor police station under Pune rural police. A few days ago, he connected with a woman on Facebook, who identified herself as a British national currently settled in Noida. As the complainant started chatting, the ‘woman’ shared her international WhatsApp number. Sometime later, she said that she was going to Singapore where her family has a business. The woman sometimes spoke with the complainant on audio calls and frequently sent her photos to him. A while later, she told him that she had found a very good investment opportunity in cryptocurrency promising very high returns. Initially reluctant to make any investment, the complainant was persuaded and manipulated by the woman into sending money by sharing fake screenshots of profits earned by her. He was made to register on a fraudulent cryptocurrency exchange before being asked to send money. The complainant was asked to send money to certain bank accounts and the fraudulent exchange showed high corresponding earnings. The woman he had been in contact with was giving him instructions on sending money. Against investment of Rs 2.95 lakh, the fraudulent application showed returns of Rs 22 lakh, said police. ‘50% Singapore govt tax’ When the complainant sought to withdraw the money, he was asked to pay Rs 11 lakh as 50 per cent tax to the Singapore government against his earnings. When the complainant told the woman he did not have that amount, she told him to send as much possible. He ended up sending Rs 6.27 lakh and again asked for the women’s help in getting his earnings. It was at this point that the woman went incommunicado and the complainant realised that he had been cheated. He approached the Pune rural police and an FIR was registered on 23- 12-2024. A probe has been launched by Bhor police. In a similar case reported last year, a city-based software engineer connected with a woman named Elizabeth who claimed she was in a winery business and cryptocurrency trading. The victim, who had been investing in bitcoins for some time, was offered tutorials on crypto trading to earn high profits. Over a period of 10 days from the beginning of their interaction, the victim ended up investing over 40,600 Tether cryptocurrency (referred to as USDT) equivalent to over Rs 33 lakh in a fake cryptocurrency exchange. While the exchange website kept reflecting high returns on each of the investments, when he tried withdrawing, it became evident that the exchange did not exist. Risks of crypto investment frauds flagged Cyber investigators in Pune and Pimpri Chinchwad have urged people not to fall prey to fraudulent cryptocurrency investment platforms to which victims are often lured through deceptive social media advertisements, fake social media profiles, or phone messenger groups. Cyber investigators have suggested that the investors should use only trusted and known cryptocurrency exchanges and have stressed that investors specifically do research on the names of these cryptocurrency exchanges and check if they use similar sounding names as that of known platforms.

Cyber gang dupes people using Bhopal top cop’s fake Facebook profile, 6 arrested

Cybersecurity Framework 2

The accused revealed they used a fake profile, using a picture of IPS officer Harinarayanachari Mishra, befriending people associated with his real Facebook profile. The Bhopal Police on Tuesday arrested four individuals from Vidisha in Madhya Pradesh and two from Alwar in Rajasthan for cheating people through fake Facebook profiles by impersonating the Bhopal Police Commissioner. The incident came to light when the Cyber Crime Branch received a complaint from Mahesh Kumar, a Bhopal resident, on November 5, 2024. In his complaint, Kumar stated that he had received a message on Facebook Messenger offering lucrative deals on old furniture. The message was sent by a user named ‘Hari Narayan,’ whose profile picture featured the Bhopal Police Commissioner, Hari Narayanchari Mishra.Believing the offer to be genuine, Kumar unsuspectingly transferred Rs 45,000 via a QR code sent to him on Messenger. Based on the complaint, a case was registered for cheating and dishonesty and cheating by personation under Sections 318 (4) and 319 (2) of the BNS. After tracking the number used to create the fake Facebook ID, the cyber cell tracked the fraudsters in Alwar and was subsequently picked up by a cybercrime unit. After probing them further, the police managed to track the rest of the gang, arresting four, including the kingpin, Akash Namdeo, from Vidisha district. During the course of the investigation, the accused revealed that they used a fake profile with the picture of IPS officer Harinarayanachari Mishra, befriending people associated with his real Facebook profile. The accused used to send pictures of expensive furniture to people, quoting cheaper prices in a bid to lure them. They used to cheat people by transferring money to fake bank accounts. Namdeo, a resident of Lateri in Vidisha district, used to fraudulently activate SIM cards. The police have also arrested Rahul Panthi, Vivek Raghuvanshi and Sonu, who used to sell SIM cards to other members of the gang.

Italy Fines OpenAI €15 Million for ChatGPT GDPR Data Privacy Violations

Cybersecurity

Italy’s data protection authority has fined ChatGPT maker OpenAI a fine of €15 million ($15.66 million) over how the generative artificial intelligence application handles personal data. The fine comes nearly a year after the Garante found that ChatGPT processed users’ information to train its service in violation of the European Union’s General Data Protection Regulation (GDPR). The authority said OpenAI did not notify it of a security breach that took place in March 2023, and that it processed the personal information of users to train ChatGPT without having an adequate legal basis to do so. It also accused the company of going against the principle of transparency and related information obligations toward users. “Furthermore, OpenAI has not provided for mechanisms for age verification, which could lead to the risk of exposing children under 13 to inappropriate responses with respect to their degree of development and self-awareness,” the Garante said. Besides levying a €15 million fine, the company has been ordered to carry out a six-month-long communication campaign on radio, television, newspapers, and the internet to promote public understanding of how ChatGPT works. This specifically includes the nature of data collected, both user and non-user information, for the purpose of training its models, and the rights that users can exercise to object, rectify, or delete that data. “Through this communication campaign, users and non-users of ChatGPT will have to be made aware of how to oppose generative artificial intelligence being trained with their personal data and thus be effectively enabled to exercise their rights under the General Data Protection Regulation (GDPR),” the Garante added. Italy was the first country to impose a temporary ban on ChatGPT in late March 2023, citing data protection concerns. Nearly a month later, access to ChatGPT was reinstated after the company addressed the issues raised by the Garante. In a statement shared with the Associated Press, OpenAI called the decision disproportionate and that it intends to appeal, stating the fine is nearly 20 times the revenue it made in Italy during the time period. It further said it’s committed to offering beneficial artificial intelligence that abides by users’ privacy rights. The ruling also follows an opinion from the European Data Protection Board (EDPB) that an AI model that unlawfully processes personal data but is subsequently anonymized prior to deployment does not constitute a violation of GDPR. “If it can be demonstrated that the subsequent operation of the AI model does not entail the processing of personal data, the EDPB considers that the GDPR would not apply,” the Board said. “Hence, the unlawfulness of the initial processing should not impact the subsequent operation of the model.” “Further, the EDPB considers that, when controllers subsequently process personal data collected during the deployment phase, after the model has been anonymised, the GDPR would apply in relation to these processing operations.” Earlier this month, the Board also published guidelines on handling data transfers outside non-European countries in a manner that complies with GDPR. The guidelines are subject to public consultation until January 27, 2025. “Judgements or decisions from third countries authorities cannot automatically be recognised or enforced in Europe,” it said. “If an organisation replies to a request for personal data from a third country authority, this data flow constitutes a transfer and the GDPR applies.”

Kingpin of Deadly Ransomware Gang Arrested: Extorted Thousands of Crores in Global Cyber Attacks

Cybersecurity

A dual Russian-Israeli national, Rastislav Panev, has been arrested in Israel and will soon face extradition to the United States for his alleged role in developing the notorious Lock Bit ransomware. Authorities claim the arrest marks a significant blow to the global ransomware operation. Rastislav Panev, a 51-year-old man holding dual Russian-Israeli citizenship, was arrested in Israel in August at the request of the United States Department of Justice (DoJ). Panev faces charges for allegedly developing the infamous Lock Bit ransomware, which is responsible for attacks on over 2,500 entities worldwide. Panev is currently being held in Israel, awaiting extradition to the U.S. According to court documents, he was involved with the Lock Bit ransomware group since its inception in 2019, continuing his activities until February 2024, when authorities dismantled parts of the operation. How Panev Operated Panev is accused of developing malicious code for Lock Bit, maintaining the infrastructure, and providing technical guidance to the group. Evidence obtained by investigators includes credentials found on Panev’s computer, granting him access to repositories hosting Lock Bit source code and control panel credentials. Additionally, Panev’s communications with Lock Bit’s main administrator, Dmitry Yuryevich Khoroshev, revealed his role in the operation. Khoroshev, identified as a Russian national, was previously charged by U.S. authorities. Investigators also discovered that Panev received payments amounting to $230,000 in cryptocurrency from Khoroshev between June 2022 and February 2024. Ransomware’s Global Impact The Lock Bit ransomware group has been linked to over 2,500 attacks across 120 countries, including 1,800 incidents in the United States alone. The group extorted more than $500 million in ransom payments, causing billions of dollars in damages. Law enforcement agencies worldwide view Panev’s arrest as a critical step in combating ransomware operations. Charges and Future Actions Panev admitted to developing code that disabled antivirus systems, deploying malware on victim networks, and creating ransom notes. His arrest follows a series of actions by the U.S. against members of the Lock Bit group, with rewards of up to $10 million offered for information leading to the capture of other operatives. The Lock Bit operation has led to several arrests globally, including the sentencing of a Lock Bit affiliate in Canada earlier this year. Panev’s extradition to the U.S. is expected to shed more light on the group’s activities and could result in further legal actions against its members. A Message to Cybercriminals Authorities emphasize that the arrest demonstrates a global commitment to holding cybercriminals accountable. Panev’s capture is a testament to international collaboration in the fight against ransomware and cybercrime, sending a strong warning to those involved in such activities.

Dev Information Technology soars 8% on launching new cybersecurity services

Cybersecurity Framework

Shares of Dev Information Technology surged up to 7.76 per cent at Rs 163.80 a piece on the BSE in 23/12/2024 intraday trade. This came after the company launched new services under the cybersecurity segment. The newly enhanced cybersecurity services include cybersecurity consulting, threat and vulnerability management (VAPT), managed security operations centre (SOC), business continuity and disaster recovery (BCDR) and cloud security services. “With the global cybersecurity market projected to reach $271.90 billion by 2029, businesses face mounting challenges in securing their digital assets, driven by rising cyber threats, digital transformation, and stricter regulatory requirements. These enhanced cybersecurity services address these challenges by offering proactive defence strategies, real-time monitoring, and comprehensive solutions to help businesses stay ahead of evolving threats and ensure compliance,” the company said in a statement. Moreover, strategic partnerships with Microsoft and AWS provide credibility and access to cutting-edge technologies, ensuring the delivery of world-class solutions, the company said. DEV Information Technology, established in 1997 and listed on NSE and BSE, initially focused on business automation software solutions, with the company expanding to offer a range of IT services globally. Headquartered in Ahmedabad, with offices in India and Canada, DEV IT specializes in providing Cloud Services, Digital Transformation, Enterprise Applications, Managed IT Services, and Application Development. Its product portfolio includes Talligence, an analytics platform, and ByteSigner, a digital signing solution. Meanwhile, on the equities side, DEV Information Technology stock has outperformed the market, as in the last six months it has surged 35 per cent while falling 21 per cent in the last year. In comparison, BSE Sensex has risen 2 per cent in the last six months and 10 per cent in a year. The company has a total market capitalisation of Rs 357.28 crore. Its shares are trading at a price-to-earnings multiple of 19.06 times and at an earning per share of Rs 7.98. At 12:34 PM; the shares of the company were up 4.61 per cent at Rs 159 a piece. By comparison, the BSE Sensex was trading 0.52 per cent higher at 78,450.66 level.

Department of Telecommunications Orders Telecom Operators to Play Cybercrime Awareness Caller Tune Daily

Cybersecurity

The telecom department has ordered operators to play cyber-crime awareness caller tune 8-10 times per day to telephone subscribers for three months. According to the order copy sent to the telecom operators, the caller tunes will be provided by the Indian Cybercrime Coordination Centre (I4C) — a cyber-crime wing under the Home Ministry. “To make the public aware of cybercrime through the caller tune campaign, it has been decided to play caller tune audios through pre-call announcement/ring back tone arrangement, which will be provided to TSPs by nodal officers of I4C. Caller tunes to a subscriber may be played about 8-10 times a day,” the order dated December 18 said. The order asked telecom service providers (TSPs) to take action on the order immediately. “Different caller tunes related to cybercrime will be provided every week for three months,” the order said. There has been a rise in the incidence of financial fraud through new scams like digital arrest, where cybercriminals pose as police, judges etc. to extort money from victims. The Centre and Telecom Service Providers (TSPs) have devised a system to identify and block incoming international spoofed calls displaying Indian mobile numbers that appear to be originating within India. According to the centre, such international spoofed calls have been made by cyber-criminals in recent cases of fake digital arrests, FedEx scams, impersonation of government and police officials, etc. Till November 15, more than 6.69 lakh SIM cards and 1,32,000 IMEIs, as reported by Police authorities, have been blocked by the Centre.

CBI unravels Rs 260 crore international cyber fraud syndicate operating from Delhi-NCR

Cybersecurity Framework

An investigation by CBI into a massive cyber-enabled fraud syndicate revealed that the con, which originated from Delhi-NCR, allegedly defrauded foreign nationals of the US, Canada and other countries to the tune of Rs 260 crore through a fake call center. The syndicate, led by accused Tushar Kharbanda, a Noida resident, employed advanced techniques to commit cybercrime and launder the money by converting bitcoin into US dollars and vice-versa. The agency filed a charge sheet against three accused — Kharbanda, Gaurav Malik and Ankit Jain — under various sections of IPC and the Information Technology Act. “The accused were involved in running a fraudulent call center in Delhi and Noida that targeted elderly citizens in the US and Canada,” the CBI said. The supposed call center, a probe revealed, employed over 150 tele-callers, who posed as representatives from foreign law enforcement agencies, Amazon support, Microsoft tech support and other services to deceive victims. The accused used advanced techniques, including scripts for several fraud schemes and impersonation of US Social Security Administration officers. The CBI investigation revealed that the accused received over 316 bitcoins, equivalent to Rs 260 crore, in their bitcoin wallets, which were proceeds of crime. The money was then withdrawn by the members of the organized gang in Dubai. CBI also seized digital devices and incriminating evidence from the accused, including credentials of US victims and scripts for several fraud schemes. “The investigation uncovered an organized cyber-enabled fraud syndicate with international ramifications. Further investigation is on to nab their foreign-based conduits,” an officer said. The charge sheet was filed under sections of cheating and criminal conspiracy of the IPC besides section 66D of the IT Act. CBI started the investigation following a tip by Royal Canadian Mounted Police (RCMP) through the National Central Bureau of India. The FIR alleged that Tushar Kharbanda, claiming to be an RCMP officer, convinced the victim that his identity was being used for fraudulent purposes. Under duress, the victim was coerced into transferring over 93,000 Canadian dollars into cryptocurrency via bitcoin ATMs in Canada, all of which were linked to Kharbanda and his associate’s cryptocurrency wallets. As the investigation progressed, links to other key figures in the fraud network were revealed, including Ankit Jain, who played a role in managing crypto wallets and assisting the primary accused, Kharbanda, in converting the bitcoin obtained from foreign victims into US dollars.

Nalini Unagar Deletes Her YouTube Cooking Channel After ₹8 Lakh Loss, Removes 250 Videos: Lessons for Aspiring Creators

Video Delete

In a surprising move that has shocked her fans, Nalini Unagar, a well-known cooking YouTuber, deleted her channel after facing a massive financial loss of ₹8 lakh. With over 250 videos and years of effort gone in a flash, her decision has raised questions among creators and viewers alike. While her story serves as a cautionary tale, it also reminds us of the challenges and opportunities of earning on YouTube. If you’re a content creator or thinking of starting your YouTube journey, here’s how to avoid such pitfalls and make your channel profitable. The Rise and Fall of Nalini Unagar’s Channel Nalini started her channel with the hope of sharing her passion for cooking and reaching millions. Her videos showcased everything from traditional recipes to modern twists on classics. However, despite her consistent uploads and engaging content, Nalini struggled to monetize her channel effectively. With rising production costs, including equipment, ingredients, and promotional expenses, the financial burden became unbearable. Without a sustainable income stream, Nalini eventually decided to shut down her channel, leaving her fans disappointed and her years of hard work erased. Don’t Delete Your YouTube Dreams: Tips to Monetize Your Channel Nalini’s story is not uncommon, but it doesn’t have to be yours. Here are five actionable ways to ensure your YouTube channel becomes a source of income rather than a financial drain: Diversify Your Revenue Streams Relying solely on YouTube ad revenue can be risky, especially for small or medium-sized creators. Instead, explore: Sponsored Content: Partner with brands related to your niche. Affiliate Marketing: Promote products and earn a commission on sales through affiliate links. Merchandise: Sell your own products, such as recipe books, aprons, or kitchen tools if you’re in the cooking niche. Memberships: Offer exclusive perks to loyal subscribers through platforms like YouTube Memberships or Patreon. Optimize Your Content Strategy Creating engaging and search-friendly content is crucial. Here’s how: Identify Trends: Use tools like Google Trends and YouTube Analytics to discover trending topics in your niche. SEO-Friendly Titles and Tags: Include keywords that your audience is searching for. Consistency: Set a schedule for uploads to keep your audience engaged and coming back for more. Build a Community, Not Just a Channel Engage with your audience through comments, community posts, and live streams. A loyal community is more likely to support you financially through super chats, donations, and other monetization tools. Manage Costs Wisely Nalini’s story highlights the importance of keeping expenses in check. Start small with budget-friendly equipment. Use free or affordable editing software initially. Plan content that doesn’t require excessive spending. Learn from Analytics and Pivot Track what works and what doesn’t. If a certain type of video performs better, focus on creating similar content. Don’t hesitate to experiment and adapt based on viewer feedback and data insights. The Bigger Picture: Success Takes Time YouTube is a marathon, not a sprint. While Nalini’s journey ended prematurely, countless creators have turned their passions into thriving careers by staying consistent, learning from mistakes, and focusing on sustainable growth. If you’ve already uploaded dozens or hundreds of videos, don’t let temporary setbacks discourage you. Instead, use those videos as stepping stones toward success. Remember, every upload is an opportunity to learn, grow, and connect with your audience. Final Thoughts Nalini Unagar’s decision to delete her YouTube channel serves as a wake-up call for aspiring creators to approach their journey strategically. If you’re passionate about content creation, focus on building a sustainable income model, engaging your audience, and managing costs wisely. Your channel can be a source of inspiration, entertainment, and financial stability – but only if you play the long game. Don’t give up. Instead, remind yourself of why you started and find new ways to make your YouTube dream a reality.

How to Protect Yourself from Unified Payments Interface (UPI) Frauds

cyber 2

In India, UPI (Unified Payments Interface) has become the go-to method for digital transactions, but with this rise in usage, UPI frauds are also increasing. Over 95,000 UPI fraud cases were reported in the 2022-23 financial year. Understanding how these scams work is your first step toward staying safe. Here’s everything you need to know about UPI frauds and how to protect yourself from falling victim to them. UPI (Unified Payments Interface) was launched on April 11, 2016, by the National Payments Corporation of India (NPCI). It was introduced to make digital payments easier and faster in India. Key figures in its creation included Dr. Raghuram Rajan, the RBI Governor at the time, and Nandan Nilekani, former chairman of UIDAI. Multiple UPI payment app’s Google Pay is a widely used app that offers seamless UPI payments and integration with multiple banks: – Phone Pay – One of the leading UPI apps with features like bill payments, recharges, and money transfers. Paytm – Known for various services beyond UPI, such as mobile recharges, shopping, and financial products. Amazon Pay – Amazon’s payment platform also supports UPI for easy transactions. BHIM (Bharat Interface for Money) – An app developed by the Indian government to promote UPI adoption, specifically aimed at simplifying digital payments. Know About UPI Fraud? UPI fraud happens when someone tries to trick you into revealing your UPI PIN or personal information, so they can steal money from your bank account. Fraudsters use a variety of tricks to gain access to your UPI details and carry out unauthorized transactions.          Multiple Types of UPI Frauds Vishing (Voice Phishing) Vishing (Voice Phishing) is when scammers trick people over the phone to steal personal information, like bank details or passwords. The scammer might pretend to be someone trustworthy, like a bank employee or a government official, and try to get you to share sensitive information. For example, they might call you saying there’s an issue with your bank account and ask for your account number, or claim they need to fix a problem with your computer and ask for remote access. Always be cautious about unsolicited calls and never give out personal details over the phone unless you’re sure of the caller’s identity. Fake UPI Payments or Transfers Fake UPI payments refer to scams that fraudsters use to trick people into believing that they have received money or manipulate them into transferring money. Scammers use fake payment links, screenshots, and misleading payment requests to steal money. The fake UPI payment​ is a concern for UPI users. Fake UPI QR Codes Fraudsters create fake QR codes that lead to phishing sites or malicious apps. When you scan these codes, they steal your UPI details. Impersonation Scammers pose as bank staff or customer service agents to trick you into sharing your OTP or UPI PIN. The penalty for identity theft is imprisonment for up to three years and a fine of up to one lakh rupees. Impersonation: Impersonation is an offence under Section 416 of the IPC. Fraud Sellers Seller fraud happens when a seller tricks or deceives a buyer to make money unfairly. This could include things like: Taking payment but not delivering the product. Selling fake or damaged items while claiming they’re real or in good condition. Providing false or misleading information about the product to get a sale. Screen Monitoring Apps Some scammers use apps that secretly monitor your screen to capture sensitive information like your UPI PIN or OTP. They’re often used by parents to monitor kids, employers to watch employees, or for security purposes. They can capture screenshots, track apps, and even log keystrokes. SIM Cloning SIM cloning is when someone makes an exact copy of another person’s SIM card. A SIM card is a small chip in your phone that stores important information, like your phone number and contacts. Cloning a SIM card means creating a duplicate of that information, so someone else can use your phone number and access your calls, texts, and other services, usually without your permission. It’s a form of identity theft or fraud, and it can lead to privacy violations or financial loss. Malware Malware is short for “malicious software.” It’s a type of harmful software designed to damage, disrupt, or steal information from your computer, phone, or other devices. Think of it like a virus or a sneaky bug that gets into your device without you knowing and causes problems. Malware can steal your data, like passwords or credit card numbers, or it can slow down your device and make it stop working properly. Money Mule A “money mule” is someone who is used by criminals to transfer stolen money or illegal funds. In simple terms, it’s like being a middleman who helps criminals move money, often without knowing that it’s illegal. Here’s how it works: A criminal might trick someone into accepting money in their bank account or through other methods, then ask them to send that money to someone else, often overseas. The person doing this is called a “money mule.” They might think they are helping with a legitimate job or transaction, but in reality, they are unknowingly part of a crime. Deceiving UPI Handles “Deceiving UPI handles” refers to fake UPI (Unified Payments Interface) IDs that are designed to trick people into sending money to the wrong account. In simple terms, scammers create UPI IDs that look very similar to the ones of trusted people or organizations, like a friend or a well-known business. When someone tries to send money to the correct person, they accidentally send it to the scammer’s fake account instead. So, “deceiving UPI handles” are essentially fake payment IDs that are made to deceive and steal money from people. Collect Request Fraud “Collect Request Fraud” is a type of scam where a fraudster tricks someone into paying money by sending them a “collect request” through a payment platform, like UPI or other apps. Here’s how it works: The scammer sends