Achive.php Cyber News - The Cyber Shark

14 years after rejecting it, Karnataka intends to implement sex education programs.

sex education

Karnataka schools to introduce sex education for grades 8-12, focusing on reproductive health, cyber safety and moral values. The initiative marks a shift from previous opposition to such programs. In Karnataka’s schools, sex education has long been a controversial subject. Despite suggestions from Unicef and child rights organisations, the state government flatly rejected a plan to implement it as part of an anti-AIDS initiative in 2011. Officials at the time contended that students would not benefit from such instruction. Now, following years of discussion, Karnataka is adopting a new strategy. Along with moral instruction for younger kids, the government has announced intentions to provide sex education for grades 8 through 12. SEX EDUCATION, COUNSELLING, AND CYBER SAFETY The new proposal calls for local doctors to lead sex education seminars twice a week for students. Teens will learn about reproductive health, cleanliness, and making responsible decisions, as well as how their bodies, emotions, and hormones are changing. Additionally, twice a year, kids in Classes 1 through 10 will get health examinations. Primary Health Centre physicians and nurses will offer advice on disease prevention, proper cleanliness, and the dangers of substance addiction. To guarantee that kids, particularly those who are dealing with behavioural challenges, receive the appropriate help, schools will also set up counselling programs. By offering cyber hygiene courses, the government is also addressing online safety and digital addiction. Although there is no set schedule for implementation, these courses will instruct students on how to use the internet securely, stay safe from online threats, and develop good screen habits. In addition to digital safety and health, the project raises knowledge of the law. In order to ensure that kids are aware of their rights and are able to recognize dangerous circumstances, police officers will visit schools to teach them about the Protection of Children from Sexual Offences (POCSO) Act. MORAL EDUCATION TO SHAPE VALUES Up until Class 10, moral education will be required for younger pupils. These twice-weekly lectures, which will focus on characteristics like probity, patience, and respect, will emphasize the idea that character development is just as vital as academics. INDOA’S CONTENTIOUS HISTORY OF SEX EDUCATION In India, sex education has long been a contentious issue, and important attempts to implement it have been thwarted. To educate pupils about puberty, sexual health, HIV/AIDS prevention, and related subjects, the National Council of Educational Research and Teaching (NCERT) launched the Adolescence Education Programme (AEP) in 2007. However, parents, conservative organizations, and politicians strongly opposed the initiative. Many states, including Gujarat, Maharashtra, Madhya Pradesh, Karnataka, Rajasthan, Chhattisgarh, and Goa, outlawed sex education in schools as a result of the outcry. NCERT was forced to remove its sex education module from schools as a result of this opposition. The resistance was based on worries that the material was against cultural norms and unsuitable for school-age youngsters. Regarding the implementation of sex education, this dispute demonstrated the conflict between contemporary educational goals and conventional societal norms. Jharkhand launched ‘Udaan’ in 2009, a school-based program for adolescents in Classes 6–11 that emphasizes health education and life skills. Over a million children were impacted by this program in 2019, and it is still going strong today. Despite issues, initiatives to advance comprehensive sex education are still underway in several places, acknowledging its significance for the health and well-being of adolescents. Karnataka’s decision to implement sex education classes is a change from its previous position, although it is unclear if opposition would resurface. UNICEF blasted the government in 2011 for avoiding talking about adolescent health, claiming that keeping information secret endangered children. Although the new program is more in line with international best practices, its effectiveness will rely on how well it is executed and whether or not previous discussions come up again.

Has the open-source AI from DeepSeek turned into a tool for online fraudsters?

open-source AI from DeepSeek

Researchers found that DeepSeek’s open-source AI model can be exploited to create malware with minimal tweaks. Experts warn of potential misuse despite basic safeguards. According to a recent study, malicious actors may utilize DeepSeek’s open-source, free AI models to create harmful malware while displaying shoddy security measures. Since the public was made aware of the current scope of generative AI, governments and regulators have been alerting people to the potential for LLMs like ChatGPT and Gemini to be used to write harmful code. A few LLMs have already been created expressly for illegal purposes, but although these models usually demand money to access and the major LLM providers have safeguards in place, scammers have an advantage with DeepSeek’s open-source, publicly available architecture. Research by Nick Miles of Tenable Research revealed that the DeepSeek R1 model, a reasoning large language model (LLM) created by the Chinese company, could produce the “basic structure for malware,” providing barriers that are “easy to work around” and “vulnerable to a variety of jailbreaking techniques.” Miles tried to use DeepSeek to develop a key logger for the test that could secretly record keystrokes from users of a device while evading the operating system’s defences. Telling the LLM that the exercise was for “educational purposes only” was enough to persuade it to continue after its initial refusal. After following DeepSeek’s directions, a functional key logger was eventually produced, even though the model’s code needed to be manually rewritten in a few places. Miles also tried to create a sample of simple ransomware, which is a kind of software that prevents users from accessing their files that are susceptible to ransomware. Miles was able to create a few functional ransomware samples after some back and forth, but they also needed human editing to work. Once more, the system’s restrictions cautioned against the practice. The researcher concluded that malicious actors may get over DeepSeek’s safeguards against malware production with a little tweaking. The results do not portend a total catastrophe because the model’s outputs depend on a significant amount of prior coding information. “However, DeepSeek offers a helpful collection of methods and search terms that can enable someone who has never written malicious code before to become quickly acquainted with the pertinent ideas,” Miles said. According to my investigation, I think DeepSeek will soon encourage thieves to create more dangerous AI-generated programs.

Organ Trafficking Scam: Pune Doctor Falls Victim to Rs 70 Lakh Cyber Scam

Organ Trafficking Scam

Pune Doctor Loses Rs 70 Lakh in Organ Trafficking Scam by Cybercriminals Impersonating Law Enforcement A doctor from Pune fell victim to a cybercrime involving an organ trafficking scam, losing Rs 70 lakh to fraudsters who posed as law enforcement officers. The cybercriminals accused her of participating in an international organ trafficking scam, using fake video calls and threats of arrest to manipulate her into transferring her savings. The anesthesiologist, currently employed at a city hospital and in her late fifties, filed a formal complaint (FIR) at a cybercrime police station after realizing she had been duped. The scam began in the final week of February, when she received a call from a man claiming to be a bank official. He told her a card registered in her name had been misused and advised her to contact the “Delhi CID” to address potential illegal activity. On a video call, a scammer dressed as a police officer, in a setup resembling a police station, claimed she was under investigation for her involvement in a major organ trafficking scam linked to child trafficking. The cybercriminals alleged her bank accounts were tied to transactions worth Rs 3 crore and threatened her with arrest if she did not cooperate. She was coerced into disclosing details of her assets, including investments and savings, under the pretext of an official inquiry. Later, a scammer posing as a prosecutor convinced her to transfer her wealth to a so-called “official” mule account, promising she would get her money back soon. The scammers later demanded more money and even persuaded her to mortgage her house. When she contacted a family member for help, she realized she was a victim of a sophisticated organ trafficking scam and promptly filed a report with cybercrime police. Investigations have revealed that such frauds are orchestrated by multi-layered, geographically dispersed syndicates that launder money through Bitcoin, moving funds from victims to mule accounts and eventually to international cybercriminal networks. In May last year, the Ministry of Home Affairs stated that the National Cyber Crime Reporting Portal (NCRP) was receiving numerous complaints of blackmail, extortion, and “digital arrests” by cybercriminals posing as law enforcement officers and agencies, including the CBI and RBI. Prime Minister Narendra Modi also highlighted the dangers of such scams, including the organ trafficking scam, during his “Mann Ki Baat” address.

DoT and WhatsApp Unite to Launch ‘Scam Se Bacho’ for Digital Safety

Scam Se Bacho

DoT and WhatsApp have launched the “Scam Se Bacho” campaign to combat online scams and enhance digital safety. The initiative includes training and multilingual resources for citizens. On March 17, 2025, the Department of Telecommunications (DoT) and WhatsApp joined together to broaden Meta’s safety campaign against online spam and scams, known as “Scam Se Bacho. DoT and WhatsApp will collaborate to improve digital safety and awareness by teaching citizens how to spot and report suspected fraudulent communications. The initiative would include training workshops for field units, Telecom Service Providers (TSPs), Sanchar Mitras, and DoT officials. To increase the reach of Sanchar Saathi projects, WhatsApp will also collaborate with DoT to investigate ways to develop citizen-centric services via the WhatsApp platform. Joel Kaplan, Chief Global Affairs Officer at Meta, met with Jyotiraditya Scindia, the North East Region’s Union Minister of Communication and Development, to discuss the success of DoT and Meta’s continued partnership. WhatsApp (Scam Se Bacho) is taking preventive action against the misuse of telecom resources for financial fraud and cybercrime by collaborating with the DoT’s Digital Intelligence Unit and utilizing the data from DIP. “The best way to stop people falling victim to scams and online fraud is to make sure they know what to look out for and what they can do to stay safe,” said Kaplan. He said that by collaborating with the Department of Telecommunications, we can help provide Indians with the information they need to keep safe by fusing our technology know-how with the government’s dedication to public safety. As India moves on with its digital transformation, protecting our citizens’ safety and security is still of utmost importance, according to Sc india. “This dedication to shielding our citizens from deceptive communications and online threats is strengthened by our collaboration with Meta. We are stepping up efforts to make sure that our digital ecosystem is safe and robust for everyone by utilizing WhatsApp’s extensive online presence,” the minister stated. WhatsApp and DoT will also work together to create educational resources that will teach users how to spot and report online spam and fraud (Scam Se Bacho). Hindi, Bengali, Marathi, Tamil, Telugu, Kannada, Malayalam, and Gujarati are among the regional languages into which all user safety materials will be translated to maximize accessibility.

Hindustan Aeronautics Limited Kanpur Loses ₹55 Lakh in Cyber Fraud Due to Misspelled Email Address

Hindustan Aeronautics Limited

Hindustan Aeronautics Limited Kanpur lost ₹55 lakh in a cyber fraud after scammers used a fake email address with a missing letter to alter bank details and divert funds. The incident is under police investigation. The most recent victim of cyber fraud was Hindustan Aeronautics Limited (HAL), Kanpur, which lost Rs 55 lakh to cyber criminals after failing to recognize the missing letter “e” in one of the email addresses. The scammers altered bank account information and redirected the payment to their account while using an email address that was almost the same as that of an authentic American supplier. Vulnerabilities in high-stakes international transactions have been revealed by cyber fraud, which is currently being investigated by police. What happened? The public-sector aerospace and defence firm Hindustan Aeronautics Limited regularly purchases fighter aircraft parts from international vendors. The company was negotiating aircraft parts with PS Engineering Inc., a US-based corporation, in 2024. Hindustan Aeronautics Limited asked for a quote for three particular parts on May 3. The officialemail ID, gledbetter@ps-engineering.com. was used for all correspondence. However, unidentified cybercriminals who had probably been keeping an eye on the email exchange made the false email address jlane@ps-enginering.com, which just has the letter “e” missing from engineering. By using fake bank account information, the scammers pretended to be the vendor and persuaded Hindustan Aeronautics Limited to send the money. Before anyone realized what was going on, $63,405 (around Rs 55 lakh) was transferred into the incorrect account. When PS Engineering Inc. notified Hindustan Aeronautics Limited that they had not been paid, the fraud was discovered. When concerned HAL officials looked over their transaction history, they found the phoney email address. An official investigation was initiated after Ashok Kumar Singh, Additional General Manager of Hindustan Aeronautics Limited Kanpur, filed a First Information Report (FIR) at the Cyber Police Station in response to the disclosure. In order to carry out the scam, investigating police believe the cybercriminals may have compromised the email systems of Hindustan Aeronautics Limited or intercepted communications. To determine the source of the phoney account and find the culprits, the police have enlisted the help of cybersecurity specialists from IIT Kanpur.

Digital arrest scam, a woman from Mumbai lost Rs 20 crore to scammers

Digital arrest scam

Digital arrest scam : Two men posing as police officers duped an 86-year-old Mumbai woman of Rs 20.25 crore in a money laundering scam. The accused, who is part of an international fraud network, has been arrested. The 86-year-old woman in South Mumbai was virtually accosted by two men in December 2024 who pretended to be police officers. To resolve the matter, they forced her to transfer funds to several bank accounts and threatened her, saying that her Aadhar card had been used fraudulently in a money laundering case. Between December 26, 2024, and March 3, 2025, the suspected Rs 20.25 crore scam took place, according to the police. digital arrest scam the callers said that an Indian bank had opened an account in her name using her Aadhar card and other personal data. They informed her that this account had been used in a massive money laundering scheme and that police action was on the horizon.  The accused intimidated her by threatening to report her and her family, including her daughter, to the police. They tricked her into sending money to their accounts by feigning a “digital arrest scam.” Shayan Jamil Sheikh (20) and Rajik Azam Butt, who reside in Malad (West) and Mira Road (East), respectively, have been identified as the accused. Both of the accused have been arrested by the police. A larger conspiracy The report stated that Butt is suspected of being involved in a larger international scheme, citing police sources. On the Telegram messaging service, he formed a group with thirteen foreigners, according to the police. He allegedly exchanged Indian bank account details with this group to assist in committing fraud. The authorities found Butt’s affiliation with a worldwide fraud network after searching Shayan and Rajik’s cell phones after they were arrested. He set up the Telegram channel, investigators discovered, to provide scammers in other nations with information about Indian bank accounts. Both accused, according to officials for digital arrest scam , were personally involved in the planning and execution of the crime and were members of a global fraud gang. Now, they’re looking into how many more bank accounts have been provided to the foreign masterminds.

WhatsApp DP ‘cloned’, Rs 50 lakh lost to fraud, Police arrest six people behind scam

WhatsApp DP ‘cloned’

WhatsApp DP ‘cloned’ are being used by cybercriminals in Kolkata to dupe businessmen, with one case involving a ₹50 lakh fraud. Police arrested six suspects and recovered over ₹24 lakh. Police added that a new trend among some of the city’s cybercriminals with ties outside the state is using phoney WhatsApp DP to defraud businessmen. Six persons, including three from the Mumbai suburb of Nallasopara, have been taken into custody on suspicion of copying a city merchant’s WhatsApp DP picture (DP) and using it to defraud the trader’s buddy out of ₹50 lakh, according to police. The retailer sells plywood under a well-known brand. A new trend among some of the city’s cybercriminals with ties outside the state is using phoney WhatsApp DP to defraud businessmen, according to police. According to the police, they have taken more than ₹24 lakh from the defendant. After a complaint was filed with the Park Street police station on March 4, an investigation was started. The last arrest was made on Pollock Street on 15 March 2025, according to the police, and the others had been made throughout the past few days. On March 1, the six-person group allegedly called a buddy of the merchant and requested him to set up ₹50 lakh after cloning his WhatsApp DP, according to the police. The caller said that he had an emergency and required the money in cash. “The gang asked the trader’s friend, who lived on Park Street, to arrange the money over the phone. The acquaintance obtained the sum from various sources and gave it to two of the six defendants who pretended to be the plywood merchant’s agents, according to a senior Park Street police station officer. The officer stated that the transaction happened on Park Street. The fraud was discovered within the following three days, and the merchant discovered that his DP had been used to defraud his friend. Following the pertinent parts of the Bharatiya Nyaya Sanhita, including 338 (forgery), 336 (cheating someone by modifying electronic data or papers), and 340 (passing forged electronic documents as real), a case was prepared at Park Street police station after the businessman filed a complaint. Investigators started looking into local CCTV videos. They focused on a few of the defendants. All of the city’s police stations, as well as those throughout Bengal and even outside the state, received scanned copies of their (WhatsApp DP) photos. Three men, Waqab Mohammad, 28, Riya Razi Sayed, 36, and Sachin Manohar Prasad, 32, were taken into custody on March 13 by a Kolkata Police team that had travelled to Mumbai with the assistance of their counterparts in Nallasopara, the officer said. Along with the clothing the three were wearing on the day the money was turned up, a backpack that was used to hold the cash was found. They were also found to have five pre-activated SIM cards,” he stated. The authorities discovered during questioning that the three had committed the crime by using their contacts in Calcutta. Pawan Shaw, 36, was taken into custody in Phool Bagan on March 14. Mahendra Pal Singh, 39, and Chetan Singh Dahiya, 40, were taken into custody by the police on Pollock Street in the heart of Calcutta after they confessed. “A currency counting machine and more than ₹24 lakh were found on them,” the officer stated. “The entire plot has not yet been revealed.” A central Calcutta businessman lost over ₹2 crore in a similar scam last week. He was allegedly duped by scammers into utilizing internet payments to purchase expensive cameras from them. Fake WhatsApp DP for well-known camera vendors in the nation were used by the scammers. Following an investigation by the cyber wing, Kolkata Police assisted the dealer in recovering around ₹1.6 crore.

Digital arrests, cyber crimes tripled during 2022-24, govt tells Parliament

Digital arrests

Digital arrest scams in India tripled from 2022 to 2024, with losses soaring 21 times to Rs 19,35.51 crore. The government blocked suspicious accounts and launched awareness campaigns to curb cybercrime. The Rajya Sabha was notified on March 12, 2025, that the number of digital arrest scams and associated cybercrimes in the nation nearly tripled in the middle of 2022 and 2024, with the amount of money deceived increasing by 21 times during that time. The Minister of State for Home Affairs, Bandi Sanjay Kumar, answered a question by giving details about digital arrest frauds and related cybercrimes that have been reported on the National Cybercrime Reporting Portal (NCRP) during the previous three years. 39,925 of these occurrences were recorded in 2022, with the total proceeds of the fraud amounting to Rs 91.14 crore. The overall amount of cheated money recorded on the portal increased by an astounding 21 times to Rs 19,35.51 crore in 2024, while the number of such cases nearly tripled to 1,23,672. Data shows that 17,718 incidents totalling Rs 210.21 crore in fraud were reported up to February 28 in the first two months of 2025. “Cybercrime incidents reported for digital arrest on this portal, their conversion into FIRs and subsequent action thereon are handled by the state/UT law enforcement agencies concerned, as per the provisions of the law,” Kumar said. The Union Home Ministry’s Indian Cyber Crime Coordination Centre (I4C) has proactively detected and blocked around 3,962 Skype IDs and 83,668 WhatsApp accounts that are used for digital arrest, the minister stated. In 2021, the Citizen Financial Cyber Fraud Reporting and Management System was introduced under I4C to prevent financial fraudsters from stealing money and to enable prompt reporting of financial frauds. “nearly 13.36 lakh complaints have resulted in savings of nearly Rs 4,386 crore to date. For assistance in filing online cyber complaints, a toll-free helpline number, 1930, has been operationalized, according to Kimar. According to the minister, I4C and the Department of Telecommunications (DoT) have started a caller tone campaign to increase awareness of cybercrime and promote the NCRP and helpline number 1930 to combat the threat. “The caller tune is also being played in regional languages, delivered 7-8 times a day by the telecom service providers (TSPs),” the minister said. The Central government and the TSPs have developed a method to detect and reject incoming overseas spoof calls that display Indian mobile numbers and seem to be coming from within India, Kumar said in response to a second inquiry about the matter. “TSPs have received instructions to block these inbound international fake calls. According to police officials, the Indian government has blocked 2,08,469 IMEIs and about 7.81 lakh SIM cards as of February 28, 2025,” Kumar stated. The minister responded to a follow-up question by stating that on September 10, 2024, 14C, in partnership with banks and financial organizations, established a suspect registry of cyber criminals for digital arrest. “So far, more than eight lakh suspect records and over 20 lakh mule accounts have been shared with the participating entities of the suspect registry, saving more than Rs 2,889 crore,” Kumar said.

Elon Musk claims ‘massive cyber-attack’ caused X outages

Elon Musk claims

Elon Musk claimed a “massive cyber-attack” caused X outages on March 10, 2025, with possible ties to Ukraine. The disruptions occurred alongside ongoing challenges facing his businesses, including Tesla protests and a SpaceX rocket failure. On the afternoon of March 10, 2025, Elon Musk asserted that X was the victim of a “massive cyber-attack” that caused sporadic service interruptions that shut down his social network all day. For many users, the platform—formerly known as Twitter—had been sluggish, with posts failing to load. The CEO of the site wrote, “This was accomplished with a lot of resources, but we get attacked every day.” “Either a nation or a sizable, well-organized group is involved.” Thousands of reports of outages that first rose at around 5.45 am before settling down for a few hours were displayed by Down Detector, a tool that tracks outages on different websites and platforms. Midway through the day, there was a second spike in reported failures, most of which were on the company’s mobile app. When a tweet didn’t show up, it said “something went wrong” and advised users to try loading again. The world’s wealthiest guy made assertions without supporting documentation. In response to a Bitcoin influencer who implied that the downtime mirrored earlier criticism of Elon Musk businesses, he posted. Over the past week, there have been vandalism attacks against Tesla dealerships and protests against the so-called “Department of Government Efficiency” project that Musk oversees. In an interview with Fox Business later that day, Musk reiterated his claim of a hack and speculated that the assailants may have been Ukrainian. According to Elon Musk, “A massive cyber-attack was launched to try to bring down the X system with IP addresses originating in the Ukraine area, but we’re not exactly sure what happened.” As ties have worsened between the Ukrainian government and the Trump administration, Musk has been harshly critical of it. Musk claimed over the weekend that if he shut down his Starlink satellite communications provider, the nation’s “entire front line” would fall apart. He also referred to Democratic Senator Mark Kelly as a “traitor” when the politician shared his trip to the country on social media. The CEO of SpaceX, who paid $44 billion to acquire Twitter in 2022, has also asserted that cyberattacks were to blame for earlier platform disruptions. Last year, Elon Musk claimed that a “massive DDOS attack” was to blame for the near-instantaneous meltdown of his live-streamed discussion with Donald Trump. The Verge was later informed by a company source, however, that there was no attack. The X outages are only one of many problems Musk’s companies and projects have been dealing with lately. One of Musk’s SpaceX rockets burst in midair on March 7, 2025, showering debris in the vicinity of the Bahamas. Tesla customers are selling their cars, the company’s stock price dropped on 10 March 2025 to its lowest level in months, and his auto company’s showrooms have been the subject of an Over the past week, there have been numerous “Tesla takedown” protests across the country. Following a heated meeting with Elon Musk and his cabinet secretaries, Trump said he might limit Elon Musk authority over government employees, whom the entrepreneur has fired in large numbers from some departments.

I4C’s ‘Pratibimb’ Module Revolutionizes Cybercrime Investigations with 6,000+ Arrests

Pratibimb

The ‘Pratibimb’ module provides jurisdictional officials with visibility into the locations of offenders and crime infrastructure. The Lok Sabha received notice on March 11, 2025, that the Indian Cyber Crime Coordination Centre (I4C) of the Union Home Ministry had introduced the ‘Pratibimb’ module, which tracks the whereabouts of criminals and has led to 36,296 requests for help with cyber investigations, 17,185 linkages, and 6,046 accused arrests. Bandi Sanjay Kumar, Minister of State for Home Affairs, responded to a query by stating that ‘Samanvaya‘, a platform for information sharing and analysis on cybercrimes, has been introduced for Law Enforcement Agencies (LEAs). According to him, it offers data on the perpetrators and crimes linked to interstate connections in cybercrime complaints from different States and UTs. The ‘Pratibimb’ module maps the locations of offenders and crime infrastructure, giving jurisdictional officials visibility. Law Enforcement Agencies can more easily request and receive techno-legal support from I4C and other SMEs thanks to this module. 36,296 requests for assistance with cyber investigations, 17,185 links, and 6,046 accused people have been arrested as a result,” the Minister stated. He went on to say that I4C is an affiliated office established by the Ministry to coordinate and fully address all forms of cybercrimes in the nation. The state-of-the-art ‘National Cyber Forensic Laboratory (Investigation)’ was established as part of the I4C in New Delhi to provide early-stage cyber forensic support to State/UT Police Investigating Officers (IOs). According to him, the National Cyber Forensics Laboratory (Investigation) has so far assisted State/UT LEAs in about 11,835 cybercrime cases.