Achive.php the cyber shark Archives - Page 9 of 18 - The Cyber Shark

Microsoft discloses how AI techniques have increased the risk of tech support fraud, employment fraud, and e-commerce fraud

Microsoft

Microsoft’s latest Cyber Signals report reveals that AI is fueling sophisticated fraud schemes in e-commerce, job recruitment, and tech support by enabling realistic fake websites, job offers, and social engineering attacks. The company has blocked billions in fraud attempts and urges users to stay vigilant and verify sources. According to the latest Cyber Signals study from Microsoft, artificial intelligence has significantly lowered barriers for hackers, enabling more intricate and believable fraud schemes.  Microsoft rejected 49,000 phoney partnership enrollments, halted $4 billion in fraud attempts, and stopped over 1.6 million bot signup attempts per hour between April 2024 and April 2025. E-commerce fraud: AI can quickly produce realistic-looking phoney stores Thanks to AI algorithms, scammers can now create believable e-commerce websites in a matter of minutes rather than days or weeks.  With artificial intelligence (AI)-generated product descriptions, images, and phoney customer evaluations, these websites mimic actual businesses. Another degree of dishonesty is introduced by AI-powered chatbots for customer support, which engage with consumers and postpone complaints using prewritten justifications to postpone chargebacks. Microsoft claims that the primary origins of this AI-powered fraud are China and Germany, with the latter being singled out due to its status as one of the largest e-commerce markets in the EU.  In order to combat these assaults, Microsoft has incorporated fraud detection features into a number of its products, including Microsoft Defender for Cloud and Microsoft Edge, which provide deep learning-based domain impersonation detection and typo protection for websites. Employment fraud includes phoney interviews and employment offers enabled by AI Generative AI has increased employment theft by allowing scammers to create phoney job postings, credentials that have been stolen, and AI-powered email campaigns that are directed at job searchers.  These scams might appear authentic through automated correspondence and AI-powered interviews, making it more difficult to identify fraudulent offers. Warning signs include unsolicited job offers that seem too good to be true, requests for personal information, such as bank account details, and offers that make large compensation promises for minimal qualifications.  Microsoft cautions job seekers to verify the credibility of employers by cross-referencing corporate information and to be wary of communications from free domains rather than official company email addresses. On official websites and platforms like LinkedIn. Tech support fraud: AI strengthens social engineering attacks Even if other tech support schemes do not yet use AI, Microsoft has witnessed financially motivated gangs like Storm-1811 use voice phishing to imitate IT support to gain victims’ devices through legitimate features like Windows Quick Assist. To produce more convincing social engineering lures, AI techniques can speed up the gathering and organisation of data on the intended victims.

Cyber Fraud Alert: Ministry Of Home Affairs Warns Citizens about Fake Booking Websites Targeting Pilgrims and Tourists

Ministry Of Home Affairs

The Ministry of Home Affairs has warned against rising online booking scams targeting tourists via fake websites and social media ads. Citizens are urged to verify platforms before payments and report fraud through the National Cybercrime Reporting Portal or helpline 1930. Mumbai: The Ministry of Home Affairs has warned the public about online booking scams, particularly those that target tourists and religious pilgrims nationwide. According to the officials, these scams are being carried out via Facebook postings, phoney websites, misleading social media profiles, and sponsored ads on search engines like Google. According to statistics, Mumbai recorded 19 cases involving bogus websites in the first quarter of this year; just four of these cases were found, and three people were taken into custody. The officials claim that these scams entail the establishment of phoney but professional-looking websites, social media profiles, and WhatsApp accounts that offer services like online taxi and taxi service bookings, holiday packages, religious tours, and helicopter reservations for Kedarnath, Chaar Dhaam, pilgrims’ guest houses, and hotels. “Unsuspecting individuals, upon making payments through these portals, often realise they have been duped when no confirmation or service is received, and the contact numbers go unreachable,” the alert read. “Be sure a website is legitimate before making a purchase.  When clicking on “sponsored” or unidentified links on Facebook, WhatsApp, or Google, exercise caution. To double-check reservations, only utilise trustworthy travel agencies or official government websites.  The warning further said, “Report such websites right away at the National Cybercrime Reporting Portal: www.cybercrime.gov.in or call 1930 in case of any fraud.” The Indian Cyber Crime Coordination Centre is taking several steps to stop these scams. Scam signals are often communicated with IT intermediaries like Google, Facebook, and WhatsApp for proactive identification. States and UTS where crimes originate are being made more aware of cybercrime hotspots. Fake websites /advertisements and impersonating social media accounts are being deleted periodically to safeguard citizens. The National Cybercrime Reporting Portal’s suspect checking and reporting tool was created to make reporting easier, according to government representatives.

SIM Swap Scams: A Growing Danger to Your Online Security

SIM Swap Scams

SIM Swap Scams are rising threats that enable cybercriminals to hijack phone numbers and access sensitive accounts. Protecting yourself with app-based 2FA, mobile account PINs, and cautious information sharing is crucial to staying secure. In today’s increasingly digital world, smartphones are more than communication tools; they are gateways to our personal data, finances, and online identities. Unfortunately, this makes them prime targets for cybercriminals. One of the most alarming types of fraud on the rise is SIM Swap Scams, also known as SIM hijacking. This scam can lead to severe consequences including financial loss, identity theft, and complete account takeovers. What is SIM Swap Fraud? SIM Swap Scams occur when a scammer successfully transfers your mobile number from your legitimate SIM card to the one they control. Once they gain control of your number, they can intercept calls and text messages, especially one-time passcodes (OTPs) used for two-factor authentication (2FA). This gives them unauthorised access to sensitive accounts, such as your bank, email, and social media. In 2021 alone, SIM Swap Scams accounted for an estimated $68 million in losses. In 2022, more than 1,600 complaints were reported in the U.S., indicating a global surge in such attacks as digital reliance increases. How SIM Swap Scams Work To execute a SIM swap, fraudsters gather personal information about their target through various means: Social Engineering: Scammers impersonate mobile carrier representatives and trick victims into revealing sensitive information. Phishing: Fraudsters send fake messages or emails appearing to be from legitimate organizations to extract personal details. Data Breaches: Hackers exploit leaked data from company breaches, using stolen names, addresses, and phone numbers to impersonate victims. Once they have the necessary details, scammers contact the victim’s mobile carrier pretending to be the victim. They claim they lost their phone and request a SIM replacement. Upon successful execution, the phone number is ported to the scammer’s SIM card, giving them full access to incoming calls and SMS-based OTPs. Risks of SIM Swap Fraud The implications of SIM swapping are far-reaching: Bank Account Takeovers: Scammers can intercept OTPs used for bank logins and drain your account. Social Media Hijacking: Fraudsters may take over social accounts to extort money or spread malicious content. Identity Theft: With access to your data, scammers can impersonate you, open new accounts, or conduct fraudulent activities in your name. Between 2018 and 2020, SIM Swap Scams caused a reported $12 million in losses, as per FBI data. With widespread reliance on SMS-based 2FA, the threat has never been more severe. How to Protect Yourself from SIM Swap Fraud Use Stronger 2FA Methods Avoid SMS-based 2FA when possible. Instead, opt for app-based authenticators like Google Authenticator or Authy, which are not tied to your phone number. Set a PIN or Password with Your Carrier Many mobile providers offer the option to add an extra layer of security in the form of a PIN or password. This makes it more difficult for scammers to impersonate you. Monitor Your Accounts Stay vigilant and regularly check your bank, email, and social media accounts for suspicious activities. Report any unusual behaviour to your service provider immediately. Be Cautious with Personal Information Limit what you share on social media, especially personal identifiers like your full name, date of birth, and address, which can be used by scammers to validate a SIM swap. Act Fast If You Suspect Fraud If you suddenly lose cell service or suspect your number has been compromised, contact your mobile provider immediately to lock your account and prevent further damage. Is eSIM Technology the Answer? An emerging technology that could reduce the risk of SIM swap fraud is the eSIM. Embedded directly into devices, eSIMs do not require physical cards, making it more challenging for fraudsters to swap or replace them. Benefits of eSIMs include: Enhanced Security: Harder to manipulate than physical SIMs. Convenience: Easily switch carriers without changing SIM cards. Space Efficiency: More compact design for slimmer devices. Although not yet universally adopted, eSIMs represent a promising step toward more secure mobile connectivity. SIM Swapping vs. Porting Attacks SIM swapping and porting attacks are often confused but operate differently: SIM Swapping: Involves fraudulently transferring a number to a new SIM card. Porting Attack: Transfers the number to a new carrier without switching the physical SIM. Both techniques allow scammers to hijack your accounts by intercepting 2FA codes. How SIM Swaps Lead to Account Takeovers Once in control of your number, scammers can: Reset passwords for key accounts using intercepted OTPs. Gain access to emails, social media, and banking apps. Use compromised access to commit further identity theft and fraud. This chain of events can devastate victims financially and emotionally, making prevention crucial. How Businesses Can Protect Customers Organizations, especially in tech and finance, must take steps to prevent account takeovers: Implement risk-detection systems like Prove’s Trust Score+ that evaluate SIM swap likelihood based on telecom data and user behaviour. Encourage users to enable app-based 2FA. Alert users of any suspicious account activity. By integrating proactive security tools, businesses can minimize the threat of SIM swap fraud and better protect their users. Conclusion SIM swap scams are a growing threat in the digital age, but awareness and proactive measures can significantly reduce your risk. Using app-based 2FA, securing your mobile account with a PIN, and limiting exposure to personal information are vital steps toward protecting your digital identity. As eSIM technology becomes more prevalent, it may further strengthen our defences against these attacks. Stay informed, stay cautious, and take control of your mobile security to avoid falling victim to this dangerous scam.

Karnataka orders formation of cyber command unit within state police to tackle rising cybercrimes

cyber command unit

The Karnataka government has established a Cyber Command unit within the state police to address the surge in cybercrimes, with 52,000 cases reported last year. The unit will operate under the Home Department and be led by the DGP for Cybercrime and Narcotics, using existing posts to minimize costs. On April 9, 2025, the Karnataka government issued an edict establishing a Cyber Command section within the state police to solely address the increasing number of cybercrime charges. According to the government directive, the Cyber Command unit will report directly to the state home department rather than the state police chief. It will be supervised by the Director General of Police for Cybercrime and Narcotics inside the Criminal Investigation Department. Traditional crimes like robbery, dacoity, and other types of physical theft have now been surpassed by cybercrimes. According to government sources, Karnataka recorded 52,000 cybercrimes last year, the most of any South Indian state. 43 CEN (cyber, economics, and narcotics) police stations, cyber-crime police stations operating under DGP, and CID under the Cyber Crimes Prevention Unit will be renamed by the government as part of the project. Up to 193 current police positions of all levels have been reorganized to operate under the cyber command. The Karnataka State Excise Act, 1965 (Karnataka Act, 21 of 1966), the Lotteries Act, 1964, the Karnataka State Lottery Rules, 1999, the Unlawful Activities Prevention Act, 1967 (Central Act, 37 of 1967), the Karnataka Control of Organized Crime Act, 2000 (Karnataka Act, 1 of 2002), and the Information Technology Act, 2000 all grant the CEN police stations the authority to file cases. Additionally, they are authorized to register offences under sections 420, 409, 467, 468, 471, 489 (A-E) of the Indian Penal Code (IPC) where the total amount involved exceeds Rs 50 lakh and to register money deposit frauds. To effectively prevent cybercrimes in Karnataka, the order states, “The Director General and Inspector General of Police have reviewed this proposal and considered it appropriate to establish a new Cyber Command Unit in the state without creating any new posts, using the existing posts, and without incurring much financial burden.” The Deputy Chief Secretary to the Government, Department of Home Affairs, will oversee the Cyber Command, which will be established by separating the positions of the DGP, Narcotics, and Cyber Crime in the CID Division. Pronab Mohanty, an IPS officer from the 1994 batch, is currently the DGP Narcotics and Cyber Crime. The government order states that the DG Cyber Command will oversee the Karnataka Cyber Security Policy and serve as the state’s Chief Information Security Officer. Additionally, a Multi Departmental Coordinating Committee (MDCC), established in March 2024 to handle disinformation cases, will report to the DG Cyber Command.

Open AI CEO Sam Altman claims Chat GPT can now reference and recall all your prior chats

Open AI

Open AI CEO Sam Altman announced that ChatGPT’s memory has been significantly improved, allowing it to recall and reference all prior conversations for more personalized responses. The feature is rolling out to Pro users first, with broader access coming soon, and users can manage or disable memory anytime. ChatGPT’s memory feature has been “greatly improved,” according to OpenAI CEO Sam Altman, who announced on 10 April 2025. This means that it can now recall and refer to all of your previous conversations with it. According to OpenAI, the feature will enable ChatGPT to provide more tailored responses based on your interests and preferences, making it even more useful for writing, learning, and other purposes.  “I think this is a fantastic feature, and it indicates something we are very excited about: AI systems that learn about you for your life and become incredibly helpful and customized,” Altman says. The feature’s rollout has already started. Only ChatGPT Pro members will be allowed to access it at first, and ChatGPT Plus customers will “soon” be able to do the same. In a few weeks, Team, Enterprise, and Edu customers will also have access, according to OpenAI. When or if the feature will be made available to free users is unknown. “EEA, UK, Switzerland, Norway, Iceland, and Liechtenstein” will not be able to use the service, Altman said. ChatGPT already has the memory feature. In September 2024, it was made available to ChatGPT Free, Plus, Team, and Enterprise users. The feature has now been enhanced, though. With the most recent update, OpenAI CEO Sam Altman claims that ChatGPT would be able to recall all of your previous chats with it when previously there were restrictions on how much context the chatbot could recall. This appears to be the beginning of your AI agent. It can now refer to your previous conversations in addition to the previously saved memories to provide answers that seem notably more pertinent and helpful. On X, OpenAI wrote, “New conversations organically build upon what it already knows about you, making interactions feel smoother and uniquely tailored to you.” Users will also have the option to choose not to use the functionality. Of course, you can choose not to participate in this or any recollection at all. In an article about X, OpenAI said, “New conversations organically build upon what it already knows about you, making interactions feel smoother and uniquely tailored to you.”You can go to Settings > Personalization > Memory to turn off the feature. You can switch memory there. Turning it on or off will prevent ChatGPT from remembering anything you discuss in the future. Additionally, you can choose “Manage Memory” to view the memory that is saved or to fully clear it. You have complete control over ChatGPT’s RAM as usual. You can change your settings at any time to stop using memory or previous conversations. By default, you will not be able to access previous conversations if you have already opted out of memory. Just ask in chat if you would want to modify the information that ChatGPT has on you. Use an ephemeral chat if you want to talk without consuming or affecting memory.

Helpline 1930 links Panchkula cyber victims to prompt action

Helpline 1930

Increased awareness of cybercrime helpline 1930 in Panchkula has led to a rise in fraud reporting, faster recovery of funds, and more arrests. In early 2025, FIRs and recoveries nearly doubled compared to the previous year due to timely reporting. Increased awareness of the National Cybercrime Helpline 1930 has led to a rise in complaints, better recovery of fraudulent payments, and more arrests of scammers, so Panchkula residents are reporting online scams more swiftly. The Union Ministry of Home Affairs (MHA) launched a specialized cybercrime helpline in 2021 to allow victims to report online fraud immediately. This helps to quickly freeze illicit transactions and, eventually, aid in recovery. The Ministry of Home Affairs (MHA) created the Indian Cybercrime Coordination Centre (I4C), which runs the National Cyber Crime Reporting Portal and helpline. In the first three months of 2025, Panchkula cyber police received 911 complaints of fraud totalling ₹7.62 crore. Compared to the same period in 2024, when 807 complaints about losses totalling ₹7.38 crore were received, this indicates a 12% rise. Between January and March of this year, the number of FIRs filed about cyber scams doubled from 21 in 2024 to 43 this year. As evidenced by the fact that ₹32.95 lakh (43%) of the ₹75.53 lakh that were put on hold after the crimes were reported through the helpline was recovered in January–March 2025, more complaints and prompt reporting are also leading to prompt action. Only ₹35,712 (0.31%) of the ₹1.12 crore that had been kept through the helpline during the same time in 2024 was returned. Arrests doubled from the first quarter of 2024 There are also more arrests as a result of the greater awareness. In 2024, nine cybercriminals were apprehended in the first quarter. That figure has increased to 17 this year. Inspector Munish Kumar, who is in charge of the Panchkula cybercrime police station, stressed how important it is to call the 1930 helpline as soon as possible to stop the transaction chain.  “Timely reporting is essential. It maximizes the likelihood of recovery before the money goes down the chain by quickly connecting victims with banks and law enforcement. “Campaigns targeting senior citizens, ex-servicemen, resident welfare associations, market welfare associations, schools, and colleges are being held regularly to raise public awareness about the helpline and to combat cybercrime,” he continued. Furthermore, according to a cyber police official, the 1930 helpline currently receives 90% of Panchkula’s cybercrime reports. In total, 3,615 cyber fraud complaints ttotalling₹11.90 crore were filed with the Panchkula police last year. In addition, 169 FIRs ttotalling₹42.21crorese were filed. After the 1930 helpline helped put ₹10.36 crore on hold, the victims received ₹6.06 crore.

India to host Global Technology Summit in Delhi from April 10-12: Key agendas, theme and other details

Global Technology Summit

India is hosting the 9th Global Technology Summit in New Delhi from April 10–12, focusing on the theme “Sambhavna” (possibilities) to explore innovation and global tech cooperation. Co-hosted by MEA and Carnegie India, the summit will feature over 150 speakers from 40+ countries discussing key issues like AI governance, cybersecurity, and digital infrastructure. The 9th edition of the Global Technology Summit (GTS), which will bring together some of the world’s most brilliant minds, will take place in the nation’s capital from April 10 to April 12. External Affairs Minister Dr S. Jaishankar will make the opening comments and formally introduce the summit during its first session. Co-hosted by Carnegie India and the Ministry of External Affairs (MEA), the GTS is India’s leading forum for high-level discussion on geo technology. Headquartered in New Delhi and Established in 2016, Carnegie India is a member of a strong worldwide network that includes more than 170 researchers. According to a news release from the MEA, the summit intends to bring together leaders from academia, industry, government, and civil society to have crucial discussions on innovation, resilience, and international cooperation in the digital sector. This year’s Global Technology Summit’s topic This year’s Summit has “Sambhavna” as its subject; the Hindi term means possibilities. It will concentrate on how new technologies can be used to strengthen digital governance, encourage cross-border collaboration, and support inclusive growth. The Summit’s Agenda The Global Technology Summit is anticipated to have a jam-packed schedule with over 40 public sessions spread across three days. According to the MEA announcement, attendees can anticipate a diverse range of keynote talks, ministerial-level discussions, expert panels, and strategic dialogues that will address the most important technology concerns facing the globe. More than 150 eminent speakers from over 40 countries, including the US, UK, Japan, Australia, France, Germany, Netherlands, Brazil, UAE, Nigeria, the Philippines, and the European Union, are anticipated to attend the event. The MEA added that by contributing a range of perspectives to the conversation, these global thought leaders will highlight the opportunities and difficulties confronting the digital sector today. Data protection, cybersecurity, space security, artificial intelligence governance, digital public infrastructure, and expanding technological cooperation, especially in the Global South, are just a few of the important topics that will be covered. With its comprehensive and forward-looking agenda, GTS 2025 hopes to be a historic occasion that shapes the direction of international tech innovation and policy. “This year, GTS 2025 will also elevate the voices of the next generation. Students and young professionals from all over India will directly contribute to policy discussions on responsible AI, digital futures, and international tech standards through the GTS Young Ambassadors program,” the MEA continued. About Global Technology Summit The Global Technology Summit (GTS), India’s premier international conference for technology discussion, brings together policymakers, business leaders, academics, and innovators to shape the global dialogue on emerging technologies. The Ministry of External Affairs (MEA) and Carnegie India are co-hosting the summit, which offers a crucial platform for analysing how technology affects development, governance, security, and geopolitics. Held annually in New Delhi, GTS places a strong focus on innovation, resilience, and equitable growth. It brings together speakers from around the globe to discuss pressing issues like cybersecurity, digital infrastructure, AI governance, and cross-border tech collaboration.

Police in Tamil Nadu issued a warning about the possible dangers of creating Ghibli art online

Tamil Nadu

The Tamil Nadu Police Cyber Crime Wing has warned against using Ghibli AI Art generators, citing risks of data theft, identity fraud, and malware. Users uploading selfies to unofficial sites may unknowingly expose personal information to scams and cybercrimes. People have been alerted by the Tamil Nadu police to the possible dangers of creating “Ghibli AI Art” by sharing pictures or selfies. According to a statement from the State Police’s Cyber Crime Wing, the public’s use of Ghibli AI Art has alarmingly increased in recent days. The Ghibli AI Art generators created anime-like representations from user-uploaded images or selfies based on the user’s facial features. Users frequently overlook or undervalue the risks associated with this, though. The AI system would examine and record the surroundings, faces, and facial expressions. Without the user’s express consent, these uploads are utilized to train the AI. As stated in the announcement, “continuous uploading [of photos or selfies] will increase the system’s knowledge base.” Concerns were raised about the users’ inability to quickly remove the data they had submitted. There was no sure-fire method to ask for deletion in the case of image uploads. According to the police, users who distribute and use Ghibli’s artwork on internet platforms without permission, especially if they get it through dubious or unofficial means, run the possibility of falling victim to cybercrimes. Photographs uploaded on any dubious link could result in issues like data leaks or data being sold to unidentified advertising companies. A lot of websites that provided Ghibli artworks for free downloads were fronts for scams. Data loss and identity theft may result from users downloading content from these sources and unintentionally infecting their devices with malware, viruses, or ransomware. Popular Ghibli characters and artwork can be used by scammers as bait in phishing con games. Fake giveaways, competitions, or links to free Ghibli art downloads are frequently a part of these fraudulent efforts. If you click on these links, you could lose money or have your bank information and personal information stolen, the police said.

Hackers Deploy Neptune RAT via YouTube, Telegram & GitHub in Global Cyberattack

Neptune RAT

Hackers are spreading a powerful new malware, Neptune RAT, via YouTube, Telegram, and GitHub to steal passwords, and cryptocurrencies, and control Windows PCs undetected. Experts warn of its ransomware, spying, and data-wiping features, urging users to avoid suspicious links and strengthen cyber protection. The Neptune RAT, frequently referred to as the “Most Advanced RAT” (or remote access Trojan) ever, is a new strain of malware that hackers are using to infect vulnerable Windows PCs in a recent onslaught. The goal of this cyberattack is to hold victims hostage while stealing cryptocurrency and passwords. The Neptune RAT is quite sophisticated, according to a Cyber News report, and it can spy on the owner of the device, take over Windows devices, and do a lot more without being discovered by even the most effective antivirus program. The aforementioned malware strain is presently making the rounds on YouTube, Telegram, and GitHub, according to cybersecurity firm CYFIRMA. Similar to other malware strains, Neptune RAT operates on a malware-as-a-service basis, allowing any hacker to utilize it in their assaults for a monthly subscription. Everything you need to know about this new malware that targets Windows computers is provided here, along with some advice on how to protect your computer and data from the Neptune RAT. What can the Neptune RAT do? The Neptune RAT is a very powerful remote access program with a wide range of malevolent capabilities, according to CYFIRMA. A crypto clipper that tracks cryptocurrency transactions and substitutes wallet addresses under the control of attackers, rerouting cash without the victim’s awareness, is one of its most alarming characteristics. Apart from focusing on digital assets, Neptune RAT also has a password-stealing module that can retrieve login information from more than 270 programs, including popular web browsers like Chrome. The stolen data can be used to gain access to financial platforms, compromise social media accounts, and enable more attacks. The powers of the software go beyond simple stealing. One of its components is ransomware, which encrypts files and requests payment to unlock them. The system’s capacity to identify or react to the infection may be diminished if Windows Protector and other antivirus software are disabled. Additionally, Neptune RAT has screen tracking capabilities that let attackers see user activity in real-time. Data exploitation, blackmail, and spying are made possible by this. Neptune RAT contains a data destruction function that enables the attackers to fully erase the compromised system and leave no trace behind if they determine the virus has fulfilled its objective. How can one be safe? Since GitHub, Telegram, and YouTube are now the sites where Neptune RAT is being spread, users may want to avoid these sites as much as possible or exercise extreme caution while downloading files from them or clicking on links. Additionally, buying the best identity theft protection is encouraged as it will assist consumers in recovering money that has been lost due to an assault. These protection plans frequently include insurance, which is advantageous if an impacted user decides to replace their PC entirely.

Aadhaar Seva Kendra staff with access to data of thousands of visitors on cybercrime net

Aadhaar Seva Kendra

Two men from Haryana, including a former Aadhaar Seva Kendra staffer, were arrested by CID for forging Aadhaar and PAN cards to create fake firms and commit a ₹43 lakh Bitcoin scam. The accused misused the Aadhaar data of thousands of visitors, prompting a cybersecurity alert. CID investigators revealed that one of the two individuals detained from Haryana about a cyber scam purportedly led by bank management had previously worked at an Aadhaar Seva Kendra. The database of thousands of visitors to the centre was available to him. Officers from the state CID’s cyber police investigated a complaint from a resident of Chandernagore and discovered that several fake Aadhaar cards were used to register shell firms and related bank accounts. Himanshu Solanki, 32, and Praveen Kumar, 29, of Faridabad, Haryana, were detained by the state CID on 06 April 2025 suspicion of fabricating Aadhaar Seva Kendra and PAN cards as well as fictitious businesses using forged documents. Praveen Kumar altered his name to create several Aadhaar cards. He is identified as Paresh Kumar in one, Praveen Kumar in another, and Pratap Kumar in the third. Despite having different identities, they all share the same Aadhaar number, an officer stated. CID detectives believe that the gang, which has been falsifying the information of visitors to Aadhaar Seva Kendra, has other members. “It is best to mask your Aadhaar card so that the number will not be visible to anyone else, even if you use a photocopy,” a CID officer advised. To send an alert to the holder’s cell phone if someone attempts to commit any fraudulent conduct with their Aadhaar number, the police also suggested tying the Aadhaar to that number. According to CID officers, the accused defrauded the complainant of ₹43 lakh by enticing him to make a Bitcoin investment. On social media, he had seen the investment scheme’s marketing. A branch manager of a nationalized bank and his wife, who was stationed in Murshidabad, received the proceeds of the crime, the police discovered later in the investigation. The manager of the branch has already been taken into custody. He is being held by the police.