nationalcybersecuritynews.today
Open in
urlscan Pro
82.165.207.139
Public Scan
URL:
https://nationalcybersecuritynews.today/indian-call-center-seized-over-amazon-hacking-scam-against-us-citizens-cybersecurity-cyberattack/
Submission: On September 01 via api from GB
Submission: On September 01 via api from GB
Form analysis
3 forms found in the DOMPOST
<form method="post" id="commentform" class="comment-form i-amphtml-form" novalidate="" action-xhr="https://nationalcybersecuritynews.today/wp-comments-post.php?_wp_amp_action_xhr_converted=1" target="_top"
on="submit:AMP.setState( { "commentform_post_77844": { submitting: true } } );submit-error:AMP.setState( { "commentform_post_77844": { submitting: false } } );submit-success:AMP.setState( { commentform_post_77844: {"values":{"mc-value":"","submit":"Post Comment","comment_post_ID":"77844","comment_parent":"0","comment":""},"submitting":false,"replyToName":""} } )"
amp-novalidate=""><amp-state id="commentform_post_77844" class="i-amphtml-layout-container i-amphtml-element i-amphtml-built" i-amphtml-layout="container" hidden="" aria-hidden="true">
<script type="application/json">
{
"values": {
"author": "",
"email": "",
"url": "",
"mc-value": "",
"submit": "Post Comment",
"comment_post_ID": "77844",
"comment_parent": "0",
"comment": ""
},
"submitting": false,
"replyToName": ""
}
</script>
</amp-state>
<p class="comment-notes"><span id="email-notes">Your email address will not be published.</span> Required fields are marked <span class="required">*</span></p>
<p class="comment-form-comment"><label for="comment">Comment</label> <textarea id="comment" name="comment" cols="45" rows="8" maxlength="65525" required="required" data-amp-bind-disabled="commentform_post_77844.submitting"
data-amp-bind-text="commentform_post_77844.values.comment" on="change:AMP.setState( { commentform_post_77844: { values: { "comment": event.value } } } )" i-amphtml-binding=""></textarea></p>
<p class="comment-form-author"><label for="author">Name <span class="required">*</span></label> <input id="author" name="author" type="text" value="" size="30" maxlength="245" required="required"
data-amp-bind-disabled="commentform_post_77844.submitting" data-amp-bind-value="commentform_post_77844.values.author" on="change:AMP.setState( { commentform_post_77844: { values: { "author": event.value } } } )" i-amphtml-binding="">
</p>
<p class="comment-form-email"><label for="email">Email <span class="required">*</span></label> <input id="email" name="email" type="email" value="" size="30" maxlength="100" aria-describedby="email-notes" required="required"
data-amp-bind-disabled="commentform_post_77844.submitting" data-amp-bind-value="commentform_post_77844.values.email" on="change:AMP.setState( { commentform_post_77844: { values: { "email": event.value } } } )" i-amphtml-binding="">
</p>
<p class="comment-form-url"><label for="url">Website</label> <input id="url" name="url" type="url" value="" size="30" maxlength="200" data-amp-bind-disabled="commentform_post_77844.submitting" data-amp-bind-value="commentform_post_77844.values.url"
on="change:AMP.setState( { commentform_post_77844: { values: { "url": event.value } } } )" i-amphtml-binding=""></p>
<p class="comment-form-cookies-consent"><input id="wp-comment-cookies-consent" name="wp-comment-cookies-consent" type="checkbox" value="yes"> <label for="wp-comment-cookies-consent">Save my name, email, and website in this browser for the next time
I comment.</label></p>
<p class="math-captcha-form">
<label>Math Captcha<br></label>
<span>12 − seven = <input type="text" size="2" id="mc-input" class="mc-input" name="mc-value" value="" aria-required="true" data-amp-bind-disabled="commentform_post_77844.submitting" data-amp-bind-value="commentform_post_77844.values.mc-value"
on="change:AMP.setState( { commentform_post_77844: { values: { "mc-value": event.value } } } )" i-amphtml-binding=""></span>
</p>
<p class="form-submit"><input name="submit" type="submit" id="submit" class="submit" value="Post Comment" data-amp-bind-disabled="commentform_post_77844.submitting" data-amp-bind-value="commentform_post_77844.values.submit"
on="change:AMP.setState( { commentform_post_77844: { values: { "submit": event.value } } } )" i-amphtml-binding=""> <input type="hidden" name="comment_post_ID" value="77844" id="comment_post_ID"
data-amp-bind-disabled="commentform_post_77844.submitting" data-amp-bind-value="commentform_post_77844.values.comment_post_ID" on="change:AMP.setState( { commentform_post_77844: { values: { "comment_post_ID": event.value } } } )"
i-amphtml-binding="">
<input type="hidden" name="comment_parent" id="comment_parent" value="0" data-amp-bind-disabled="commentform_post_77844.submitting" data-amp-bind-value="commentform_post_77844.values.comment_parent"
on="change:AMP.setState( { commentform_post_77844: { values: { "comment_parent": event.value } } } )" i-amphtml-binding="">
</p>
<div class="amp-wp-default-form-message" submit-error=""><template type="amp-mustache">
<p class="{{#redirecting}}amp-wp-form-redirecting{{/redirecting}}">{{#message}}{{{message}}}{{/message}}{{^message}}Your submission failed. <small>The server responded with {{status_text}} (code {{status_code}}). Please contact the developer of
this form processor to improve this message. <a href="https://amp-wp.org/?p=5463" target="_blank" rel="nofollow noreferrer noopener">Learn More</a></small>{{/message}}</p>
</template></div>
<div class="amp-wp-default-form-message" submit-success=""><template type="amp-mustache">
<p class="{{#redirecting}}amp-wp-form-redirecting{{/redirecting}}">{{#message}}{{{message}}}{{/message}}{{^message}}It appears your submission was successful. <small>Even though the server responded OK, it is possible the submission was not
processed. Please contact the developer of this form processor to improve this message. <a href="https://amp-wp.org/?p=5463" target="_blank" rel="nofollow noreferrer noopener">Learn More</a></small>{{/message}}</p>
</template></div>
<div class="amp-wp-default-form-message" submitting=""><template type="amp-mustache">
<p>Submitting…</p>
</template></div>
</form>
GET https://nationalcybersecuritynews.today/
<form role="search" method="get" class="search-form i-amphtml-form" action="https://nationalcybersecuritynews.today/" target="_top" novalidate="">
<label>
<span class="screen-reader-text">Search for:</span>
<input type="search" class="search-field" placeholder="Search …" value="" name="s">
</label>
<input type="submit" class="search-submit" value="Search">
</form>
GET https://nationalcybersecuritynews.today
<form action="https://nationalcybersecuritynews.today" method="get" id="amp-wp-widget-categories-1" target="_top" novalidate="" class="i-amphtml-form amp-form-dirty"><label class="screen-reader-text" for="cat">Select A Category</label><select
name="cat" id="cat" class="postform" on="change:amp-wp-widget-categories-1.submit">
<option value="-1">Select Category</option>
<option class="level-0" value="3">All News</option>
<option class="level-0" value="17">Android Security</option>
<option class="level-0" value="16">Browser Security</option>
<option class="level-0" value="4">Child Security</option>
<option class="level-0" value="24">Cloud Security</option>
<option class="level-0" value="22">Computer Hacking</option>
<option class="level-0" value="5">Computer Protection</option>
<option class="level-0" value="6">Conferences</option>
<option class="level-0" value="7">Education & Training</option>
<option class="level-0" value="19">Email Security</option>
<option class="level-0" value="8">Government Hacked</option>
<option class="level-0" value="23">Intl – Cyber News</option>
<option class="level-0" value="1">ios Security</option>
<option class="level-0" value="9">Linux Security</option>
<option class="level-0" value="10">Mac Security</option>
<option class="level-0" value="11">Malware/Ransomware</option>
<option class="level-0" value="12">Microsoft Security</option>
<option class="level-0" value="13">Phishing Scams</option>
<option class="level-0" value="14">Private Investigator</option>
<option class="level-0" value="21">Social Media</option>
</select>
</form>
Text Content
Skip to content National Cyber Security News Today Menu * Home * All News * Android Security * Browser Security * Child Security * Cloud Security * Computer Hacking * Computer Protection * Conferences * Education & Training * Email Security * Government Hacked * International Cyber News * ios Security * Linux Security * Mac Security * Malware/Ransomware * Microsoft Security * Phishing Scams * Private Investigator * Scams * Social Media * Post A Story INDIAN CALL CENTER SEIZED OVER AMAZON HACKING SCAM AGAINST US CITIZENS | #CYBERSECURITY | #CYBERATTACK September 1, 2021Category: All News THE CALL CENTER RAN A FAKE AMAZON TECHNICAL SUPPORT CALL CENTER IN SOUTH DELHI – NOW, 26 OF ITS “EMPLOYEES” HAVE BEEN ARRESTED. The Delhi Police have shut down a fake call center alleged to have been operational for the past seven months and scamming US citizens. Allegedly, the call center employees duped US citizens by posing themselves as Amazon’s technical support team. On average, they cheated 6 US citizens daily. The call center was operating from Sultanpur, located on the outskirts of South Delhi. ABOUT THE OPERATION Authorities were tipped off about this call center’s activities, after which they started monitoring its operations and mounted surveillance devices around the premises. When the police raided the call center, they discovered an office setup. And when asked, the employees couldn’t produce any documents or license to run a call center. APPROXIMATELY $5,25,000 EXTORTED It is claimed that the employees cheated US nationals and raked in at least INR 4 crore/USD 5,25,000 so far. Using illicit tactics such as VOIP calling, they deceived the legal international long-distance gateways. SEE: Man hacks Indian tech support scam call center; leaks CCTV footage The accused extorted Amazon users by claiming that their Amazon IDs were hacked. When the concerned customers called back to learn more about the hack, they showed them a fake repair of their Amazon customer ID via the AnyDesk app. The Amazon customer would pay up via Target gift cards to reclaim their account, which the employees redeemed later. ALL EMPLOYEES IN POLICE CUSTODY The call center was run by 26 employees, five of which were females. All of them have been arrested for cheating more than 1,250 US nationals. Image: Delhi Police Moreover, according to officials, they have seized 29 computers from the call center along with two internet switches, two modems, and several other accessories, revealed DCP South District Inspector Atul Tyagi, who was in charge of the operation. The mobile phones recovered from the accused contained numerous US-based mobile numbers in a WhatsApp group, authorities noted. > “Further investigation is being carried out to unearth the whole gang of > cheaters,” police officials stated. SECOND FAKE CALL CENTER BUSTED WITHIN A FORTNIGHT This isn’t the first-of-its-kind operation against a fake call center operating from India and duping US citizens. In fact, it is a widespread practice in the country, and within only two weeks span, several call centers have been seized for fraudulent activities. SEE: Indian police & Microsoft busts tech support scam centers Reportedly, Delhi Police arrested 95 individuals previously, including 19 females and two minor boys, for running two fake call centers in Delhi’s Kirti Nagar and Mangolpuri areas. Image: Hindustan Times via Delhi Police According to authorities, the accused contacted US nationals impersonating the country’s Social Security Administration officials and threatened to revoke their Social Security Number if they don’t pay them. In total, 82 computers, 5 laptops, 84 mobile phones, and 48 ID cards were recovered from these call centers by the Crime Branch officials. Did you enjoy reading this article? Like our page on Facebook and follow us on Twitter. Original Source link Previous Post Next Post SHARE THIS: RELATED * Ransomware attack targets City of Tulsa, causing technical difficulties – FOX23 News | #malware | #ransomware * May 28, 2021 * In "All News" * Indian Muslim minority targeted during Covid-19 pandemic | #socialmedia * June 7, 2021 * In "All News" * Saginaw County company working its way through what it calls a “cyber event” | #malware | #ransomware * August 5, 2021 * In "All News" Posted in All News, Intl - Cyber News LEAVE A REPLY CANCEL REPLY Your email address will not be published. Required fields are marked * Comment Name * Email * Website Save my name, email, and website in this browser for the next time I comment. Math Captcha 12 − seven = {{#message}}{{{message}}}{{/message}}{{^message}}Your submission failed. The server responded with {{status_text}} (code {{status_code}}). Please contact the developer of this form processor to improve this message. Learn More{{/message}} {{#message}}{{{message}}}{{/message}}{{^message}}It appears your submission was successful. Even though the server responded OK, it is possible the submission was not processed. Please contact the developer of this form processor to improve this message. Learn More{{/message}} Submitting… Search for: SELECT A CATEGORY Select A Category Select Category All News Android Security Browser Security Child Security Cloud Security Computer Hacking Computer Protection Conferences Education & Training Email Security Government Hacked Intl – Cyber News ios Security Linux Security Mac Security Malware/Ransomware Microsoft Security Phishing Scams Private Investigator Social Media Copyright © 2021 National Cyber Security News Today. All Rights Reserved. Screenr parallax theme by FameThemes ✕ nationalcybersecuritynews.toda FREE VIEW