Thursday, February 25, 2010

A HI-Tech Crime with Bank ATMs

My Dear Friends,
Now I am going to tell you another true story about a hi-tech crime by low profile criminals with bank ATMs. Perhaps you are thinking that I am going to tell you about ATM hacking by using spy cam of skimmer. No my friends I will not tell you that but I will tell you how the low profile criminals have discovered the vulnerability of bank ATMs, where you take out your ATM card after swiping it in the card reader. Now I will request you to take a careful look at the above picture and Now you will see three rounded unmarked keys and the criminals are using vulnerabilities of these three keys. Mainly they are using two keys by the both sides of 0 (zero) in the key board. Perhaps you are thinking what can they do with these two keys as they they are not usable. But my friends here is the vulnerability of the Bank ATMs. I don't want to discuss much more than this here as this may be misused by criminals.

Now I will tell how you are victimised in this ATM counter.

Step 1:- You have entered in the ATM room for withdrawing your money.
Step 2:- You have swiped your ATM card and taken it out from card reader.
step 3:- You have been asked to put your PIN number.
step 4:- You have given your PIN number but the monitor is not showing you the cross mark on the screen its invisible.
Step 5:- You will see your screen is dark and then you will be perplexed and think that the ATM machine is not functioning so you will come out and someone may request you to come out from there quickly as he is in hurry.
step 6:- That person will be able to withdraw money from there and in the mean time you have left the place already.
step 7:- you will find another ATM for your urgent withdrawal and there you will find that your balance has been deducted by rs. 10000 or 20000.

Now you will be surprised and contact with your bank and they will tell you yes you withdrew this amount as the system was showing the successful transaction and bank ATM authority has checked their physical balance, which also show the successful withdrawal.

Now what will you do?

You will go to police station and police will not believe it as I think most of the police personnel are not aware of this crime.

So you will have to remain cautious for this for saving your own hard earned money. So what will you do? If this situation (Step 4 and 5) comes to you in any ATM counter don't come out from that room (ATM Counter) stay there at least 10 minutes as your session is still pending there otherwise the miscreants will utilize your session and withdraw money from your account.

How they are I will not tell you this thing is happening and be cautious.

This is not cyber crime but this is a computer related crime and thats why I have told you. So my friends be cautious about these type of criminals and this is happening in the crowded places, where there is a huge ATM withdrawl everyday.

Disclaimer:- This is for awarness purpose if anyone misuses it he will be completely liable for this.

Thanking you,

Urproblemmysolution Team

Monday, February 15, 2010

What is New in Phishing

My Dear Friends,

I already brought before you different types of phishing earlier and all my writings were on the basis of originals facts, which happen in daily life, and these are not from any books or from any lectures or from those who don't do anything but shows that they do everything. So what I am going to bring before you a new type of phishing, which I detected after getting a information from someone.

This is actually Phishing in the form of Extortion. These type of mail goes to the renowned persons in the society. He may be a Doctor, businessman or any big corporate personality and in the place of sender's email id it will be a email id of an extremist group.

Now just have a look on the email id.,, and so on. Actually they are using the name of the extremist group of the target country for sending mail to their target persons and they are claiming money from them by telling that they had been appointed for killing him within a stipulated period and if he (the target) pays him a certain amount they will disclose him the name of that person and will not kill him but if the target does not pay they will kill him on that very day.

After getting the mail if the target person responses they will give him the account number and there after they will withdraw the money from their through ATM counter and the person in whose account the money will be deposited by the victim he is also a victim in this case as they are using his Bank Account like other phishing cases.

Now definitely you are thinking who is the culprit behind it. Yes my friend I think you are guessing about the right man. They are none other than the ...........
No no I don't want to tell the name of that Continent and that community people as they may say again we are. Really my cheat brothers I don't want to take your name here and thats why I am not telling. I hope one day you will come in the life of civilized society.

So my friends I will request you not to get affraid on these type of mails as these are phishing mails in the form of extortion and I will also request you to spread this news to all of your friends about this recent phishing mails.

Best of luck.

Thanking you,,

Urproblemmysolution team.

Saturday, February 13, 2010

How to Avoid Keylogger

My Dear Friends,
I think all off you have got a good lesson from my last case study and every one is anxious about their net banking and even using their mobile phone. I am telling you one thing that after detecting this case when my friends and others knew the mode of operation of hackers they got scared when their mobile phones were not responding even after seeing the full signal tower on their phone.
But now I will tell you how to bypass the keylogger, which steals all of your keystrokes and even screen shots, in your computer for doing any net transaction or opening your official and very personal email id. Keylogger can be installed by remotely also and thats why this is very very dangerous for all as sometimes you can't fell its presence in your computer. So you can only get relief from keylogger if you install KeyScrambler in your Mozilla Firefox browser and don't forget to use Mozilla as your browser in case of secured net banking or opening email id as mozilla has all the qualities to give you security. You should know that even Virtual keyboard is now a days not out of danger from Keylogger
Now I will tell you how to install this add on on your browser. Open Mozilla browser ->Tool->Add on->Get Add on->write KeyScrambler->Browse and now you follow the direction. And now your key board is secured from Keylogger.
Please do this and get the result. Don't forget to say thanks.

Thanking you

Urproblemmysolution Team

Saturday, February 6, 2010


My Dear Friends,
After long long interval I am going to tell you a true story about net banking fraud in a new style. This is in my career a totally new type of hi tech crime. I don't know whether this was detected earlier by any one or not? But I thought this should know everybody who use net banking system and use mobile phone. In this case the name the mobile service provider is not given but I think now after this if any of the mobile service provider read my blog they will definitely rethink their security system as here I don't find any security drawback of the bank.
So my friends let go to the case history:-
GIST: - One person’s **** bank account was hacked by hackers. The amount is RS. 3,00000/- plus . His mobile number was **********
Fact in Net Banking:- If someone wants to transfer some money from his account to other he will have to add him in his net banking profile as third party and during this period bank will send a URN number to his registered mobile number, which he registered with bank and a person can change this number only at the time of his personal presence with wriiten application in bank. So the bank thinks their net banking security is very strong as those can’t be hacked.
What complainant did for his net banking security: - Only he had access to his net banking even his wife did not know about this and for that reason when he was transferred to other state he did not change his mobile number with his bank by thinking that if someone hacks his bank account from his office or anywhere hacker can’t do that as he will not get the URN no. He thought so as now a day’s most of the company uses key logger for monitoring their employees activity.
Investigation revealed that the account was hacked from Nigeria in three different dates.
How Hackers Got Success:-
STEP 1:- The hackers collected the user name password of the complainant anyhow, may be by using phishing page or remote key logger. But the complainant did not confess about any phishing link update.
Step 2:- They learnt the details of profile of complainant where his mobile number were noted.
Step 3:- They learnt from their Indian agent the details of mobile subscriber and then they reported as a case of mobile lost in a Mobile Service Provider Store/Web World in Mumbai and deactivated the number (which was in Other State and used by the complainants daughter) there then the re-issued the same number from there with a different ESN number.
Step 4:- Then they added five accounts as third party (Beneficiary) by hacking his account and got the URN no in their mobile and transferred the amount to those five accounts, who withdrew the amount from ATM counter.

So my friends what are you thinking now? Are you secured or can u keep yourself safe from criminals for misusing your mobile phone and doing crime ? Now you think and I am promising I will again come back to you with another interesting hi-tech cyber crime for your knowledge.
Disclaimer:- Though the fact is true this is for the knowledge of netizens and if anyone misuses it he will be completely liable for this.

Thanking you