Showing posts with label Case studies on cyber crime. Show all posts
Showing posts with label Case studies on cyber crime. Show all posts

Thursday, September 1, 2011

How To Identify 419 Scammers Phone

Hi Friends,
After long long and long interval I am again infront of you with a valuable information, which I have got from my friend of cyber crime investigation field, who gave me the link of "joewein.de", and I am bringing this in front of you as this will help you a lot for identifying the 419 spammers. So here is the details of that information as published by that website.

Scam phone numbers in the United Kingdom (+44):

If an email mentions a UK phone number starting with +4470, it usually means that the sender of that mail is not in the UK at all and it is almost guaranteed to be a scam.

Usually the presence of a +44 70 number in a 419 scam email means you're dealing with criminals based in Nigeria who are using these numbers to make people believe they're dealing with someone legitimate who is in the UK instead of a criminal in an Internet cafe on a different continent.

Do not reply to any emails that mention +4470 phone numbers!
Never call such numbers!
Break off all contact with these people!

The scammer most likely is NOT based in the UK. +44 70 numbers belong to international call forwarding services. Their whole point is that people can reach the user of the number when he's not in the UK. These services make it possible for scammers to hide the fact that they are based in Nigeria or other countries in Africa, while the scam victim will believe they're dealing with someone in the UK. Very few (if any) legitimate individuals use these numbers. Banks, law offices, UK immigration officials, etc. never use +44 70 numbers because, since their offices are based in the UK, they have no need to redirect calls to their offices to sohttp://www.blogger.com/img/blank.gifme mobile phone outside the UK. We have not come across any legitimate UK businesses yet that use +44 70 numbers. Their only visible user base are scammers in Nigeria, South Africa and elsewhere. It is a perfect mystery to us why the UK authorities allow these services to continue operating despite them being used almost exclusively by criminals.

UK phone numbers starting with '70' are "Personal numbering" in the "Find me anywhere" range. Charges for calls to these numbers are not distance-dependent. They can cost as much as UKL 0.50 (USD 0.90) per minute to call and can forward the call to virtually any phone number in the world. Forwarding numbers can be set up for free and completely anonymously via websites such as uknumbers.com.

So my friends be cautious about them and for more information in details about the spammers please visit here

With lots of love

Sujit

Saturday, December 11, 2010

Case Study on Cyber Stalking

Dear Friends,

Just few days ago one of my valuable reader from USA mailed me and asked me whether I had an experience on real life critical cyber-stalking case investigation or not and I mailed him some of my real life investigation experiences but I did not published those in my blog, so I want to share one of my critical case investigation on very recent complaint about cyber-stalking, which made the life of a gentle lady hell.

Before reading this case study I would request you to visit here for knowing details about cyber stalking.

This is a case where, a multinational renowned corporate house A complained that someone had been continuously sending offensive and abusive email to their customer care mail id with some obscene pictures as attachment in the name of a lady of another company B. All the mail was clearly disclosing the name of that lady and the content was written in such a manner that it seemed to company A that the mail was sent by the lady herself due poor package to her. Here company A outsourced his customer care work from company B.

During enquiry it came into light that the mail id in the name of lady of company B was created by a guy as his love offer was not accepted by that lady. The guy became so violent that one day he assaulted the husband of the lady badly and searching the address of the lady from Telephone Directory he dialed her neighbors in different names from different booths and tried to prove her prostitute in her locality. Investigating agency during investigation further revealed that the said guy also did same kind of work one year ago and at that time he sent mail to Police authority by sending a challenge to explode bomb in a renowned temple on the night of a Puja celebration. At that time also she used another girls email id as she also turned him down. His intention in both the cases was to make hell the life of the lady of his target. He thought Police would arrest those ladies as their names came openly in the email.
Finally he was arrested and all the evidences were collected against him by the investigating agencies in both the cases.

Someone may call this guy Erotomanic or love obsessional cyber stalker. Whatever it may be but they are really dangerous to the society as a large. If these kind of guys are refused by his desired one they can do anything.

So my friends beware from them. Best of luck.

Thanking you,

Urproblemmysolution Team

Wednesday, November 24, 2010

Link of Identity Theft, Phishing and Cheating

My Dear Friends,

Now I am going to share you few live case studies,which I got for the last 6 months in the field of my daily work in investigating cyber crime related cases. I am sharing this real life stories with you as my moto of writing this blog is to make you aware about the cyber crime and keep you away from cyber criminals.

This is the crime of phishers in disguise of HR of a renowned company. Now read step by step what they are doing for cheating a person, who is in search of a job.

Step 1:- They are sending mails by offering a lucrative job to different persons, who had enlisted their names on online job searching portals, as an HR of a renowned company such as IBM, Videocon, Sony by creating false email id in the name of that company. Like:- hr_sony@gmail.com, hr.videoconindia@hotmail.com and so on.

Step 2:- Then the mail receiver is receiving the offer and communicating with them over a telephone number as provided by them.

Step 3:- They are claiming security deposit for that good job and asking them to deposit that money in the bank accounts as supplied by them. Thereafter they are telling them to send the scan copy to them to their email id.

Step 4:- They are stopping to communicate with the victim.

Now you will be perplexed to know that the victims are educated guys even the the experienced guys of IT sector. I am telling you about a girl from Cog....... company became a victim and came to me for lodging a complaint. I asked her about her qualification and what he told that seemed to me that she is educated with specialization in IT sector.

You will definitely call me so what this thing may happen to anyone but my friends you should keep in mind that an HR of a company like Sony will not have an email id of other domain i.e gmail or yahoo or rediff or others their email id must end with @sony.com or some domain name which belongs to Sony. Its an example. So my dear friends before depositing any amount in any one's bank account pl verify the person who has sent you the mail as in most of the cases the address of phone numbers and bank account numbers are fake and they can't be traced.

So I would suggest you not to accept this kind of online offers until you are confirmed about the caller or sender and please find the original website of the employer company and make a communication with them to know the genuinity of your offer letter. I think now you will remain alert from this scoundrels and if you can't understand me pl mail me I will respond or comment here and I will respond.
Best of luck and be ahead and beware of phishers, who are stealing identity of another and cheating the educated job aspirants.

Thanking you

Love your Country.

Tuesday, November 16, 2010

Case Studies on Net Banking Hacking

Hi Friends,

I think all of you are well and you have enjoyed a lot in your life in the festive season of India and also in other countries. Today I am going to tell you another style of phishers for your net banking hacking for making you aware from the hackers or cyber criminals. But before learing this you will have to read my earlier posting here. Here you found how they got your URN no. for activating third party in your bank account. But what they are doing that is as follows:- After step 2 of that article ;-

Step 3:- They take attempt to add the bank account of their agents with the hacked bank account. And then as per the banking security system the URN no goes to the mobile no of the person, who actually owns the bank account.

Step 4:- They call the person by claiming that they are from the ...... bank in which the bank of the customer exists and then they ask him/her to give the said number which reached in his/her mobile through sms as they were testing the genuinity of the mobile number of the customer.

Step 5:- The account holder gives the said URN no as he does not know anything about it. Now they get success to transfer the amount to their agent's account.
Thats all.

So my friends be cautious and don't do the mistake in future. I am really very very sorry and beg a pardon from you as I ought to tell you earlier but what to do I was very much busy with my official work so I was absent from my blog so many days.

Wish all of best of luck and thanking you,

Urproblemmysolution Team

Sunday, June 13, 2010

What is latest cyber attack

What is the Latest cyber attack?

Dear Friends,

In this world both good and bad mentality persons exist. Someone wants to safe his country and someone pays money to criminals for committing crime and they get the benefit and steal all the requirements. This thing is happenning in the world and now in the cyber world. The countries with evil power are attacking the network system of their neighbour. So here is an example for you which has been published very recently. So pl read it and raise hatred to them.:

South Korea – Two South Korean government websites were struck by the second cyberattack in a week, but suffered no major damage, the government said Saturday.

Most of the computers trying to access the websites were traced to China, the Ministry of Public Administration and Security said in a statement.

The Korean Culture and Information Service and the Justice Ministry were the targets of the so-called denial of service attacks on Friday, in which large numbers of computers try to connect to a site at the same time to overwhelm the server, the statement said.

The security ministry said it quickly blocked access by 274 computers with Internet Protocol addresses — the Web equivalent of a street address or phone number — mostly in China.

On Wednesday, similar attacks originating from China occurred on a site run by the security ministry.

The statement said it was investigating who was behind the attacks.

Last year, government websites in South Korea and the U.S. were paralyzed by similar cyberattacks that South Korean officials believed were conducted by North Korea.

South Korean media have reported that North Korea runs an Internet warfare unit aimed at hacking into U.S. and South Korean military networks to gather information and disrupt service. Source (news.yahoo.com)

So after few years all of we will see that a country has taken responsibility to make cyber terrorists.

With Thanks

urproblemmysolution Team

Wednesday, June 9, 2010

Cybercriminals and Phishers are in the FIFA 2010 World Cup





My Dear Friends,

I have already discussed about details of wifi except one part and I think now you are thinking that what is that part. I will tell you that later. But now I am going to tell you what is the latest threat to the netizens related to the forthcoming world cup i.e: FIFA WOrld Cup 2010.

Not only me most of the invabitants of the earth are mad about FIFA WORLD CUP as Maradona, Messi, Kaka, Drogba, Roonie, Robinho many many players will show their skill in this world football championship and most of us will try to enjoy this game through television direct telecast or reach to South Africa to see the games directly by sitting in the gallery and their are 6 official partners and Visa is one of them.

Cybercriminals and phishers are using this sentiments of football lovers. Now definitely a question has come in your mind that what are they doing with these? So I will tell you now what are they doing with these. The cyber criminals and phishers are using malwares with the attachments in the form of tickets and lottery winning mails in the name of Visa and so on. They are also sending you the world cup playing charts of different teams with an attachment and when you open it a malware will be installed in your computer and your computer will be used as zombie by the cyber criminals. For knowing about zombie you are requested to read my previous postings. Not only that the phishers will take your money in their previous style.

Here are two pictures for you, enlarge it. So be cautious. Don't open any unknown mail about FIFA world Cup 2010 and don't download any attachment from this mail as this includes zero day vulnarability, which will not be traced by any antivirus.

Thanking You

Urproblemmysolution Team

Wednesday, May 19, 2010

Case Studies on Unsecured Wifi and Law of the Countries

Dear Friends,

I think now definitely a question may arise in you mind that what will happen with unsecured wifi and what are the lime lighted case studies on unsecured wifi. Now I will discuss you all these things.

Here are few case studies in a nutshell:-

1) In UK a copy righted film was downloaded by hacking an unsecured wifi connection of a hotel/restaurant and then the film distributor company filed a suit on the basis of IP address and UK Police traced that hotel and the hotel/restaurant owner was imposed a huge amount of fine by the honourable UK Court.

2) In USA a person was found outside of a building for unsecured wifi connection and he was arrested by USA Police.

3) In India in Ahmadabad blast case the miscreants used unsecured wifi connections of different institutes and hospitals four times for sending mail. The institutes had to face the consequences.

There are so many cases to discuss but I will not discuss all those cases here as those cases here but now I think at the same time you should know what Govt. of different countries are thinking about this. So lets start with India.

In India if anyone's unsecured wifi is used to commit crime initially burden of proof will lie on him and he will be legally liable for commiting crime or a criminal conspiracy of that crime.
TRAI had asked the government to direct all Internet Service Providers (ISPs) to instruct their customers to have ‘proper authentication measures’ so that this facility is not misused. “All ISPs may be instructed to ensure that their subscribers using wireless devices must use effective authentication mechanisms and permit access to internet to only authorised persons using wireless devices,” the regulator said in its earlier communication to the DoT. (Source:- The Economic Times)
Additional Commissioner of Mumbai Police K Venktesan told Business Standard: “If the Wi-Fi connection in a particular place is not password protected or secured then the policemen accompanying the squad will have the authority to issue a notice to the owner of the connection directing him to secure it.”The police could issue a notice under section 149 of the Criminal Procedure Code (CrPC) to anyone found not securing their Wi-Fi connection and user may face criminal investigations. (Source:- www.zdnet.com)

In UK I think you have understood from the case studies.

In German Internet users in Germany, whose wireless networks are left password unprotected, can be fined up to 100 euros, according to a recent ruling by Germany’s top criminal court. (zdnet.com)

In Australia The Queensland Police plans to conduct a ‘wardriving’ mission around select Queensland towns in an effort to educate its citizens to secure their wireless networks. When unsecured networks are found, the Queensland Police will pay a friendly visit to the household or small business, informing them of the risks they are exposing themselves to. (zdnet.com)

Now I think some of you thinking to cause casualty to others unsecured wifi but my friends don't think for that as the hackers are keeping the wifi connection unsecured for trapping the persons who uses unsecured wifi.

Now its upto you what you will do.

Thanking you

Urproblemmysolution team

Thursday, February 25, 2010

A HI-Tech Crime with Bank ATMs



My Dear Friends,
Now I am going to tell you another true story about a hi-tech crime by low profile criminals with bank ATMs. Perhaps you are thinking that I am going to tell you about ATM hacking by using spy cam of skimmer. No my friends I will not tell you that but I will tell you how the low profile criminals have discovered the vulnerability of bank ATMs, where you take out your ATM card after swiping it in the card reader. Now I will request you to take a careful look at the above picture and Now you will see three rounded unmarked keys and the criminals are using vulnerabilities of these three keys. Mainly they are using two keys by the both sides of 0 (zero) in the key board. Perhaps you are thinking what can they do with these two keys as they they are not usable. But my friends here is the vulnerability of the Bank ATMs. I don't want to discuss much more than this here as this may be misused by criminals.

Now I will tell how you are victimised in this ATM counter.

Step 1:- You have entered in the ATM room for withdrawing your money.
Step 2:- You have swiped your ATM card and taken it out from card reader.
step 3:- You have been asked to put your PIN number.
step 4:- You have given your PIN number but the monitor is not showing you the cross mark on the screen its invisible.
Step 5:- You will see your screen is dark and then you will be perplexed and think that the ATM machine is not functioning so you will come out and someone may request you to come out from there quickly as he is in hurry.
step 6:- That person will be able to withdraw money from there and in the mean time you have left the place already.
step 7:- you will find another ATM for your urgent withdrawal and there you will find that your balance has been deducted by rs. 10000 or 20000.

Now you will be surprised and contact with your bank and they will tell you yes you withdrew this amount as the system was showing the successful transaction and bank ATM authority has checked their physical balance, which also show the successful withdrawal.

Now what will you do?

You will go to police station and police will not believe it as I think most of the police personnel are not aware of this crime.

So you will have to remain cautious for this for saving your own hard earned money. So what will you do? If this situation (Step 4 and 5) comes to you in any ATM counter don't come out from that room (ATM Counter) stay there at least 10 minutes as your session is still pending there otherwise the miscreants will utilize your session and withdraw money from your account.

How they are I will not tell you this thing is happening and be cautious.

This is not cyber crime but this is a computer related crime and thats why I have told you. So my friends be cautious about these type of criminals and this is happening in the crowded places, where there is a huge ATM withdrawl everyday.

Disclaimer:- This is for awarness purpose if anyone misuses it he will be completely liable for this.

Thanking you,

Urproblemmysolution Team

Monday, February 15, 2010

What is New in Phishing

My Dear Friends,

I already brought before you different types of phishing earlier and all my writings were on the basis of originals facts, which happen in daily life, and these are not from any books or from any lectures or from those who don't do anything but shows that they do everything. So what I am going to bring before you a new type of phishing, which I detected after getting a information from someone.

This is actually Phishing in the form of Extortion. These type of mail goes to the renowned persons in the society. He may be a Doctor, businessman or any big corporate personality and in the place of sender's email id it will be a email id of an extremist group.

Now just have a look on the email id. maoist.in@yahoo.com, maoist.in@gmail.com, alkaidaagent@yahoo.com and so on. Actually they are using the name of the extremist group of the target country for sending mail to their target persons and they are claiming money from them by telling that they had been appointed for killing him within a stipulated period and if he (the target) pays him a certain amount they will disclose him the name of that person and will not kill him but if the target does not pay they will kill him on that very day.

After getting the mail if the target person responses they will give him the account number and there after they will withdraw the money from their through ATM counter and the person in whose account the money will be deposited by the victim he is also a victim in this case as they are using his Bank Account like other phishing cases.

Now definitely you are thinking who is the culprit behind it. Yes my friend I think you are guessing about the right man. They are none other than the ...........
No no I don't want to tell the name of that Continent and that community people as they may say again we are. Really my cheat brothers I don't want to take your name here and thats why I am not telling. I hope one day you will come in the life of civilized society.

So my friends I will request you not to get affraid on these type of mails as these are phishing mails in the form of extortion and I will also request you to spread this news to all of your friends about this recent phishing mails.

Best of luck.

Thanking you,,

Urproblemmysolution team.

Saturday, February 6, 2010

A CASE STUDY ON NEW HI-TECH CYBER CRIME

My Dear Friends,
After long long interval I am going to tell you a true story about net banking fraud in a new style. This is in my career a totally new type of hi tech crime. I don't know whether this was detected earlier by any one or not? But I thought this should know everybody who use net banking system and use mobile phone. In this case the name the mobile service provider is not given but I think now after this if any of the mobile service provider read my blog they will definitely rethink their security system as here I don't find any security drawback of the bank.
So my friends let go to the case history:-
GIST: - One person’s **** bank account was hacked by hackers. The amount is RS. 3,00000/- plus . His mobile number was **********
Fact in Net Banking:- If someone wants to transfer some money from his account to other he will have to add him in his net banking profile as third party and during this period bank will send a URN number to his registered mobile number, which he registered with bank and a person can change this number only at the time of his personal presence with wriiten application in bank. So the bank thinks their net banking security is very strong as those can’t be hacked.
What complainant did for his net banking security: - Only he had access to his net banking even his wife did not know about this and for that reason when he was transferred to other state he did not change his mobile number with his bank by thinking that if someone hacks his bank account from his office or anywhere hacker can’t do that as he will not get the URN no. He thought so as now a day’s most of the company uses key logger for monitoring their employees activity.
Investigation revealed that the account was hacked from Nigeria in three different dates.
How Hackers Got Success:-
STEP 1:- The hackers collected the user name password of the complainant anyhow, may be by using phishing page or remote key logger. But the complainant did not confess about any phishing link update.
Step 2:- They learnt the details of profile of complainant where his mobile number were noted.
Step 3:- They learnt from their Indian agent the details of mobile subscriber and then they reported as a case of mobile lost in a Mobile Service Provider Store/Web World in Mumbai and deactivated the number (which was in Other State and used by the complainants daughter) there then the re-issued the same number from there with a different ESN number.
Step 4:- Then they added five accounts as third party (Beneficiary) by hacking his account and got the URN no in their mobile and transferred the amount to those five accounts, who withdrew the amount from ATM counter.

So my friends what are you thinking now? Are you secured or can u keep yourself safe from criminals for misusing your mobile phone and doing crime ? Now you think and I am promising I will again come back to you with another interesting hi-tech cyber crime for your knowledge.
Disclaimer:- Though the fact is true this is for the knowledge of netizens and if anyone misuses it he will be completely liable for this.

Thanking you
Urproblemmysolution

Thursday, October 15, 2009

Latest Case in Phishing





What is Latest in Phishing

Dear Readers,

After long interval I am again going to tell you a new threat of phishing. Earlier I already discussed you about different phishing attacks in the phishing topic and there you learnt that they send you mail for updating your bank account, they send you offer for being their bank employee for collecting their money, they send you offer letter by claiming your details including your family members name, they tell you about your email id has got lottery of huge amount but later on you have to get your custom clearance by paying a certain amount and finally you get nothing and you lose your money, they tell you that a trust has nominated you for paying a certain amount and finally you get the same result like the last example and all these are phishing mails, which causes you a huge monetary loss.

Now I will tell you what the latest threat is. You have got an email from your bank security mail id that someone may have compromised your bank account and we found a suspicious net transaction of RS. 10000 from your bank and we stopped the transaction for suspicion but if you think that it is a right transaction then allow it or stop it by accessing your account on the following link. And if you click on it you will find a cloned webpage of your bank and then you will access it by putting your user id or password and first time they may tell you that your user id or password may not be correct and that’s why they are not opening but put the same user id and password second time that will open and ask you for allow or stop and then they will tell you thanks your suspicious transaction has been stopped as you desired. Now you think that you have got the relief.

But what already happened here, they got your user name & password and they asked you for logging in 2nd time for confirming your user name and password and have already started to operate your account and finally after 24 hours they have transferred your bank amount to their person and if you don’t realize it within 24 hours your amount will be withdrawn by fictitious bank account holders, who opened the accounts by providing fake names and addresses, from ATM counters. This is the actual fact in reality.

Thanking You

Urproblemmysolution Adminstrator

Tuesday, June 23, 2009

True Story on Phishing

Case History of Phishing with True Story

Dear Friends,

We promised you that we will produce an article before you about a true story of Phishing and how victim was tapped by the Phishers and how much amount he lost and what was the family status of the victim. In this case the names and original addresses of victims are kept in secret but their family status is very high profile. It is a joint bank account of a well known Private Bank of mother and son. Mother is a retired System Administrator of a bank and son is a young highly qualified educated person from a world famous Management Institution. They used the net banking system both by using separate user name and password for the same account.

How were they tapped by the phisher? The phisher/hacker/cybercriminal sent a phishing mail to the son’s e-mail id for updating his net banking data by saying that if he does not update the same his net banking system will be disabled and the that very well educated son updated it which resulted a loss of Rs. 175,000/- to them and they learned it after three days about the loss.

What the Phishers did? They transferred the above amount to another person’s savings account with a branch of that bank in a separate state and he was then asked by SMS through internet to withdraw that amount through ATM and there after deposit to another separate bank account of different branch and those persons in whose account the amount were deposited they were also asked to do the same after deducting their commission and finally the amount was withdrawn by an unknown person and transferred to Nigeria.

I think now you are thinking the persons in whose account amount was transferred and deposited are the racket members or gang members of these cybercriminals. Yes we also thought so but during the course of investigation it has come into light that those persons got appointment through internet from outside of India as a collection agent of a foreign bank, in exchange of fat salary and commission as per deposit to their accounts.

In this case we will now tell you step by step how the Hackers/Phishers got success:-

Step 1- The criminals sent spam mails to a bulk of netizens by offering false appointment as a collection agent of a bank. This mail was carrying a hidden program with auto run system and the activity of that program (spyware: - Pl. read the article about Weapons of cybercriminal) was to read the mail box of recipients and send those addresses to the hacker/phisher.

This mail was sent from America by using satellite phone

Step 2- Now they asked the willing persons who wants to be an employee to open a savings bank account with specific private foreign bank having ATM facilities as they target renowned foreign bank account holders. The agreed persons did those according to the Phishers.

This mail was sent from America

Step 3- When they found any mail address about a bank of the recipient in their address book then they used the software of email spoofing (Pl. read the article about Weapons of cybercriminal) for sending mail to them as if it has come from his bank for updating the net banking system by using Pharming (Pl. read the article about Weapons of cybercriminal) tool.

This mail was sent from America by using satellite phone

Step 4- Now they assured themselves about access to that account from the username and password, which they got through phishing mail, and got success.

This attempt was made from Philippines

Step 5- Now they added the savings account of their false employee to the victims account as third party approval and it takes minimum 9 to 24 hours to activate.

This attempt was made from Philippines

Step 6- Once it is activated they transfer the entire amount except minimum balance part by part to their false employee’s savings bank account during day time for completing the other transactions. They transfer that much amount, which a person can withdraw maximum from ATM.

This attempt was originated from Nigeria

Step 7- Now as per appointment terms and condition they sent SMS through internet by SMS spoofing to the said employee for withdrawing that amount from ATM and deposit it to another account and send the scan copy of deposit slip to their mail id as confirmation. This process continued to other false employees also. In the chain wise the amount finally deposited to a foreigners bank account, with fake names and address, and finally transferred to the hackers in Nigeria through money transfer agencies.

All the addresses we got from tracking the IP address of mails and net banking. In our next posting we will share with you how to get rid of from phishing mails.

Thanks

Urproblemmysolution team

Disclaimer:-

This is true story only for the educations of netizens so it’s a request don’t follow this way. This is a completely criminal offence if anyone does so he will be liable for that.