₹ 50 lakh extorted with missed call.. ‘Jamtara’ cybercriminals

₹ 50 lakh extorted with missed call.. 'Jamtara' cybercriminals

Delhi: The pattern of cyber crime is changing day by day. Banks, government agencies and police warn people about cyber scams, but some are missing out due to lack of awareness. That is why it is advised not to click on web links and not to share OTP with others through SMS/mail. The pattern of recent scams is different from this. A few days ago, cybercriminals who had hacked the phone and emptied the businessman’s account had recently withdrawn lakhs of rupees from the bank account of a person through a missed call without OTP.

A man from South Delhi runs a security service company. A few days ago, the person’s phone received several missed calls between 7 and 8:45 p.m. As a result, some calls were picked up and no one spoke from the other end so they didn’t care about what came next. After some time, he approached the police after receiving a message on the victim’s phone that the money had been transferred through RTGS. A total of Rs 50 lakh was found to have been transferred from the victim’s account.

Suspecting that the scam was carried out by cybercriminals from Jamtara region of Jharkhand, the police registered a case on the victim’s complaint and started an investigation. He said the money was withdrawn from the victim’s bank account through a swim swap. Through blank or missed calls, cybercriminals activate RTGS’s OTP and obtain them through IVR calls. Police said cybercriminals from Jharkhand’s Jantara region are mostly involved in these scams. How does the ‘Jamtara’ group cheat? How to hack innocent phone? The web series ‘Jamtara’ is streaming on Netflix along with other topics.

See also  Few people know the trick to changing the information and location of photos on the iPhone!

Written By
More from Josh Atkinson
Tips To Choose A Buy To Let in Dublin
When you want to choose a Buy-To-Let property, it is important to...
Read More
Leave a comment

Your email address will not be published. Required fields are marked *