Trending

#CallCenterScam

Latest posts tagged with #CallCenterScam on Bluesky

Latest Top
Trending

Posts tagged #CallCenterScam

Preview
Joint Op: India And FBI Takedown $48 Million Call Center Scam Network - IndiaWest News Joint Op: India And FBI Takedown $48 Million Call Center Scam Network.

Joint Op: India And FBI Takedown $48 Million Call Center Scam Network

Full Story: indiawest.com/joint-op-ind...

#FBI #CentralBureauOfInvestigation #CallCenterScam #InternationalFraudBust #BaltimoreNews #Crime #IndiaFBIJointOp #TechSupportFraud #ScamDismantled

0 0 0 0
Preview
Fake Microsoft Support Call Center Scam Targeting US Citizens Brought Down   An investigation by the Bengaluru police has revealed that a sophisticated cyber fraud operation was operating in the city masquerading as Microsoft Technical Support, targeting U.S. citizens in an attempt to defraud them, bringing an end to a transnational scam network that has been working from the city for some time.  On Saturday, the Special Cell of the Cyber Command, in coordination with the Cyber Crime Police of the Whitefield Division, conducted a raid at the premises of a firm known as Musk Communications in response to certain intelligence.  The raid was conducted based on specific intelligence. A number of investigations have revealed that the company, which began operations in August, has established a scam center that is fully functional and consists of approximately 4,500 square feet of space, where employees allegedly pose as Microsoft support technicians in order to deceive foreign nationals and defraud them.  Several individuals have been arrested from the facility for being directly involved in the fraudulent activities, according to police. This operation was designed with the intent of systematically exploiting overseas victims through carefully orchestrated technical support scams, and according to police, 21 individuals have been arrested. Several rented office spaces were used by the racket, where callers dressed up as Microsoft representatives and targeted residents throughout the country as a whole.  A number of victims have been targeted either directly or through deceptive pop-up messages that falsely stated that their computer was infected with malware or had been compromised, leading them to be lured in. Once the callers had established a connection with the target, they convinced them to install remote access applications like AnyDesk or TeamViewer, which allowed the fraudsters to take control of the target computer system.  During these scams, police allege that the accused intentionally generated false technical glitches, frozen computer screens, or generated fake virus alerts to increase anxiety in victims and coerce them into paying for services that were unnecessary, nonexistent, or unreliable.  According to investigators, the group has been charging amounts ranging from several hundred dollars up to several thousand dollars for sham repairs, extended warranties, and counterfeit security subscriptions. According to investigators, the organization may have facilitated the funneling of crores of rupees through international payment gateways designed to obscure financial records for over a year.  The raid resulted in the discovery of 35 computers, 45 mobile phones, Voice over IP-based communication systems, scripted call templates, and extensive customer data logs which contained the details of hundreds of prospective targets and a variety of other items. It has been reported that the arrestees were trained to adopt an American accent so as not to raise suspicion, underscoring the systematic and calculated nature of the fraud. As a result of this case, the police said that cross-border technology support scams are becoming increasingly prevalent, preying on seniors and digitally vulnerable individuals overseas, and that further investigations are currently underway to find out who was behind the fraud, who provided the money, and who was involved in it overseas. According to Bengaluru Police Cyber Crime Division officials, the syndicate targeted victims both in the United States and in the United Kingdom. It falsely appeared to represent itself as Microsoft's technical support department.  During the course of the investigation, it was learned that callers escalated the deception by citing fabricated Federal Trade Commission violations, informing victims that their systems were being compromised or that they were being involved in unlawful online activity. This fraudster has allegedly demanded substantial payments in Bitcoin as a means of resolving these purported threats, and instructed victims to deposit money at cryptocurrency ATMs.  According to police estimates, the individual losses are estimated to have averaged around $10,000. A number of intimidation tactics were employed to pressure compliance by the operation, including false legal penalties and urgent cyber alerts. Senior IPS officers confirmed that the majority of those targeted were elderly individuals who are not familiar with digital security practices.  Further inquiries revealed that there were nearly 85 people employed in Bengaluru to manage the company's data, handle calls, and simulate foreign technology executives, in a professionally layered setup. There were a number of elements involved in the operation, including American accents, detailed scripts, and email addresses that were designed to mimic official Microsoft and U.S. regulatory addresses.  It was the task of those arrested to extract personal and financial information during staged troubleshooting sessions, which then allowed payments to be converted to cryptocurrency, which disguised the financial trail in the process. It has been reported that backend systems linked the operation to foreign digital wallets and crypto exchanges that are already under scrutiny by US authorities.  As a result of this investigation, the investigators are now looking at tracking Bitcoin transactions and identifying international collaborators involved in routing the proceeds. The government is collaborating with Interpol and the federal government to map digital wallet movements and preliminary findings indicate that between August and November 2025, at least $13.5 crore was transferred in multiple tranches through Bitcoin ATMs in multiple batches.  Additionally, analysts are analyzing the seized servers to find out how the syndicate sourced contact information of overseas victims. As officials pointed out, Bengaluru is becoming increasingly vulnerable to cybercrime networks worldwide.  It is due to this that skilled manpower and readily available digital infrastructure are being exploited by fraud rings operating under the cover of technology support firms in Bengaluru, prompting tighter monitoring of the registration of startups, co-working spaces, and tech parks around the city.  Since August, investigators have discovered that the network has contacted 150 victims across the United States and the United Kingdom, coercing them into depositing large sums of money-often close to $10,000-through Bitcoin ATMs, causing them to withdraw substantial sums. In a statement to the IPS, a senior officer stated that authorities are currently extracting and verifying financial information about victims.  The officer also stated that preliminary findings indicate cryptocurrency kiosks are the primary means by which illicit payments are collected. A police report states that the accused posed as a technical support representative for Microsoft around the world and invoked fabricated Federal Trade Commission violations as a way of instilling fear in the public. Under the guise of mandatory security fixes and regulatory compliance procedures, the accused demanded money.  According to the reports, the operation's three key masterminds remain absconding and are believed to have orchestrated similar scams targeting victims across the U.S. and the U.K. since 2022. In a scheme of this magnitude, Musk Communications rented a 4,500-square-foot office space in August at a monthly charge of Rs. 5 lakh, where the gang planned to deploy malicious Facebook ads that were targeted at American users as part of its campaign against the US government.  In the ads, investigators found embedded code that mimicked legitimate security alerts; when clicked on, it would freeze the user's system and trigger a fake pop-up message that appeared to be from Microsoft's global support center with a counterfeit helpline number, which claimed to originate from that support center.  According to the alleged victim, who contacted the number was told that their computer systems had been hacked, IP addresses had been compromised, and their banking information had been compromised, and they were subsequently pressured into making high-value payments using Bitcoin ATMs, which subsequently triggered the scam. According to the Police, the company employed 83 employees, including 21 technical operators who were directly involved in the fraud. The salaries for these employees ranged from $15k to $25k per month. Among the other arrests confirmed by investigators in this case was Ravi Chauhan, an Ahmedabad resident, alleged to have been a major part of recruiting nearly 85 staff members for this operation. This brings the total number of arrests in this case to 22 as the investigation continues to pursue remaining suspects and the financial flows that are tied to this scheme.  There has been a surge in organized cybercrime syndicates operating across borders in recent years, and authorities have issued warnings about the evolving tactics and techniques they are using, particularly those that exploit the trust people have in recognized technology brands internationally.  Moreover, the police emphasized that legitimate companies such as Microsoft should not initiate unsolicited technical support calls, issue pop-up warnings butting into the system immediately, or seek payments through cryptocurrency channels in order to receive support.  It was urged by officials that users, particularly those who were unfamiliar with digital platforms and elderly, should exercise caution when faced with alarming online messages or calls claiming legal or security violations, and that they should verify the claims by going to official websites or using authorised service channels. It has also been emphasized by cybercrime investigators that the need for stronger awareness campaigns needs to be strengthened, short-term commercial rentals need to be closely scrutinized, and online advertising platforms need to be more tightly regulated so they can deliver malicious content on a more regular basis. This investigation is continuing to trace financial flows and international connections, and authorities are stating that the case serves as a reminder of how sophisticated and large-scale modern tech-support fraud really is, underscoring the need for digital literacy, cross-border cooperation, and timely reporting as a way of counteracting scams that take advantage of fear, urgency, and misinformation.

Fake Microsoft Support Call Center Scam Targeting US Citizens Brought Down #BitcoinATMScam #CallCenterScam #CrossBorderCybercrime

0 0 0 0
Preview
1,000+ Flee Myanmar's 'KK Park' Scam Hub to Thailand After Raid The influx, primarily of Chinese nationals but also including individuals from over a dozen other countries, followed a raid by Myanmar's military on "KK

1,000+ Flee Myanmar's 'KK Park' Scam Hub to Thailand After Raid

#callcenterscam #humantrafficking #KKPark #myanmar #Thailand

0 0 0 0
Preview
South Korea Issues Warrants for 59 Alleged Scammers, Including 'Pig Butchering' Ring, from Cambodia South Korean authorities have launched a significant legal offensive against a vast international cybercrime network, seeking arrest warrants for 59

South Korea Issues Warrants for 59 Alleged Scammers, Including 'Pig Butchering' Ring, from Cambodia

#callcenterscam #Cambodia #Cybercrime #pigbutcheringscam #SouthKorea

1 0 0 0
Preview
South Korea Denies PM Linked 7 Thai Politicians to Scam Ring The South Korean Embassy in Thailand has publicly denied claims that Seoul's prime minister linked seven Thai politicians to Cambodian-based call center scam

South Korea Denies PM Linked 7 Thai Politicians to Scam Ring

#callcenterscam #Cambodia #SouthKoreanEmbassy #Thaipoliticians #Thailand

0 0 0 0
Preview
China Busts Kokang Scam Boss Xu Faqi for $150M Fraud, Torture The Ministry of Public Security announced the operation, targeting Xu Faqi, also known as Xu Laofa, a prominent leader of the Kokang gang in northern Myanmar.

China Busts Kokang Scam Boss Xu Faqi for $150M Fraud, Torture

#callcenterscam #china #Kokang #myanmar #XuFaqi

0 0 0 0
Preview
NJ’s Pranav Patel Jailed For $2M Elder Fraud Scheme - IndiaWest Journal News NJ’s Pranav Patel Jailed For $2M Elder Fraud Scheme.

NJ’s Pranav Patel Jailed For $2M Elder Fraud Scheme

Full Story: indiawest.com/njs-pranav-p...

#PranavPatel #ElderFraud #MoneyMule #CallCenterScam #SeniorScam #FinancialExploitation #NewJerseyCrime #FloridaVictims #MoneyLaundering #JusticeServed

0 0 0 0
Preview
CBI Uncovers Tech Support Scam Targeting Japanese Nationals in Multi-State Operation  The Central Bureau of Investigation (CBI) has uncovered a major international scam targeting Japanese citizens through fake tech support schemes. As part of its nationwide anti-cybercrime initiative, Operation Chakra V, the CBI arrested six individuals and shut down two fraudulent call centres operating across Delhi, Haryana, and Uttar Pradesh.  According to officials, the suspects posed as representatives from Microsoft and Apple to deceive victims into believing their electronic devices were compromised. These cybercriminals manipulated their targets—mainly Japanese nationals—into transferring over ₹1.2 crore (approximately 20.3 million Japanese Yen) under the pretense of resolving non-existent technical issues.  The investigation, carried out in collaboration with Japan’s National Police Agency and Microsoft, played a key role in tracing the culprits and dismantling their infrastructure. The CBI emphasized that international cooperation was vital in identifying the criminal network and its operations.  Among those arrested were Ashu Singh from Delhi, Kapil Ghakhar from Panipat, Rohit Maurya from Ayodhya, and three Varanasi residents—Shubham Jaiswal, Vivek Raj, and Adarsh Kumar. These individuals operated two fake customer support centres that mirrored legitimate ones in appearance but were in fact used to run scams.  The fraud typically began when victims received pop-up messages on their computers claiming a security threat. They were prompted to call a number, which connected them to scammers based in India pretending to be technical support staff. Once in contact, the scammers gained remote access to the victims’ systems, stole sensitive information, and urged them to make payments through bank transfers or by purchasing gift cards. In one severe case, a resident of Hyogo Prefecture lost over JPY 20 million after the attackers converted stolen funds into cryptocurrency.  Language discrepancies during calls, such as awkward Japanese and audible Hindi in the background, helped authorities trace the origin of the calls. Investigators identified Manmeet Singh Basra of RK Puram and Jiten Harchand of Chhatarpur Enclave as key figures responsible for managing lead generation, financial transfers, and the technical setup behind the fraud. Harchand has reportedly operated numerous Skype accounts used in the scam.  Between July and December 2024, the operation used 94 malicious Japanese-language URLs, traced to Indian IP addresses, to lure victims with fake alerts. The scheme relied heavily on social engineering tactics and tech deception, making it a highly sophisticated cyber fraud campaign with international implications.

CBI Uncovers Tech Support Scam Targeting Japanese Nationals in Multi-State Operation #CallCenter #CallCenterScam #CBI

0 0 0 0
Preview
ఆంధ్రప్రదేశ్‌లో కాల్ సెంటర్ ముసుగులో అశ్లీల వీడియోల ముఠా అరెస్ట్ | Andhra Pradesh Porn Video Racket Busted Under Call Center Disguise ఆంధ్రప్రదేశ్‌లో కాల్ సెంటర్ ముసుగులో నడుస్తున్న అశ్లీల వీడియోల ముఠాను పోలీసులు అరెస్ట్ చేశారు. సైబర్ క్రైమ్ విభాగం సూటిగా స్పందించింది.

ఏపీలో అశ్లీల వీడియోలను వెబ్ సైట్లకు అమ్ముతున్న ముఠా అరెస్ట్

www.buzztoday.in/breaking-new...

#AndhraPradeshPornVideoRacket #APCrimeNews
#BreakingNews #buzztoday #CallCenterScam
#CyberCrimeAP #DailyUpdates #DigitalSafety
#Latestnews #MustRead #NewsAlert #StayUpdated
#TeluguNews

0 0 0 0