Cybercrime Gang Busted By Anakapalli Police: Around 33 Individuals Arrested
Cybercrime Gang Busted By Anakapalli Police: Around 33 Individuals Arrested
Around ₹20 crore was cheated out of U.S. cybercrime gang members while pretending to be the Amazon Customer Support, said SP Tuhin Sinha
On Thursday, the Anakapalli police detained 33 people for allegedly participating in a phony contact center fraud and dismantled a cybercrime ring in the Atchutapuram mandal.
The defendants were reportedly targeting Americans by posing as Amazon customer service representatives. It has been calculated that the fraud is worth approximately ₹20 crore.
Following a tip, police carried out simultaneous searches at three locations in Atchutapuram and dismantled the cybercrime ring, which had allegedly been active for the previous two years, Anakapalli Superintendent of Police Tuhin Sinha informed the media.
During the raids, computers, networking equipment, and digital infrastructure were taken.
Because they used to pose as supervisors of Amazon customer service teams, Punit Goswami from Maharashtra and Avihant Daga from Rajasthan are thought to be the primary suspects.
SP
| The SP described the fraudsters’ method of operation and claimed that the group operating the phony call center had a structured and methodical hierarchical structure.
“Dialers hired from the Northeastern States make up the team’s first level. They would call Americans and identify themselves as Amazon customer service representatives. The targeted clients would be informed that their Amazon account had been used for an unlawful transaction.
Consumers who comply with their inquiries will be asked to divulge private information. The calls would then be forwarded to anchors, the second level, by the dialers.”
The presenters would identify themselves as Federal Trade Commission (FTC) members and bank representatives. They would attempt to obtain social security numbers and bank account information while persuading clients that some fraudulent activity was occurring.
“The third level would then introduce them as the closing team after the anchors forwarded the cases to them. They would distribute redemption codes and persuade the unsuspecting consumers to purchase gift cards.”
The authorities discovered that the phony call center gang had a legitimate HR and administrative arm that hired individuals from Gujarat, Meghalaya, Assam, and Nagaland. They teach them how to impersonate people, handle clients using in-call scripts, and speak with a U.S. English accent.
The group was discovered to have used international money laundering networks, spoof communications, identity theft, and VoIP masking.
According to Mr. Sinha, the salaries of these gang members range between ₹25,000 and ₹75,000 each year. The police confiscated ₹3 lakh in cash that was going to be distributed as bonuses to the staff during the operation.
“The group would defraud the clients out of thousands of dollars each, resulting in enormous losses over time.”
The SP added that law enforcement organizations and cyber forensic specialists are assisting the district police in their thorough probe. cybercrime gang The entire syndicate hierarchy is being tracked, the digital and financial trail is being uncovered, and the masterminds at the top—possibly with connections abroad—are being identified. |
The managers would then interact with the clients and attempt to use dark web exchanges, cryptocurrency platforms, and online tools to redeem gift cards. The managers then escalate these instances to the next level, which has not yet been resolved throughout the investigation, according to the SP.
About The Author
Suraj Koli is a content specialist in technical writing about cybersecurity & information security cybercrime gang . He has written many amazing articles related to cybersecurity concepts, with the latest trends in cyber awareness and ethical hacking. Find out more about “Him.”
Read More :
Telegram App Vulnerability Abused to Spread Malware Encrypted in Videos
China-Based Hackers Linked to the Discovery of a New Cyber Weapon in Saudi Arabia: “MarsSnake”