Investigation of Vishing Fraud Voice phishing is typically used to steal Credit Card /ATM Card numbers, PIN Numbers, CVV Number or other Banking credential.

Slides:



Advertisements
Similar presentations
Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
Advertisements

JPMorgan Chase Purchasing Card Training
ELECTRONIC BANKING.
EAuthentication Before accessing the Delphi eInvoicing System, you must be an authenticated user. This authentication process is called eAuthentication.
Chapter 6 E-commerce Payment Systems. Traditional Payment Systems Cash Checking Transfers Credit Card Accounts Stored Value Accounts Accumulating Balance.
By Derek Hahn Washington State Director of Finance and Ian Newby Lake Stevens Member In 3-D.
OVER VIEW OF BANKING FRAUDS
What is identity theft? How does identity theft occur? How do you protect yourself? What do you do if you are a victim? Jane Doe Certified Consumer Credit.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Identity Theft “When Bad Things Happen To Your Good Name” El Camino Community College Police Department Sgt. Kirk Johnston Josh Armstrong.
1 Identity Theft and Phishing: What You Need to Know.
1. 2 Someone steals your personal information to commit fraud. A “buy now, pay never” shopping experience. What is Identity Theft?
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft consumer.gov. What is identity theft? When someone uses information about you without your permission. The information can be your: – Name.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Prepare a deposit slip Record entries in a check register
Chapter 4 Billing Schemes.
“Electronic Payment System”
E-Banking is the use of electronic means to conduct banking business, such as telephone, Internet, cell phone, or other device by way of secure internet.
Banking: Checking Account What is a Checking Account? An account where money is deposited and kept for day-to-day expenses Also called demand deposit.
Banking:
Cyber Crimes.
Unit 5 Protecting Your Money Starting on p. 59. What Do You Think? Complete the “What Do You Think?” activity on p. 60.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Protecting Your Information Assets
Online Goods and Services. Topics Online Shops and Physical Goods Online Shops and Physical Goods Booking Systems Banking Education and Training Gaming.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
ND e-commerce Carl Arrowsmith Session 14 Consumer Protection & Trust.
Chapter 4 Billing Schemes.
Cuallet step by step guide. Step 1 From the Cuallet home page, click the “Sign Up Now” button. New user / Register.
Internet Safety Internet Safety LPM
Mobile Wallets. Introduction  Online shopping is the latest trend in India  India is becoming a country of mobiles & internet with around 200 million.
Si Online technomart private limited
Bidder Registration Process
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Lottery Fraud / Nigerian Fraud / 419 Fraud. Different types of Advance Fee Fraud  Inheritance Fraud  Dating or romancing fraud  Online gulf job fraud.
INVESTIGATION INTO FACEBOOK RELATED CRIME
Welcome to Money-on-Mobile Rail Ticket Booking Service momrail.com.
Protecting Your Assets By Preventing Identity Theft 1.
TPDDL has started accepting bill payments through Paytm. Various modes available to consumers through Paytm App / website are, Debit / Credit Card, net.
PAYMENT OF ONLINE SHOPPING DONE THRU INTERNET USING STATE BANK FREEDOM.
Investigation of Vishing Fraud. Voice phishing is typically used to steal Credit Card /ATM Card numbers, PIN Numbers, CVV Number or other Banking credential.
Step 2 – Register a Card To register a UR Card, you can send an to or fill out the registration form at one of our awesome
4. Select Student Services & Financial Aid Menu and Click on Online Registration menu How to Use Online Registration – Student Quick Reference Guide This.
Identity Theft. What Is Identity Theft? – Acquiring someone’s identifying information and impersonating them for gain.
Presentation on Online Shopping
Digital Gujarat Portal – Citizen User Manual. How Do I Open A Portal? Go to the URL :- Screen 1.1:-
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
April 20023CSG11 Electronic Commerce Payment systems John Wordsworth Department of Computer Science The University of Reading
Digital Payments STEP BY STEP INSTRUCTIONS FOR VARIOUS MODES OF PAYMENT: Cards, USSD, AEPS, UPI, Wallets.
Digital Payments STEP BY STEP INSTRUCTIONS FOR VARIOUS MODES OF PAYMENT: Cards, USSD, AEPS, UPI, Wallets.
Protecting Your Assets By Preventing Identity Theft
CASHLESS PAYMENT.
Identity Theft It’s a crime!
Protecting Your Credit Identity
Paytm App is your one-stop destination for all your needs
Freecharge.
What is the procedure to Invest in Mutual Funds?
USE OF PAYTM FOR CASHLESS TRANSACTIONS
Paytm Partners Training Program
TMW Prepaid Card Easy life ki shuruaat! SECURED BY POWERED BY
UCO BANK HONOURS YOUR TRUST
Protecting Your Identity
Protecting Your Credit Identity
Protecting Your Identity
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Investigation of Vishing Fraud

Voice phishing is typically used to steal Credit Card /ATM Card numbers, PIN Numbers, CVV Number or other Banking credential / information used in identity theft schemes from individuals

Sri Janardana Padhy received an unknown telephonic call from the fraudster and the fraudster posing himself as the ATM Relations Manager calling from Head Office, Mumbai informed the victim that “your ATM Card is at risk, it will be blocked soon”. The fraudster assured the victim to activate the ATM Card and asked for the ATM –cum-Debit card details i.e., ATM-cum-Debit card Number & PIN Number. The fraudster also instructed the victim to switch off his Mobile Phone Number for technical reasons & for smooth updating process. The fraudster advised the victim not to inform anyone as the process is very confidential in nature. After receiving the ATM Card details, the fraudster made a number of online transactions (purchase of goods, electronic equipment's, online payments, mobile /DTH recharge, etc.) in various websites / online payment gateways and defrauded an amount of Rs.2,50,000/-.

Applicable Sections of Law:-  IPC:- 419/420  Information Technology Act-2000:- 66C/66D

Steps:-  Victim received an unknown call from the fraudster  Accused fraudster posing himself/herself as the ATM Relations Manager calling from Head Office to the victim  Informing the victim over Mobile Phone that “your ATM Card is at risk, it will be blocked soon”  Assuring the victim to activate the ATM Card, if the victim will furnish the ATM –cum-Debit card details

Modus Operandi  Asked for the ATM –cum-Debit card details i.e.,  ATM-cum-Debit card Number  PIN Number  Accused instructing the victim to switch off his/her Mobile Phone Number for technical reason & for smooth updating process  Fraudster instructing the victim not to inform anyone as the process is very confidential in nature

Modus Operandi  After receiving the ATM Card details, the fraudster made a number of online transactions (purchase of goods, electronic equipment's, online payments, mobile /DTH recharge, etc.) in various websites / online payment gateways

Pre-Requisite for Investigation  Victim received a telephonic call from the fraudster  Victim has given his ATM Card details to the fraudster  Accused had made a number of online transactions in various websites / online payment gateways by using the ATM Card details of the victim

From the Complainant  Mobile Phone Number of the fraudster to be ascertained from the victim Seizure of the following documents on production by the victim complainant:- ATM-cum-Debit card in original Updated Savings Passbook SMS details received from the Bank about the online transactions made by the accused with date & time written in a paper by the complainant Mobile Phone Handset along with SIM Card (in which the SMSs were received) be seized and after seizure be kept in zima

Different Online Payment Gateways

In respect of Complainant Correspondence to be made with the Mobile Service Provider to furnish the report in respect of the mobile phone number of the complainant as well as of the fraudster :- Subscriber Details Date of Activation Customer Acquisition Form {in original} CDR for the alleged period IMEI Number of the handset Certificate u/s 65-B of the Indian Evidence Act

IMPORTANT NOTE IN CD Co-relation to be made and reflected the same in the case diary as found in the CDR

Correspondence to be made……  To the concerned Bank:- Name and address of the account holder Account Statement for the alleged period of unauthorized online fraudulent transaction The details of each transaction in brief Account Opening Form of the Victim Whether the victim was issued with any ATM-cum- Debit Card:- ATM Card Number Date of issuing of ATM Card Details of the ATM Card

Correspondence to be made with online Payment Gateways / Shopping websites  Account Registration Details in respect of the Merchant ID through which the online transaction was made  IP details  type of operating system of the computer system of the fraudster  type of browser software  Physical address of the computer system  IP Address, Time stamp and other server log details for each fraudulent transaction  Payment gateway details along with used credentials for authentication and transaction

Correspondence to be made with online Payment Gateways / Shopping websites  All other traceable details like  mobile numbers used for OTP or any authentication or used to call your customer service number  addresses for transactions  mailing address of the merchant and any other details  Beneficiary details [ Mobile Phone Number recharged / DTH reference] available at your side or provided by merchant to bank against these transactions  Cookies

Correspondence to be made with online Payment Gateways / Shopping websites  Credit history information  Purchase history in respect of the Merchant ID  products the fraudster viewed or searched for  Counterfoil receipt in respect of delivery of goods by the online shopping website to the fraudster  The details of the company personnel along with his contact number who delivered the goods to the fraudster  Date & time of delivery of goods  Address of delivery of goods

Wallet:- Recharges, Bill payments, Bus tickets, Shopping from hundreds of categories Send & receive money to & from friends Avail of services at partner destinations Cash back to the accounts Bill payment or recharge through toll free number or SMS

SAMPLE REPORTS

Report of EBS:-

Report of Bill Desk:-

Report of Freecharge:-

Report of Mobikwik:-

Report of PayU:-

Report of PayTM:-

Report of Pay4India:-

From reports of Online Payment Gateways we found:-  Registered Mobile Phone Number  IP Address of the computer system used for registration of the account in the online payment gateway along with date & time  Beneficiary Mobile Phone Number/ Recharge ID  ID furnished by the fraudster in the payment gateway  Details of shipping items  Shipping Address along with name & particulars of the beneficiary

Correspondence to be made……  Service Provider:- Notice u/s 91 of Cr.P.C. submitted to the Nodal Officer of Service Provider to furnish the account registration details along with log details in respect of account

Information in respect of ID:- Account Registration Details Date & time of creation of the account IP log at the time of creation of the account Physical address if any of the computer system used by the fraudster Browser information Mobile Phone Number used at the time of registration and updation of the account {registered mobile phone number} Secondary account Log details of the account

Google report

From the Service Provider Name:- - Status:- Services:- Secondary - Created on (with date & time):- IP Address:- SMS:- Log details:-

Sample Reports from Service Provider

Yahoo report

Rediffmail report

Correspondence to be made…… Internet Service Provider:- User Subscriber Details of the IP address Telephone number in case of DSL/CDMA/3G, and Dial up other relevant information in respect of the User Subscriber address of correspondence contact number IDs billing details MAC ID of the alleged computer system or IMEI Address of the computer resources with respect of the relevant IP address CAF / NTC in respect of the User Subscriber in respect of the alleged IP address.

Request Letter to ISP

Report from ISP {Aircel}

Sample report from ISP {BSNL}

Sample report from ISP {ORTEL}

Sample report from ISP {TATA}

Correspondence to be made…… Mobile Service Provider:- Subscriber Details Date of Activation (DOA) Customer Acquisition /Application Form (CAF) {in original} CDR for the alleged period Certificate u/s 65-B of the Indian Evidence Act

Investigating Officer will seize From the possession of accused:-  Laptop with charging adapter  Computer system, its other components (Monitor, CPU, UPS, Keyboard, Mouse)  Hard Disk from the seized CPU  Modem  Pen Drive /USB Drives /CDs/ DVDs  Mobile Handsets  SIM Cards  Memory SD Card  Dongles  Cables  Telephone Bills  Different fake ID Proof documents

Modus Operandi:-  The accused person is using different mobile phone numbers for communication with courier agency and delivery of shipping items  The accused person is using different identity particular documents created in different names (Voter ID Card, PAN Card, Aadhar Card, College ID Cards)  The accused person sent different persons to receive the shipping items  Mainly operated in the area of Jharkhand Jamtara, Mohanpur village areas

Seized Exhibits be sent to CFSL for examination Seized exhibits be sent to Director, Central Forensic Science Laboratory, Directorate of Forensic Science Services, Govt. of India, Ministry of Home Affairs, 30, Gorachand Road, Kolkata , (T) S.D.J.M., for examination and opinion