Workflow
Cybercrime
icon
Search documents
MahaCrimeOS AI: accelerating cybercrime investigations with AI
Microsoft· 2025-12-13 04:54
AI in Law Enforcement - MahaCrimeOS AI is designed to detect patterns and provide direction in cybercrime reporting [1] - MahaCrimeOS AI is built using multiple technologies to create a safe and advanced platform [2] - MahaCrimeOS AI collaborates with Microsoft and CyberEye to meet the needs of Maharashtra [1] Digital Transformation in Policing - Almost 100% of investigations are getting digitally registered [2] - AI is being properly used in governance to help police do their job and recover funds [2] - The use of AI fulfills the needs of several million people and makes government function more efficiently [2]
X @Bloomberg
Bloomberg· 2025-12-05 05:05
We interviewed victims and scammers to unravel the digital arrest fraud that capitalized on India’s online revolution https://t.co/HCOk3Omt15 ...
X @BBC News (World)
BBC News (World)· 2025-11-24 08:32
South Korea's biggest online sex criminal sentenced to life in prison https://t.co/sqqPu4HBPa ...
X @The Economist
The Economist· 2025-11-23 17:40
Across South-East Asia tens of thousands of people toil to defraud Americans, Europeans and others in an industry that is estimated to steal over $500bn a year from victims worldwide https://t.co/mFRObdMDe0 ...
X @BSCN
BSCN· 2025-11-20 04:14
Threat Landscape - Brazil's cybersecurity teams are warning about a fast-moving malware campaign spreading through WhatsApp, marking a sharp rise in cybercrime activity this year [1] - The threat stems from a new banking Trojan called Eternidade Stealer, utilizing a WhatsApp-propagating worm as its entry point [1] - The Trojan activates only on systems set to Brazilian Portuguese, targeting banking, fintech, and crypto applications [2] - Criminal groups are abusing WhatsApp's screen-sharing feature to steal verification codes, hijack accounts, and drain funds, with victims reporting losses reaching six-figure territory [4] Malware Tactics & Techniques - The malware uses Python automation to hijack active WhatsApp sessions and send personalized messages [2] - The worm clones messages, steals contacts, and sends the same infected ZIP file across a victim's network with no human action required [4] - The stealer gathers system information, checks for antivirus tools, and grabs browser details, monitoring apps tied to major Brazilian banks and crypto services [3] - Attackers use an IMAP mailbox to pull command-and-control details, providing extra resilience when domains get shut down [3] Mitigation & Prevention - Authorities recommend logging out of all sessions, resetting your WhatsApp account, alerting contacts, and scanning devices if compromise is suspected [5] - Users should avoid installing remote-access tools sent through messages and ignore ZIP files and "urgent" fixes forwarded on WhatsApp [7] - Enabling two-step verification is recommended for extra account protection [7]
The $6 Toll Fee Text Behind a Billion-Dollar Chinese Crime Ring | WSJ
Scam Overview - Toll road text scams are a major annoyance and a significant revenue source for Chinese organized crime [3] - These scams have reportedly generated over $1 billion for crime groups in China over the past 3 years [2] - In September, Americans received a record high of over 330,000 toll scam messages in a single day [2] Scam Tactics - Scammers use phishing pages to steal credit card details, including name, address, and credit card information [4] - They require an authorization code to add the stolen credit card to their smartphone wallet [5][7] - Scammers have developed software to remotely use authenticated credit card information from China, enabling recruited shoppers in the victim's area to make purchases [8] Countermeasures and Impact - Google sued one of the makers of the phishing kits used in these scams, alleging that over 1 million people in at least 121 countries were deceived [9] - The best way to avoid being scammed is to stay alert and think through suspicious messages [10]
X @Decrypt
Decrypt· 2025-11-18 22:55
U.S. prosecutors notched their latest victory against members of an alleged cybercrime ring on Tuesday, highlighting a guilty plea from an individual operating under the guise of Shrek. https://t.co/Vwo7xpUamw ...
X @BBC News (World)
BBC News (World)· 2025-11-17 00:01
Hackers steal maternity ward CCTV videos in India cybercrime racket https://t.co/t2R8sa95bF ...
Google says group behind E-ZPass, USPS text scam has been 'shut down' after suit
CNBC· 2025-11-13 21:31
Core Points - Google successfully disrupted a foreign cybercriminal group responsible for a large SMS phishing operation within 24 hours of filing a lawsuit against them [1] - The operation, referred to as the "Smishing Triad," utilized a phishing kit named "Lighthouse" to conduct its attacks [1] - Google aims to hold malicious scammers accountable and protect consumers from such threats [1] Group 1 - Google filed a lawsuit early Wednesday to dismantle the organization behind the phishing operation [1] - The general counsel of Google, Halimah DeLaine Prado, stated that the shutdown of Lighthouse's operations is a victory for everyone [1] - The company provided translated Telegram messages from the group's ringleader indicating issues with their cloud server due to complaints [2] Group 2 - One of the messages from the ringleader mentioned that the reopening date for their operations would be announced separately [2] - Google did not disclose specific details on the methods used to shut down the operation [2]
X @TechCrunch
TechCrunch· 2025-11-13 17:28
Police take down three cybercrime operations in latest round of ‘whack-a-mole’ https://t.co/CnqnJuKy2O ...