Bharatpur and Mathura take top spots in Indian cybercrime rate

October 4, 2023
Bharatpur Mathura India Cybercrime Indian Hackers Fraudsters Online Scam Scamming

Bharatpur and Mathura have risen to the forefront of Indian cybercrime, overshadowing the once-notorious names of Jamtara and Nuh.

Previously, Jamtara and Nuh have transitioned from a status of economic hardship to becoming the epicentres of cybercriminal activities, ranking first and second in cybercrime prevalence. These two underdeveloped regions coped with a lack of essential infrastructure in the past, including proper roads, housing, and access to technology.

Unemployment and underemployment had burdened these areas, and the COVID-19 pandemic only worsened the problem by causing job losses with limited alternative means of survival. Unfortunately, some locals resorted to cybercrime to make ends meet.

 

With economic challenges fueling the Indian cybercrime surge, cybersecurity experts deep-dived into the roots of emerging threats in Bharatpur and Mathura.

 

Around 2010, Jamtara and Nuh’s journey into cybercrime began with minor thefts of mobile phones, watches, and purses. As time passed, they evolved their techniques, shifting into unauthorised transactions from ATMs, cloning apps and devices, employing spoof applications, and eventually crafting malicious apps while experimenting with cryptocurrency payments.

 

Bharatpur Mathura India Cybercrime Indian Hackers Fraudsters Online Scam Scammer Hacker 4

 

Latest reports have also pointed to a most recent surge in cybercrime cases in Mathura, Uttar Pradesh, alongside the ongoing concerns in Bharatpur, Rajasthan. The cybercriminals in these two regions employ various advanced tactics to execute their schemes, preying on unsuspecting victims, thus surpassing Jamtara and Nuh at the top spot of the cybercrime surge in the country.

For awareness, our security researchers in iZOOlogic have listed ten different malicious campaigns propagating in these regions that contribute to the rise of the Indian cybercrime rate.

 

1. Deceptive Online Advertisements – These criminals create fake ads on platforms like Facebook and OLX, offering seemingly irresistible deals on pricey items. Victims, enticed by the bargains, call the provided phone number, falling prey to the scammers’ social engineering tactics.

2. Fake Packaging Startups – Cybercriminals entice victims through YouTube videos, inviting them to start home-based packaging businesses. Victims are required to provide personal information, like Aadhaar cards, PAN cards, banking details, and an initial investment. The fraudsters then misuse this information to cause financial losses.

3. Impersonation – Utilising UPI (Unified Payment Interface) apps, cybercriminals generate random numbers until they find a registered user. They impersonate a familiar figure and request financial assistance or provide fake transaction screenshots, manipulating victims into transferring money under false pretences.

4. Sextortion – Scammers create alluring fake profiles on social media platforms, targeting individuals with malicious intent. They engage in explicit video chats with their victims, obtaining compromising material and using it for extortion. Then, they resort to threats, demanding payment from the victims. Their method involves using screen-recording software during video chats to gain leverage. The extortion of money from victims is in exchange for the prevention of sharing explicit content on social media by deletion and to deter victims from reporting the incident to authorities. The deception begins with a simple greeting, gradually escalating to explicit content, with a recorded video strategically placed to deceive the victim into thinking it is a live interaction. Victims are blackmailed into paying, and funds often end up in the hands of a third party, all under the threat of social media exposure or if the victim reports to authorities.

 

Bharatpur Mathura India Cybercrime Indian Hackers Fraudsters Online Scam Scammer Hacker 3

 

5. Fake Job Offers – Job seekers in need of employment are lured into fraudulent job offers. Scammers entice applicants with fake job postings and then misuse their documents to establish fake bank accounts, redirecting stolen money into these accounts. These fraudsters capitalise on the desperation of job seekers, resulting in financial losses and the risk of identity theft.

6. Army Personnel Scam – Criminals pretend to be army personnel, offering discounted goods or property due to supposed emergencies. To build trust, they persuade victims to send a small initial payment, followed by a larger one for the promised items. However, the money ends up in the fraudster’s account, and victims are left empty-handed, falling prey to this deceitful ploy.

7. Fake Google Ads – Fraudsters create counterfeit Google advertisements, often featuring customer care numbers for banks and businesses. Unsuspecting users seeking legitimate assistance call these fake numbers, assuming they are connecting with authorised services. Little do they know that they are inadvertently sharing personal information with cybercriminals who use this tactic to exploit and deceive.

8. Electricity Bill Scam – Scammers send alarming SMS messages or make intimidating calls to unsuspecting victims, falsely claiming unpaid electricity bills and warning of pending power disconnection. Fearing inconvenience, frightened victims quickly transfer money to the scammers, falling prey to this deception.

9. Fake Customer Care Numbers on Google Maps – Cybercriminals manipulate Google Maps by inserting counterfeit contact numbers within the comments section for various locations, including banks and businesses. Unsuspecting users in need of contact information call these deceptive numbers, believing they are reaching legitimate services.

10. AnyDesk Scam – Fraudsters advertise their phone numbers on social media, posing as official customer care representatives for popular brands. When unsuspecting victims make contact, they are instructed to install the AnyDesk application and share the access code. The victims grant the actors remote access to their devices, leaving them vulnerable to the theft of sensitive information and potential financial losses.

 

Based on investigations, the money the threat actors acquire from cybercrimes is put towards constructing homes and splurging on luxuries like expensive cars, bikes, shoes, and mobile phones, leading to a significant transformation in their lifestyle.

The police have taken action against the cyber fraud activities by blocking thousands of SIM cards each year in India. Furthermore, it must be noted that on the demographic of these cybercriminals, 90% had not completed their 10th-grade education . They all hail from the same village, forming a close-knit network of cyber criminals. These Indian individuals lack formal training in cybercrime and instead rely on each other to share techniques and strategies for their illegal activities.

To safeguard against such cyberattacks, our iZOOlogic security experts advise individuals to take the following precautions, such as verifying the authenticity of online advertisements and job offers, especially if they seem too good to be true. It is also important to exercise caution when sharing personal information online or over the phone.

 

Bharatpur Mathura India Cybercrime Indian Hackers Fraudsters Online Scam Scammer Hacker 2

 

Always double-check the legitimacy of customer care numbers seen online, avoiding those found in suspicious sources. Be wary of unsolicited calls or messages demanding immediate payments. Our experts also emphasise avoiding installing remote access software unless it is from a reliable and official source.

Ultimately, as cybercriminals get more advanced, individuals must educate themselves and stay informed about common cyber threats and scams. Report any suspicious activity to the authorities to help fight cybercrime in your community.

By staying vigilant and informed, people can better protect themselves against the ever-evolving landscape of Indian cybercrime and all other countries.

About the author

Leave a Reply