Tuesday, November 12, 2024
HomeAmazon AWSIndian Authorities Crackdown Microsoft and Amazon tech support scammers

Indian Authorities Crackdown Microsoft and Amazon tech support scammers

Published on

Malware protection

Technical support fraud, also called tech and customer support fraud, is when someone pretends to be technical or customer support to trick people into giving them money.

Criminals may offer help to fix problems like updating the computer Antivirus or the need to update a software license.

Microsoft and Amazon supported CBI (Central Bureau of Investigation) and Federal enforcement agencies to raid multiple sectors in India on 19th  October.

- Advertisement - SIEM as a Service
Document
FREE Webinar

CISO Panel Discussion on Application Security

Join us for a live webinar where we will discuss the major challenges that CISOs commonly face while setting up alerts, and ways to minimize them. In addition, the webinar will cover the most common threat vectors as well as the importance of API security.

Tech support fraud is a costly and significant issue. Every year, criminals operating illegal call centers prey on the vulnerable and scam thousands of victims. 

Tech Support Fraud resulted in more than 30 raids on call centers and more than 100 charges so far. By the Investigation, there are more than $1 billion in losses to victims.

The scammers targeted over 2,000 customers across Amazon and Microsoft, primarily based in the U.S., but also in Canada, Germany, Australia, Spain, and the UK.

The partnerships also support the importance of improving the internet and protecting more people. 

However, criminals will try to rebuild their businesses and open up new illegal call centers. 

The CBI, Amazon, and other international law enforcement agencies are committed to staying alert, sharing important information, and working closely with Indian law enforcement agencies and authorities from the countries attacked to help them with their investigations.

The CBI Tweeted that “CBI LAUNCHES OPERATION CHAKRA-II TO COMBAT AND DISMANTLE ORGANIZED CYBER ENABLED FINANCIAL CRIMES; DURING NATIONWIDE CRACKDOWN, SEARCHES CONDUCTED AT AROUND 76 LOCATIONS; LARGE NUMBER OF DIGITAL GADGETS INCLUDING LAPTOPs, HARD DISC ETC RECOVERED.”

The government requests to be aware of these scammers to protect our money and personal information.

Protect yourself from vulnerabilities using Patch Manager Plus to patch over 850 third-party applications quickly. Take advantage of the free trial to ensure 100% security.

Latest articles

10 Best DNS Management Tools – 2025

Best DNS Management Tools play a crucial role in efficiently managing domain names and...

Sweet Security Announces Availability of its Cloud Native Detection & Response Platform on the AWS Marketplace

Customers can now easily integrate Sweet’s runtime detection and response platform into their AWS...

Researchers Detailed Credential Abuse Cycle

Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling...

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Researchers Detailed Credential Abuse Cycle

Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling...

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases...

Tor Network Suffers IP Spoofing Attack Via Non-Exit Relays

In late October 2024, a coordinated IP spoofing attack targeted the Tor network, prompting...