logo
Snakes on a plane: India officials block smuggling of live snakes from Thailand

Snakes on a plane: India officials block smuggling of live snakes from Thailand

News2430-06-2025
Indian customs officers in Mumbai said they have stopped a plane passenger arriving from Thailand with a wriggling cargo of live snakes, the third such seizure this month.
'Customs officers... foiled yet another wildlife smuggling attempt, 16 live snakes... seized from passenger returning from Thailand,' said customs officers in the airport in the Indian financial hub.
The passenger, who arrived on Sunday, has been arrested, the customs agency said in a statement, with 'further investigation under way'.
The live snakes included reptiles often sold in the pet trade, and were largely non-venomous, or with venom too weak to affect people.
They included garter snakes, a rhino rat snake and a Kenyan sand boa, among others.
READ | Snakes in the city: Reptile catcher hits 'lottery' with 102 venomous snakes in Sydney
In early June, customs officers stopped a passenger smuggling dozens of venomous vipers, also arriving from Thailand.
Days later, officers stopped another traveller carrying 100 creatures including lizards, sunbirds and tree-climbing possums.
Executive Director, Richard Scobey, joined a high-level panel at #EU #EnvironmentalCrime event alongside @UNODC, @Europol, & @EU_Commission. Discussing the #EUGreenDeal legacy & tackling illegal #WildlifeTrade through multi-sector collaboration. 🌍
@WWFEU pic.twitter.com/aHmirD3jbR
— TRAFFIC (@TRAFFIC_WLTrade) March 26, 2025
Wildlife trade monitor TRAFFIC, which battles the smuggling of wild animals and plants, has warned of a 'very troubling' trend in trafficking driven by the exotic pet trade.
More than 7 000 animals, dead and alive, have been seized along the Thailand-India air route in the last 3.5 years, it said.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Hackers who exposed North Korean government hacker explain why they did it
Hackers who exposed North Korean government hacker explain why they did it

Yahoo

time3 hours ago

  • Yahoo

Hackers who exposed North Korean government hacker explain why they did it

Earlier this year, two hackers broke into a computer and soon realized the significance of what this machine was. As it turned out, they had landed on the computer of a hacker who allegedly works for the North Korean government. The two hackers decided to keep digging and found evidence that they say linked the hacker to cyberespionage operations carried out by North Korea, exploits and hacking tools, and infrastructure used in those operations. Saber, one of the hackers involved, told TechCrunch that they had access to the North Korean government worker's computer for around four months, but as soon as they understood what data they got access to, they realized they eventually had to leak it and expose what they had discovered. 'These nation state hackers are hacking for all the wrong reasons, I hope more of them will get exposed, they deserve to be,' said Saber, who spoke to TechCrunch after he and cyb0rg published an article in the legendary hacking e-zine Phrack, disclosing details of their findings. There are countless cybersecurity companies and researchers who closely track anything the North Korean government, and its many hacking groups are up to, which includes espionage operation but also increasingly large crypto heists, as well as wide-ranging operations where North Koreans pose as remote IT workers to fund the regime's nuclear weapons program. In this case, Saber and cyb0rg went one step further and actually hacked the hackers, an operation that can give more, or at least different, insights into how these government-backed groups work, as well las 'what they are doing on a daily basis and so on,' as Saber put it. The hackers want to be known only by their handles, Saber and cyb0rg, because they may face retaliation from the North Korean government, and possibly others. Saber said that they consider themselves hacktivists, and he namedropped legendary hacktivist Phineas Fisher, responsible for hacking spyware makers FinFisher and Hacking Team, as an inspiration. At the same time, the hackers also understand that what they did is illegal, but they thought it was nonetheless important to publicize it. 'Keeping it for us wouldn't have been really helpful,' said Saber. 'By leaking it all to the public hopefully we can give researchers some more ways to detect them.' 'Hopefully this will also lead to many of their current victims being discovered and so to [the North Korean hackers] losing access,' he said. 'Illegal or not, this action has brought concrete artifacts to the community, this is more important,' said cyb0rg, in a message sent through Saber. Saber said they are convinced that while the hacker — whom they call 'Kim' — works for North Korea's regime, they may actually be Chinese and work for both governments, based on their findings that Kim did not work during holidays in China, suggesting that the hacker may be based there. Also, according to Saber, at times Kim translated some Korean documents into simplified Chinese using Google Translate. Saber said that he never tried to contact Kim. 'I don't think he would even listen, all he does is empower his leaders, the same leaders who enslave his own people,' he said. 'I'd probably tell him to use his knowledge in a way that helps people, not hurt them. But he lives in constant propaganda and likely since birth so this is all meaningless to him,' referring to the strict information vacuum that North Koreans live in, as they are largely cut off from the outside world. Saber declined to disclose how he and cyb0rg got access to Kim's computer, given that the two believe they can use the same techniques to 'obtain more access to some other of their systems the same way.' During their operation, Saber and cyb0rg found evidence of active hacks carried out by Kim, against South Korean and Taiwanese companies, which they say they contacted and alerted. North Korean hackers have a history of targeting people who work in the cybersecurity industry as well. That's why Saber said he is aware of that risk, but 'not really worried.' 'Not much can be done about this, definitely being more careful though :),' said Saber. Error in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data

Hackers who exposed North Korean government hacker explain why they did it
Hackers who exposed North Korean government hacker explain why they did it

TechCrunch

time3 hours ago

  • TechCrunch

Hackers who exposed North Korean government hacker explain why they did it

Earlier this year, two hackers broke into a computer and soon realized the significance of what this machine was. As it turned out, they had landed on the computer of a hacker who allegedly works for the North Korean government. The two hackers decided to keep digging and found evidence that they say linked the hacker to cyberespionage operations carried out by the North Korean government, exploits and hacking tools, and infrastructure used in those operations. Saber, one of the hackers involved, told TechCrunch that they had access to the North Korean government worker's computer for around four months, but as soon as they understood what data they got access to, they realized they eventually had to leak it and expose what they had discovered. 'These nation state hackers are hacking for all the wrong reasons, I hope more of them will get exposed, they deserve to be,' said Saber, who spoke to TechCrunch after he and cyb0rg published an article in the legendary hacking e-zine Phrack, disclosing details of their findings. There are countless cybersecurity companies and researchers who closely track anything the North Korean government, and its many hacking groups are up to, which includes espionage operation but also increasingly large crypto heists, as well as wide-ranging operations where North Koreans pose as remote IT workers to fund the regime's nuclear weapons program. In this case, Saber and cyb0rg went one step further and actually hacked the hackers, an operation that can give more, or at least different, insights into how these government-backed groups work, as well las 'what they are doing on a daily basis and so on,' as Saber put it. The hackers want to be known only by their handles, Saber and cyb0rg, because they may face retaliation from the North Korean government, and possibly others. Saber said that they consider themselves hacktivists, and he namedropped legendary hacktivist Phineas Fisher, responsible for hacking spyware makers FinFisher and Hacking Team, as an inspiration. Techcrunch event Tech and VC heavyweights join the Disrupt 2025 agenda Netflix, ElevenLabs, Wayve, Sequoia Capital, Elad Gil — just a few of the heavy hitters joining the Disrupt 2025 agenda. They're here to deliver the insights that fuel startup growth and sharpen your edge. Don't miss the 20th anniversary of TechCrunch Disrupt, and a chance to learn from the top voices in tech — grab your ticket now and save up to $600+ before prices rise. Tech and VC heavyweights join the Disrupt 2025 agenda Netflix, ElevenLabs, Wayve, Sequoia Capital — just a few of the heavy hitters joining the Disrupt 2025 agenda. They're here to deliver the insights that fuel startup growth and sharpen your edge. Don't miss the 20th anniversary of TechCrunch Disrupt, and a chance to learn from the top voices in tech — grab your ticket now and save up to $675 before prices rise. San Francisco | REGISTER NOW At the same time, the hackers also understand that what they did is illegal, but they thought it was nonetheless important to publicize it. 'Keeping it for us wouldn't have been really helpful,' said Saber. 'By leaking it all to the public hopefully we can give researchers some more ways to detect them.' 'Hopefully this will also lead to many of their current victims being discovered and so to [the North Korean hackers] losing access,' he said. 'Illegal or not, this action has brought concrete artifacts to the community, this is more important,' said cyb0rg, in a message sent through Saber. Saber said they are convinced that while the hacker — whom they call 'Kim' — works for North Korea's regime, they may actually be Chinese and work for both governments, based on their findings that Kim did not work during holidays in China, suggesting that the hacker may be based there. Also, according to Saber, at times Kim translated some Korean documents into simplified Chinese using Google Translate. Saber said that he never tried to contact Kim. 'I don't think he would even listen, all he does is empower his leaders, the same leaders who enslave his own people,' he said. 'I'd probably tell him to use his knowledge in a way that helps people, not hurt them. But he lives in constant propaganda and likely since birth so this is all meaningless to him,' referring to the strict information vacuum that North Koreans live in, as they are largely cut off from the outside world. Saber declined to disclose how he and cyb0rg got access to Kim's computer, given that the two believe they can use the same techniques to 'obtain more access to some other of their systems the same way.' During their operation, Saber and cyb0rg found evidence of active hacks carried out by Kim, against South Korean and Taiwanese companies, which they say they contacted and alerted. North Korean hackers have a history of targeting people who work in the cybersecurity industry as well. That's why Saber said he is aware of that risk, but 'not really worried.' 'Not much can be done about this, definitely being more careful though :),' said Saber.

Philippine fast-food giant Jollibee blames fraudsters for raffle row
Philippine fast-food giant Jollibee blames fraudsters for raffle row

Yahoo

time7 hours ago

  • Yahoo

Philippine fast-food giant Jollibee blames fraudsters for raffle row

The Philippines' beloved fast-food chain Jollibee said fraudsters rigged the results of its online raffle, following complaints from customers and a brief government investigation. Jollibee said "fraudulent third parties" placed multiple entries "despite existing safeguards" for a chance to win burgers and concert tickets. The company said it complied with the government investigation and that the situation had been corrected. Many social media users were in disbelief when the winners' names were posted on Jollibee's Facebook page last week. They said names like Hobby Dynamics, Noble Beer and Alfreda Corkery could have been made up using AI. Jollibee said it "immediately implemented corrective measures" and disqualified the "invalid major prize winners". It also suspended succeeding draws and said a re-draw would be held. "We want to assure everyone that we have fully addressed the issues raised and strictly complied with the investigation initiated by the Department of Trade and Industry," Jollibee said in a statement late on Wednesday. The names on the winners' list baffled social media users as they are uncommon in the country. Filipino first and last names are a mix of English and Spanish inherited from its former colonisers from America and Spain. The names also include Belle Thompson, Arielle Wintheiser and Gilda Block. "LIKE SERIOUSLLLLLY?!?!" one Facebook user commented. "Your AI must be too lazy to come up with these kinds of names". "They probably thought people didn't have time to read," another wrote. Some drew comparisons to a corruption controversy involving Vice-President Sara Duterte, whose office allegedly paid government funds to individuals with fictitious-sounding names. The Department of Trade and Industry said on Wednesday that it would "continue to oversee the resumption of the Jollibee Burger Blowout Promo", ensuring "fairness and transparency in all promotional undertakings". Jollibee started as an ice cream shop in the 1970s before opening its first burger restaurant in downtown Manila in the early 1980s. It has expanded its business rapidly in the last five years, acquiring US cafe chain The Coffee Bean and Tea Leaf and Michelin-starred Hong Kong dimsum chain Tim Ho Wan. Its founder, Tony Tan Caktiong, is the son of poor immigrants from southern China. The chain's mascot, a perpetually smiling bee with a red jacket, is a nod to Filipinos' hardworking nature. Generations of Filipinos see the brand as a part of their national identity, with its signature fried chicken, burgers and spaghetti becoming a staple for family gatherings. In 2014, a shortage of its Chickenjoy fried chicken led to the #ChickenSad trend on social media. Jollibee has 1,600 stores in 17 countries, including the UK, the US, Spain and Singapore.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store