logo
IVF centres in Vizag under scanner

IVF centres in Vizag under scanner

Hans India2 days ago
Visakhapatnam: Following the illegal surrogacy and baby selling racket being exposed at Universal Srushti Fertility Centres, District Medical and Health Officer (DM&HO) P Jagadeeswara Rao issued a warning to the hospital management of fertility centres that stringent action would be taken if they fail to adhere to norms.
As the illegal surrogacy, baby-selling racket busted in Hyderabad, the health officials in Visakhapatnam got on their toes and launched raids in various fertility centres. Violating norms and operating the IVF centres without license, the administrators of the Shrishti Universal Fertility Centre in Secunderabad cheated childless couples both in AP and Telangana.
As the Hyderabad police exposed a surrogacy scam, police mentioned that victims have been coming forward to file complaints in the Telugu states. A childless couple approached Dr Namrata of Srushti Fertility Centre for surrogacy. The infant was bought for Rs 90,000 but sold as an IVF child for Rs 35 lakh to the couple by producing fake documents. The infant was reportedly bought from a couple belonging to the economically weaker section but given to the childless couple as an IVF child.
Busting the racket, the Hyderabad police took eight people into custody, including the prime accused in the case A Namratha of Universal Srushti Fertility Centre. It is found that the centre was operating in various cities, including Hyderabad, Vijayawada and Visakhapatnam, without a license.
Irregularities were exposed when the victims got suspicious about the child's appearance and sought for a DNA test. DM&HO Jagadeeswara Rao held a meeting with the management of IVF and surrogacy centres on Tuesday. He warned that strict action will be taken if the rules are violated and expressed anger over the Srushti Fertility Centre for continuing its operation in Visakhapatnam despite the license being expired. He mentioned that the health officials provided required information to the Hyderabad police.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

One click can wipe out your entire savings: Rise of counterfeit banking apps and how to stay safe
One click can wipe out your entire savings: Rise of counterfeit banking apps and how to stay safe

Indian Express

time43 minutes ago

  • Indian Express

One click can wipe out your entire savings: Rise of counterfeit banking apps and how to stay safe

Two weeks ago, a man from Kerala's Nedumbassery received a message on his phone. It appeared to be from his bank, a routine SMS with a link for a mobile banking update. He had recently withdrawn Rs 4 lakh from his Provident Fund to cover two major expenses: his wife's upcoming delivery and the construction of their new home. Trusting the message, he clicked on the link, downloaded the app, and entered his credentials, just like he had done many times before. However, within minutes, his phone got two alerts: one transaction of Rs 1.9 lakh, another of Rs 2.1 lakh, both listed as purchases. Shocked, he rushed to the Ernakulam Rural Cyber Police. They confirmed his worst fear: the app he downloaded from the link was fake, laced with a screen-sharing tool. As he typed in his login details, scammers were watching in real time, taking full control of his bank account. This isn't an isolated incident. A growing number of unsuspecting users are falling prey to counterfeit banking applications –– fake versions of real apps that are designed to steal sensitive financial and personal data. spoke to cyber experts to understand how these apps operate and what users can do to stay safe. 'Counterfeit banking apps are fake versions of real banking apps, created by cybercriminals to scam people. These replicate the original, the name may sound similar, but often includes a slight change in a letter, making it difficult for users to spot the difference at first glance,' said Navkar Jain, co-founder, Plus91Labs. 'To increase visibility, attackers optimise the description of the counterfeit app using keywords that people typically search for when looking for the legitimate version,' he said. 'These apps are designed to steal financial data by impersonating legitimate banking platforms. Their UIs look real enough to trick users into sharing confidential information,' Ankit Dev Arpan, cyber lawyer and director, Lex Cyber Attorneys, told 'Some apps even make it past the security checks of major app stores like Google Play and the Apple App Store,' said Neehar Pathare, MD of 63SATS Cybertech. 'This is often done by obfuscating code, delaying malicious activity, or uploading a clean version first, and pushing harmful updates later,' he said. Gradual transformation: Apps start as legitimate-looking tools to pass approval checks. Malicious updates are introduced later. Deceptive user interface: Fake apps use realistic interfaces to appear trustworthy to both users and app store reviewers, only to later commit cybercrimes. Miniature versions and third-party redirection: A basic app is uploaded initially but redirects users to third-party websites to download the full malicious version. Direct distribution: Fraudsters send APK files or shady links via social media, ads, or messaging platforms, bypassing app stores entirely. How to spot fake banking apps: Jain, Pathare and Arpan shared tips on how to spot these fake banking applications: 📌Download only from trusted sources: Always use your official website of the bank for links to the apps or QR codes. 📌Double-check app store details: Look at the upload date, download count, and also user reviews. Be cautious if a new app claims millions of downloads. 📌Watch for fake websites: Some fake sites rank high in search results due to paid ads. Don't trust blindly. 📌Read app permissions carefully: Real banking apps ask only for what's needed, like camera or location. Fake ones may demand access to contacts, gallery, or screen reading. 📌Look closely at the developer info: Check if the email domain and website link are official. Fake ones often have spelling errors. 📌Enable two-factor authentication: Add extra layer of security and protect your accounts, via two-factor authentication. 📌Don't ignore spelling errors: Slight changes in app names, website URLs, or emails can mean it's a fake. 📌Be cautious with direct APK files: Never install banking apps sent via social media, ads, or messaging apps. 📌Beware of too-good-to-be-true reviews: Fake apps often show only positive, generic reviews or have unusually high ratings. 📌Avoid apps with recent release dates: A new app with millions of downloads can likely be a scam. 'Counterfeit apps are designed to extract private information like login credentials, card details, PAN, and even biometric data,' said Jain, adding, 'With access to SMS, these apps can read OTPs and steal transaction alerts too.' 'Scammers are creative,' said Arpan. 'Sometimes it's a simple KYC alert or account warning; other times, it's a tempting offer, like an instant loan or a QR code promising a Rs 100 reward. But once the app is installed, it silently observes, collects data, and in some cases, gives scammers full control of your device,' he said. Immediate actions to take if counterfeit banking application is installed: Uninstall the app immediately: Don't wait, remove the suspicious app and clear its data from your phone. Turn the internet connection off: Disable Wi-Fi and mobile data right away to stop the app from sending or receiving more information. Run a malware scan: Use a trusted antivirus or anti-malware app to scan your device and remove any hidden threats. Change all banking credentials: Update passwords, UPI PINs, and any linked email or app login details to block further misuse. Contact your bank quickly: Inform them about the fraud, freeze your account if needed, and get recent transactions reviewed. Report to cybercrime helpline: File a complaint at or dial 1930 to report the incident. Use kiosk scanners if available: In India, public device scanning kiosks, like those by National Forensic Sciences University (NFSU) Gandhinagar, can help detect deeper threats. Factory reset, as a last resort: If malware persists, back up important data safely (without connecting to other devices) and reset your phone. According to Jain, 'India is taking serious steps to combat these frauds and on the legal front, law enforcement agencies and cybercrime units are becoming increasingly proactive in tracking digital footprints, arresting fraudsters, and coordinating with banks and telecommunication companies.' Pathare said, 'App stores are improving fraud-app detection mechanisms. Banks are adopting sophisticated security features like multi-factor authentication and fraud detection systems to secure customer information. Awareness campaigns are also helping educate users.' 'India's cybercrime response is backed by laws like the IT Act, 2000, the Bharatiya Nyaya Sanhita (BNS), and the Digital Personal Data Protection (DPDP) Act,' said Arpan. 'The National Cyber Crime Reporting Portal and helpline 1930 simplify reporting, while initiatives like Cyber Dost and institutions like NFSU boost public awareness and expertise.' Arpan also stressed the need for stricter app store vetting, deeper rural outreach, and hiring trained cyber and legal experts. He also suggested a national portal to flag and disable fake apps in real time. As digital banking becomes part of daily life, these scams serve as a reminder that a single careless click can cost someone their life's savings, making vigilance not just a habit, but a necessity. The Safe Side: As the world evolves, the digital landscape does too, bringing new opportunities – and new risks. Scammers are becoming more sophisticated, exploiting vulnerabilities to their advantage. In our special feature series, we delve into the latest cybercrime trends and provide practical tips to help you stay informed, secure, and vigilant online.

Delhi HC To Hear Sanjay Bhandari's Plea Against 'Fugitive Economic Offender' Tag On August 8
Delhi HC To Hear Sanjay Bhandari's Plea Against 'Fugitive Economic Offender' Tag On August 8

News18

timean hour ago

  • News18

Delhi HC To Hear Sanjay Bhandari's Plea Against 'Fugitive Economic Offender' Tag On August 8

Last Updated: The Delhi High Court set Sanjay Bhandari's plea hearing for August 8. Bhandari challenged a trial court's "fugitive economic offender" order. The Delhi High Court on Friday scheduled UK-based arms consultant Sanjay Bhandari's plea hearing on August 8. Bhandari has challenged a trial court order declaring him as a 'fugitive economic offender". Furthermore, HC also refused to defer trial court proceedings and turned down the request of Bhandari's counsel. Enforcement Directorate (ED)'s special counsel Zoheb Hossain requested that the matter be decided finally after hearing it on merits. On Wednesday, Delhi HC Justice Girish Katpalia recused himself from hearing the petition filed by Sanjay Bhandari. Following this, the matter has been referred back to the Chief Justice for allocation to a different bench. During the hearing, Senior advocate Kapil Sibal appeared for Bhandari, while Advocate Zoheb Hossain represented the ED. During arguments, Sibal submitted, 'Once I'm declared a fugitive, I lose the right to avail legal remedies," urging the court to stay the trial court's order. He added that Bhandari's properties would be seized as a consequence of the FEO designation, and thus, the order must be stayed. The ED strongly objected to the plea. Advocate Hossain, appearing for the agency, argued that deference to the trial court's order cannot be granted merely on request. 'The only objective of the FEO Act is that this man comes back to India to face the law," Hossain said. He opposed even the issuance of notice on the stay application. Earlier this month, a Delhi Special Court declared Sanjay Bhandari a Fugitive Economic Offender under the FEO Act. The order, passed by Additional Sessions Judge Sanjeev Aggarwal, came in response to a plea by the ED, which alleged that Bhandari had willfully evaded legal proceedings in India and held undisclosed foreign assets exceeding Rs 100 crore. (With Inputs From PTI) view comments Disclaimer: Comments reflect users' views, not News18's. Please keep discussions respectful and constructive. Abusive, defamatory, or illegal comments will be removed. News18 may disable any comment at its discretion. By posting, you agree to our Terms of Use and Privacy Policy.

UP Man Kills Wife, Tries To Pass It Off As Robbery, Arrested
UP Man Kills Wife, Tries To Pass It Off As Robbery, Arrested

NDTV

timean hour ago

  • NDTV

UP Man Kills Wife, Tries To Pass It Off As Robbery, Arrested

Bareilly (UP): In a chilling incident in Uttar Pradesh's Bareilly district, a man allegedly killed his wife at the behest of his lover and tried to pass it off as a highway robbery, police said. Om Saran (38), the accused, has been arrested and sent to judicial custody, they said. After inconsistencies in Sarna's initial statement raised red flags, his call records were checked which revealed that he was in touch with a woman named Mannat, prompting police to dig deeper, SSP (Bareilly) Anurag Arya said. The probe eventually led to the unravelling of the murder conspiracy, Arya said. Saran, a resident of Badaun district, has been booked under sections 103 (murder), 230 (fabricating false evidence), 238 (causing disappearance of evidence of offence), and 240 (giving false information) of the Bharatiya Nyaya Sanhita (BNS), ASP (South) Anshika Verma said in a late-night press briefing on Thursday. The accused initially told the police that on the night of July 31, he was returning home with his wife Amarvati on a motorcycle when they were attacked near Kanthari village by 3-4 unidentified men, who looted their cash and jewellery and fatally assaulted his wife. Saran claimed that the attackers stole Amarvati's mangalsutra, gold earrings, and about Rs 10,000 in cash before fleeing. Police registered an FIR based on Sarna's written complaint. As the investigation progressed, police began to suspect Saran's version of events. Upon rigorous questioning, he admitted that he secretly married Mannat, who pressured him to eliminate his wife if he wanted to continue their relationship, the ASP said. On July 30, Saran took Amarvati on a trip to Purnagiri as part of the plan. On their way back, he stopped at his in-laws' house in Motipur, where he borrowed a motorcycle and a sharp-edged weapon ('banka') from his brother-in-law, Bhagwandas, Verma said. He stopped the bike near a deserted spot in Kanthari village around 12:15 am, and brutally attacked Amarvati with the 'banka', killing her on the spot. To make it look like a robbery, he removed her earrings, mangalsutra, and Rs 10,000 from his pocket, and concealed them in nearby bushes. He then called his brother-in-law and a friend, Anil Yadav, and arranged for an ambulance, pretending to be rushing his wife for treatment, Verma said. Police later recovered the murder weapon, and the hidden jewellery and cash based on the accused's disclosure. A mobile phone was also seized during the search, the officer said. Police are now investigating Mannat's involvement in the conspiracy, she added.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store