
Malaysia to Look Into Claim 1MDB Fugitive Jho Low Is in China
The country has not received information on the whereabouts of Low, better known as Jho Low, Prime Minister Anwar Ibrahim said on Saturday, state news agency Bernama reported. Anwar said he would need to check with the home ministry, which didn't respond to calls early Monday.
Bradley Hope and Tom Wright, whose book Billion Dollar Whale: The Man Who Fooled Wall Street, Hollywood, and the World chronicled Low's role in the rise and fall of 1MDB, said in a recent YouTube video that he has been residing in Green Hills, an upscale neighborhood in Shanghai. The two former Wall Street Journal reporters said Low was using a forged Australian passport under the name Constantinos Achilles Veis.
In the wake of the two reporters' claims, Puad Zarkashi, a senior member of the ruling coalition's United Malays National Organisation, called on authorities to bring back the fugitive financier, Malaysiakini reported.
Malaysia has been working for years to repatriate Low, who was first charged in absentia in 2018 by a local court with eight counts of money laundering. He was previously reported as having been in hiding in the Chinese special administrative region of Macau, and has publicly said he is innocent.
The Federal Bureau of Investigation has also accused Low of stealing $1.42 billion from three bond transactions that Goldman Sachs Group Inc. arranged for the Malaysian wealth fund, formally known as 1Malaysia Development Bhd.
Former Malaysian Prime Minister Najib Razak is in prison in connection with 1MDB, while ex-Goldman banker Tim Leissner was also sentenced to prison for his role.
Some $4.5 billion was misappropriated from 1MDB. Low, who previously said he did consulting work for the fund, has been portrayed by some global investigators as the mastermind behind the scheme.
This article was generated from an automated news agency feed without modifications to text.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Indian Express
a few seconds ago
- Indian Express
Australian regulator says YouTube, others ‘turning a blind eye' to child abuse material
Australia's online safety regulator has said that major tech companies, including YouTube and Apple, are not doing enough to stop child sexual abuse material from appearing on their platforms. In a report published on Wednesday, the eSafety Commissioner said YouTube had been especially unresponsive to questions and failed to share how many user reports it receives or how long it takes to act on them. The same was said of Apple. 'When left to their own devices, these companies aren't prioritising the protection of children and are seemingly turning a blind eye to crimes occurring on their services,' said Julie Inman Grant, Australia's eSafety Commissioner, in comments reported by Reuters. The Australian government recently decided to include YouTube in its social media restrictions for teenagers, after the regulator advised against giving it an exemption. The report looked at how Apple, Google, Meta, Microsoft, Discord, Skype, Snap, and WhatsApp are addressing child abuse content. According to the findings, many platforms had gaps in safety. These included poor systems for detecting live-streamed abuse, weak methods for reporting harmful content, and a failure to block known child abuse links. The regulator also said some companies had not taken action even after being warned in previous years. It pointed out that not all companies were using 'hash-matching' technology across their services – a tool used to detect known child abuse images by comparing them to a database. 'In the case of Apple services and Google's YouTube, they didn't even answer our questions about how many user reports they received about child sexual abuse on their services or details of how many trust and safety personnel Apple and Google have on staff,' Inman Grant told Reuters. Google has previously said it uses industry-standard tools, including hash-matching and artificial intelligence, to detect and remove abuse material. Meta, which owns Facebook, Instagram and Threads, says it bans graphic content on its platforms.


Time of India
10 minutes ago
- Time of India
Cisco suffers data breach: How hackers used ‘voice attack' to steal user information
Cisco has disclosed a recent data breach, revealing that a cybercriminal successfully tricked a company representative into granting access to a third-party database. The attack, identified as a voice phishing or 'vishing' scheme, led to the theft of basic profile information for users registered on The networking giant stated that the hackers accessed and exported a subset of user data, though the company did not specify the number of people affected. 'On July 24, 2025 (GMT+9), Cisco was made aware of an incident involving a bad actor targeting a Cisco representative through a voice phishing attack, also known as vishing. As a result, the actor was able to access and export a subset of basic profile information from one instance of a third-party, cloud-based Customer Relationship Management (CRM) system that Cisco uses,' Cisco said. 'Upon learning of the incident, the actor's access to that CRM system instance was immediately terminated and Cisco commenced an investigation,' the company added. What user data is stolen from Cisco hacking According to Cisco's public disclosure, the stolen data included users' names, organization names, addresses, Cisco-assigned user IDs, email addresses, phone numbers and account-related metadata like the account creation date. According to cybersecurity news outlet Bleeping Computer, this breach may be part of a series of attacks targeting companies' Salesforce data. Other companies that have been impacted include Allianz Life, Tiffany and Co., and the Australian airline Qantas. Cisco is a known customer of Salesforce, a leading cloud-based CRM provider. What is voice phishing or vishing Voice phishing, also known as 'vishing,' is a type of hacking attack in which hackers use fraudulent phone calls to trick people into revealing sensitive personal, financial or company information. It's the voice-based equivalent of email phishing. Usually, the cybercriminal pretends to be a trusted entity, such as a representative from a bank, a government agency (like the IRS), a tech support company (like Microsoft ), or even a colleague. Google Pixel 10 series: Specs, Design & Features That We Know! AI Masterclass for Students. Upskill Young Ones Today!– Join Now


Indian Express
an hour ago
- Indian Express
BCA graduate who learned snatching from YouTube, his MSc accomplice held; gold chains recovered: Police
The Chandigarh Police has arrested a BCA graduate and former HR executive of a multinational company in Mohali, who reportedly confessed to learning how to snatch gold chains by watching YouTube videos. His associate, an MSc postgraduate employed at a courier company, has also been arrested. The duo is linked to a series of snatchings across Chandigarh, Mohali, and Panchkula, with gold jewellery worth lakhs recovered during the probe. Five gold chains, a gold mangalsutra, and two gold pendants, have been recovered from the accused, police said. The team, led by Inspector Rajiv Kumar, SHO of the police station 31, arrested the accused Abhishek Ojha (30), a native of Agra currently residing in Panchkula. His associate, Ashok Kumar (28) also from Agra, was also arrested during a follow-up raid in Uttar Pradesh (UP). The accused were arrested in connection with a FIR on July 24, registered at the police station 31, Chandigarh, on the complaint of a local resident, Preeti. She reported that on July 23, at around 8.30 pm, she was returning home when an unidentified bike rider snatched her gold mangalsutra near the AFFWA Complex in Sector 31. She informed police that she would be able to identify the accused if confronted. Following her complaint, the police arrested Ojha on August 1 and recovered a knife from his possession. During the interrogation, he confessed to multiple snatchings in different areas of Chandigarh, including Sectors 31, 34, 36, 39, and 19, as well as in Mohali and Panchkula. He also admitted to sending the snatched jewellery to his associate Ashok in Agra, through courier services. Police obtained a five-day remand for Abhishek and launched raids in Agra and Aligarh, leading to the arrest of Ashok on August 3. Ashok was found in possession of the mangalsutra that had been snatched in the Sector-31 case. He was produced before court and sent to three-day police remand. A subsequent raid conducted in Panchkula on August 4 led to the recovery of three gold chains, two gold pendants, and a pair of number plates. The Bajaj Pulsar N-250 motorcycle used in the crimes, which had no number plate, was also seized. Police also recovered a DTDC courier slip, confirming that the stolen jewellery had been sent to Ashok by Abhishek. Police said that during investigation, it was revealed that Abhishek, a BCA graduate, previously worked as an HR professional at a multinational company in Mohali. He told police he learned how to commit snatching by watching YouTube videos and initially carried out crimes in Agra, where three snatching cases are already registered against him. He later moved to Panchkula in March 2025 and began targeting women across the Tricity areas. He often removed his motorcycle's number plate to evade identification and committed crimes for 'pleasure and easy money'. His associate, Ashok, is an MSc graduate and works in a courier company. While he has no previous criminal record, he played a key role in concealing and storing stolen items on behalf of Abhishek, a police official added. Both accused are currently in police remand, and further investigation is underway to trace more stolen property and examine any additional accomplices involved in the snatching racket, police said.