logo
#

Latest news with #OTPs

Honeytrap Via Indian Numbers: Man Arrested For Aiding ISI Handler To Trap Officials
Honeytrap Via Indian Numbers: Man Arrested For Aiding ISI Handler To Trap Officials

News18

time3 days ago

  • News18

Honeytrap Via Indian Numbers: Man Arrested For Aiding ISI Handler To Trap Officials

Last Updated: The arrested suspect was identified as Haseen, who allegedly aided his Pakistani handler in getting access to Indian phone numbers to honeytrap officials. In a major development in the chain of espionage cases emerging in the country, two persons were picked up for interrogation for allegedly aiding their handler in Pakistan to get access to Indian phone numbers to be used to honeytrap Indian officials. The arrested suspect was identified as Haseen, who allegedly shared OTPs with his handler across the border to access WhatsApp and other social media platforms. His brother, Qasim, is also under interrogation, the officials said. IANS. Several cases of spying for Pakistan have emerged since the Pahalgam terror attack on April 22. Several people have been arrested for allegedly spying for Pakistan, including YouTuber Jyoti Malhotra, a CRPF jawan, a Rajasthan man, and another employee of the Rajasthan government, among others. More to follow…

Assam Police busts fake SIM racket with Pak links, arrest 7
Assam Police busts fake SIM racket with Pak links, arrest 7

Time of India

time17-05-2025

  • Time of India

Assam Police busts fake SIM racket with Pak links, arrest 7

Guwahati: In a crackdown amid simmering tensions between India and Pakistan following the April 22 Pahalgam terror attack, Assam Police , acting on Army intelligence, arrested seven people and busted a racket using fake SIM cards for cybercrimes and anti-national activities . These SIM cards, sourced from Assam, Rajasthan, and Telangana, were allegedly used to share sensitive information with Pakistani agents. The seven people have been arrested since last Friday, and 14 others are under interrogation. During a press conference on Saturday, Assam DGP Harmeet Singh said, "We got the first input from Gajraj Military Intelligence that they stumbled on a number of people who were sending OTPs to people in Pakistan to be used to set up accounts with Indian WhatsApp numbers." After technical analysis for days, Assam's Special Task Force (STF) registered a case last Wednesday and launched "Operation Ghost SIM". "As part of that operation, police teams were dispatched to Hyderabad in Telangana, Bharatpur and Alwar in Rajasthan, besides Assam's Dhubri and Morigaon. Since Friday afternoon, seven people were arrested, some in Bharatpur and Alwar and one at Guwahati airport," he added. by Taboola by Taboola Sponsored Links Sponsored Links Promoted Links Promoted Links You May Like Her body cannot endure this level of pain; please help her. Donate For Health Learn More Undo "These SIM cards, obtained fraudulently using others' identities, were not only used in cybercrimes but also anti-national activities. There is clear evidence that some of these numbers have been shared and used by anti-national and inimical elements to use WhatsApp accounts appearing to be India-based," the DGP added. The operation was developed through collaboration between Assam's special branch and STF, with intelligence shared by the Army's Gajraj unit. Strategic deliberations led to coordinated raids across five districts in three states. Those arrested include Saddik (47), Arif Khan (20), Sajid (21), Akeek (25), Arsad Khan (34), Mofijul Islam (19), and Jakariya Ahmad (24). Saddik, Arif Khan, and Sajid are residents of Rajasthan's Bharatpur and Alwar, respectively, and they were arrested from there. Akeek, who also hails from Bharatpur in Rajasthan, was arrested at Lokpriya Gopinath Bordoloi International Airport in Guwahati, and Arsad, who hails from Bharatpur in Rajasthan, was arrested at New Delhi airport. Mofijul, who is a resident of Assam's Dhubri district, was arrested from Sangareddy district in Telangana, and Jakariya of Assam's Bilasipara. Charges of 'criminal conspiracy' and 'waging or attempting to wage war or abetting waging of war against the govt of India' under the Bharatiya Nyaya Sanhita (BNS), besides different charges under the "Unlawful Activities (Prevention) Act, 1967" and "IT Act," have been slapped against them.

Mohtasib entitled to act as mediator: LHC
Mohtasib entitled to act as mediator: LHC

Business Recorder

time10-05-2025

  • Business
  • Business Recorder

Mohtasib entitled to act as mediator: LHC

LAHORE: The Lahore High Court (LHC) has held that the Mohtasib is entitled to act as mediator for the purpose of resolving the disputes amicably. The court passed this order on a petition of United Bank of Pakistan and set aside the order of the president of Pakistan dismissing the representation of the bank. The court said that the complaints shall be deemed pending before the Mohtasib, which shall decide the complaints afresh after affording opportunity to the parties to produce documents, affidavits and evidence, in support of their respective claims. The court commenting on the jurisdiction of Mohtasib observed that the jurisdiction of the Mohtasib is of quasi-judicial nature; hence, application and adaptation of evidentiary principles are inapplicable for such mediation proceedings. The court said Mohtasib is only entitled to receive evidence on affidavits without following evidentiary principles strictly. It observed that the Mohtasib failed to segregate cases where exercise of jurisdiction is justified and where it was not justified. The court said Mohtasib ignores and overlooks to consider the effect and consequence of 'contributory negligence' and 'comparative negligence'. Apparently, Mohtasib shifted absolute responsibility on bank by placing reliance on Section 41 of the Act 2007, the court added. The bank through its petition claimed that scope and extent of the jurisdiction of the Mohtasib has had to be construed narrowly and conservatively, since it was not a court but a tribunal, which had no authority to investigate and determine allegations of fraud, involving third-party; i.e., an anonymous caller or impersonator. The bank also claimed that two-factor authentication process was in place, wherein before payment instructions are executed a special code, One-Time-Passcodes (OTPs) is sent at the registered mobile of the customers, and unless OTP is fed in flashed window, no transaction could take effect. The customers; however, contended that bank had acted in violation of its contractual obligations, omitted duty of exercising reasonable care and skills and allowed unauthorised Electronic Fund Transfers (EFTs) from their accounts. The customers also claimed that since banks owe a duty of care and diligence; therefore, the bank should inquire into payment instructions before funds are released and if the bank acted diligently all attempts to withdraw funds illicitly could be foiled. The Mohtasib in its decision held that bank failed to meet the test of burden of proof; hence, declared that bank was in breach of its duties and recommended payment of compensation equal to unauthorised amount transferred. Decision of the Mohtasib was affirmed by the office of President of Pakistan by dismissing representation of the bank. Copyright Business Recorder, 2025

New WhatsApp scam uses OTPs to access bank accounts
New WhatsApp scam uses OTPs to access bank accounts

TimesLIVE

time30-04-2025

  • TimesLIVE

New WhatsApp scam uses OTPs to access bank accounts

Police in the Northern Cape have issued a warning to the public after the emergence of a new online scam involving WhatsApp and one-time PINs to gain access to one's banking account. Police spokesperson Col Cherelle Ehlers said the scam begins when victims receive WhatsApp messages that appear to be from people in their contact lists. These messages often contain a seemingly harmless request to participate in a survey, followed by a prompt to share a one-time password (OTP) that the victim receives on their phone. Ehlers said: 'Because the messages originate from known contacts, they seem trustworthy. 'Scammers use the OTP to gain unauthorised access to the victim's banking account.' Ehlers urged the public to remain vigilant and avoid sharing any sensitive banking information, especially if the request was not personally initiated. 'It is important to note that legitimate banking institutions do not send OTPs unsolicited or ask clients to forward them.' The public is advised to follow these safety tips: never share your bank card number, PIN or other personal banking details electronically, particularly with unknown individuals; be sceptical of offers that appear too good to be true; and always verify the identity of anyone requesting sensitive information. When in doubt, contact your bank or the police directly. TimesLIVE

CelcomDigi launches PrivateSIM for users who want to keep their real number private
CelcomDigi launches PrivateSIM for users who want to keep their real number private

The Star

time23-04-2025

  • Business
  • The Star

CelcomDigi launches PrivateSIM for users who want to keep their real number private

Users can to subscribe to PrivateSIM via the CelcomDigi online store – just make sure that the device is compatible and has an unoccupied eSIM slot. — Photo by Marek Studzinski on Unsplash CelcomDigi has announced that it is now offering PrivateSIM, a supplementary mobile phone line intended for users who want to keep their personal phone number private when registering for online services. Example use cases from CelcomDigi include PrivateSIM acting as a dedicated number to receive one-time passwords (OTPs) to be used in banking, or be used when registering for things like trial accounts, one-time sign-ups, and others.​ The supplementary PrivateSIM line costs RM10 per month and is available to Malaysian citizens aged 18 and older. — CelcomDigi According to the telco, PrivateSIM would also help safeguard users' personal phone numbers from cybersecurity incidents such as data breaches, while minimising clutter from spam and promotional messages on their main number. The supplementary PrivateSIM line costs RM10 per month and is available to Malaysian citizens aged 18 and older. They will also need to be subscribed to the CelcomDigi Postpaid 5G 80 for their principal line or higher. The service is available via eSIM, which users are able to subscribe to via the CelcomDigi online store – just ensure that the device is compatible and has an unoccupied eSIM slot. For more details on the subscription and sign-up process, users may check out the CelcomDigi website. It is worth noting that PrivateSIM will occupy one of the six slots for supplementary lines available to the principal line.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store