Arabic Arabic Chinese (Simplified) Chinese (Simplified) Dutch Dutch English English French French German German Italian Italian Portuguese Portuguese Russian Russian Spanish Spanish
| (844) 627-8267

CYBER CRIMINAL DUPED PAL MERCHANTSTO THE TUNE OF RS. 1.95 CRORES HACKING COMPUTERS, FIVE ARRESTED | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker


Face2News/Chandigarh

Team of Police Station Cyber Crime burst a Gang of fraudsters with arrest of five accused in FIR No. 72 dated 31.12.2022, U/S 420, 467, 468, 471, 120-B IPC, PS – Cyber Crime, Chandigarh under supervision/direction of Sh. Ketan Bansal, IPS, SP/Cyber Crime, Chandigarh, close guidance of Sh. A Venkatesh, DANIPS, DSP/PS-CC& IT, UT, Chandigarh and leadership of Inspector Ranjit Singh, SHO, PS-Cyber Crime, Chandigarh.

The accused identified as Pankaj Kumar S/o Hari Ram, # 359, Village Sukhchain, Tehsil- Sirsa, Distt- Sirsa, Haryana, Age-29 Years.,  Vikram S/o Karishan Kumar, Village Dhani Thoba , Distt. Fatehabad, Haryana, Age28 Years, Mukesh Kumar S/o Jagdish Chander, Village Kalirawan ,Tehsil Mandi Adampur, Distt Hissar, Haryana, Age29 Years, Rajender Parsad @ Raju S/o Lajji Ram, Village Kalirawan,TehsilMandi Adampur, Distt Hissar, Haryana, Age38 Years and Rohtash Kumar S/o Sita Ram, VPO Chuli Kalan, Tehsil Mandi Adampur, Distt Hisar, Haryana, Age 27 Years 

The present case has been registered on the complaint of a resident of Sector 22 Chandigarh, In which she reported that she is working as Managing Director of Accounts, in Paul Merchants Pvt. Ltd. and an incident of hacking of their systems and thereby duping us to the tune of Rs. 1.95 Cr (Approx.) has occurred in the past few days and they are a Non-Banking Financial Corporation duly licensed by the Reserve Bank of India.

During the course of investigation data of alleged transactions has been scrutinized and found that 1497 ID’s of Paulpay application have been created and total 3114 transactions has been made out by using these ID’s and transactions of Rs. 1,93,54,231.56/- has fraudulently done. 

Under the said license, they are authorized by RBI to issue prepaid wallets and cards to General Public. That the Prepaid wallets and cards are issued through Mobile Application namely PaulPayV2.0, available on the android play store and apple app store and, Customer can avail various payment services (utility bills payment, recharge mobile, DTH or Fastags, etc. through their mobile application.Possibly the servers / payment getaway of our Company has been hacked or some parallel /proxy servers / payment gateway has been installed to commit the said cheating, forgery or any other offence that may come into the knowledge of the Company or Police. According, on the above said complaint, the above said case has been registered.

During the course of investigation data of alleged transactions has been scrutinized and found that 1497 ID’s of Paulpay application have been created and total 3114 transactions has been made out by using these ID’s and transactions of Rs. 1,93,54,231.56/- has fraudulently done. 

USE OF FRAUDULENT AMOUNT:

1. Loan amount of Trucks Approx 30 Lacks
2. Fas tags recharge of several vehicles Approx 5 Lacks
3. Mobile phone recharged Approx 2 Lacks
4. Premium of insurance policies has paid Approx 2.5 Lacks
5. Payment for Indian Oil Corporation accounts has done Approx 30 Lacks
6. Amazon Gift Cards vouchers Approx 25 Lacks
7. Flip Cards Coupons Approx 10 Lacks
8. Gold loan Approx 10 Lacks
9. Other loans Approx 20 Lacks
10. Transferred in Paytm accounts Approx 50 Lacks

MODUS OPERANDI: During the course of investigation found that location of some mobile numbers which are used to create the ID’s of PaulpayV2.0 application in Mukherji Nagar, Delhi. Further, on 05.01.2022 during the course of investigation upon secret information and location of the mobile numbers raid conducted at Mukherji Nagar, Delhi area and accused Pankaj Kumar S/o Hari Ram, # 359, Village Sukhchain, tehsil- Sirsa, Distt- Sirsa, Haryana, Age-29 Years was arrested and some SIM cards which were used to create the Paulpay ID’s are recovered from his possession.

During interrogation, he disclosed that his friend Vikram who is running an Café house at Tulshi Chowk , Fatehabad, Haryana and approached him that he alongwith his friends Kamaldeep, Rajender Parsad @ Raju, Mukesh, Rohtash Beniwal working together and they are having an scheme of paulpay app PaulpayV2.0 and they need ID’s of Paulpay to take the benefits of scheme and asked him to provide the ID’s of PaulpayV2.0 and offered him payment of Rs. 1500/- per ID.

After that he created many ID’s and provide the same to Vikram and also used some ID’s himself. On 06.01.2022 alleged (1) Vikram S/o Krishan Kumar, Village Dhani Thoba , Distt Fatehabad, Haryana, Age 28 Years (2) Mukesh Kumar S/o Jagdish Chander, Village Kalirawan,Tehsil Mandi Adampur, Distt Hissar, Haryana, Age 29 Years (3) Rajender Parsad @ Raju S/o Lajji Ram, Village Kalirawan,Tehsil Mandi Adampur, Distt Hissar, Haryana, Age 38 Years arrested mobile phone containing the screenshots of transactions and mobile numbers which were used to create the ID’s of paulpay recovered from their possession.

Thus Vikram and Rajinder @ Raju etc., Mukesh, Pankaj has dupe approx. 2 Crore from Paulpay application. Further, alleged Rajender Parsad @ Raju disclosed that his friend Rohtash Kumar resident of Vill Chuli Kalan informed him about the loophole/ bug in the application PaulpayV2.0 and he also told the whole process to withdraw money from PaulpayV2.0 application.

After that on 08.01.2022 alleged Rohtash Kumar S/o Sita Ram, VPO Chuli Kalan, Tehsil Mandi Adampur, Distt Hisar, Haryana, Age 27 Years. During interrogation alleged Rohtash Kumar admitted that he is having the knowledge of bug hunting and he found bug in application PaulpayV2.0 and he informed about the same to his friend Rajender Parsad @ Raju and after that they (Rajender Parsad @ Raju, Mukesh, Kamaldeep) withdraw Approx. Rs 2 Crores money from application PaulpayV2.0.

MASTER MINDS: Accused Rohtash Kumar is B.Sc and he is learning computer since 8th standard, he is having technical knowledge, he hunts bugs in financial applications available one Play store, I-tune etc. He found bug in PaulpayV2.0 application and used Burpsuite tool to intercept the data of Paulpay website, due to this interception he is able to stop the signals to cashfree payment gateway and bypass it.

Thus, transactions were successfully made at the server even after cancelling the same from their end. He informed and teach the method to his friend Rajender Parsad @ Raju, Mukesh and after that they take the help of other co-accused to prepare the ID’s of Paulpay application and they have dupe Approx Rs. 2 Crores from application PaulpayV2.0. The investigation of the case is in progress and accused are on police remand and being interrogated to find out the whereabouts of the other accused and their involvement in other Cyber Crimes.

RECOVERY: 8 Mobile Phones (including mobile phones containing the chat regarding the creation of Paulpay application ID’s),  Modem, Wifi 1,  Laptops 4, Sim Cards 31. Truck 4

——————————————————–


Click Here For The Original Story From This Source.

National Cyber Security

FREE
VIEW