Phishing gang dupes Preneet of Rs 23 lakh - Mandi Gobindgarh News

Mandi Gobindgarh News

Mandi Gobindgarh News and Directory

drlalpathlabs.mandigobindgarh@gmail.com

Hot

Post Top Ad

Your Ad Spot

Thursday, August 8, 2019

Phishing gang dupes Preneet of Rs 23 lakh


Phishing gang dupes Preneet of Rs 23 lakh

Aman Sood

Tribune News Service

Patiala, August 7

The Patiala police have busted a gang allegedly involved in duping several Members of Parliament, MLAs and others. Punjab Chief Minister Capt Amarinder Singh’s wife and Patiala MP Preneet Kaur was recently duped of Rs 23 lakh by this Jharkhand-based gang.

Kaur received a call while being in Delhi to attend Parliament session last week. The caller claimed to be a manager of the State Bank of India. “Between July 26 and 29, he called up the MP saying he needed her bank account details to credit her Lok Sabha salary. He asked for her bank account number, ATM pin, CVC number and even the OTP that she had received on the phone,” the police said.

As soon as Kaur gave him all those details, she received an SMS saying Rs 23 lakh had been withdrawn from her SBI account in Patiala. She informed the police and an FIR under Section 420 of the IPC and the Information and Technology Act was registered at the Civil Lines Police station on July 29.

Patiala SSP Mandeep Singh Sidhu said the gang was operated by Attaul Ansari of Jamtara in Jharkhand. “We have arrested him and a major portion of the money has been recovered,” he said. “I cannot comment on the case any further. We are yet to grill the main accused,” he said.

Sources suggest that hundreds of villages in Jharkhand have emerged as a phishing hub. Jamtara police record suggests that police teams from 15 states have visited this area over 35 times in the past four years and arrested over 50 persons.

Police officials say it all started in 2011 when some youths learnt the trick of recharging phones without actually paying for it. A couple of years later, reports of siphoning of money from bank accounts of unsuspecting ATM cardholders started pouring in.

continued on page 11

The Modus operandi

  • Gang members call up unsuspecting ATM cardholders posing as bank officials and on various pretexts ask for credit/debit card number, ATM PIN, login ID, CVV number, expiry date, one-time password etc.
  • On getting these details, money from the victim’s account is transferred into e-wallets created using fake documents; most of their operations are conducted from Jamtara in Jharkhand

No comments:

Post a Comment

Post Top Ad

Your Ad Spot