1. Cyber Fraud Probe Reveals Mule Accounts Opened on False Loan Promises
Investigators have found that several mule bank accounts used in cyber fraud cases were opened after victims were lured with promises of easy loans. Fraudsters allegedly used these accounts to route illicit proceeds, exploiting financial distress and gaps in customer verification processes at multiple banking touchpoints.
2. Agent Arrested for Trafficking Youth Into Cyber Slavery Networks
Police have arrested an agent accused of trafficking young Indians into cyber slavery networks operating overseas. Victims were allegedly forced to work in online fraud centres under coercive conditions, with passports confiscated and threats used to compel participation in cybercrime and financial scams.
3. Noida Police Arrest Man for Trafficking Victims to Southeast Asia for Cyber Fraud
Police in Noida have arrested a man accused of trafficking victims to Southeast Asia, where they were allegedly forced to participate in cyber fraud operations. Investigators said the accused lured job seekers with fake overseas employment offers linked to scam syndicates.
Certified Cyber Crime Investigator Course Launched by Centre for Police Technology
4. Kasaragod: Elderly Man Loses ₹20 Lakh in ‘Digital Arrest’ Cyber Scam
An elderly resident of Kasaragod was duped of ₹20 lakh in a “digital arrest” cyber scam. Fraudsters posing as law enforcement officials allegedly threatened legal action and coerced the victim into transferring money to multiple fraudulent bank accounts.
5. Agent Lured Indians With ₹1.5 Lakh Monthly Job Promises, Sold Them to Cybercrime Syndicate
Police have arrested an agent accused of luring Indians with promises of ₹1.5 lakh monthly salaries abroad before handing them over to a cybercrime cartel. Victims were allegedly trafficked, confined, and forced to carry out online fraud under constant surveillance and intimidation.
INTERNATIONAL
6. Hackers Abuse c-ares DLL Side-Loading Technique to Bypass Security Controls and Deploy Malware
Cybersecurity researchers have observed attackers exploiting c-ares DLL side-loading to bypass endpoint security controls. By placing malicious DLL files alongside legitimate applications, threat actors gain stealthy execution, enabling malware deployment, persistence, and lateral movement while evading detection by traditional security mechanisms.
7. China-Linked ‘VoidLink’ Linux Malware Targets Major Cloud Service Providers
Researchers have identified a new China-linked Linux malware dubbed VoidLink targeting major cloud service providers. The malware focuses on credential theft, system reconnaissance, and persistence, raising concerns over espionage risks to cloud infrastructure and the security of sensitive enterprise and government workloads.
8. Fortinet Patches Critical FortiSIEM Vulnerability Allowing Unauthenticated Remote Code Execution
Fortinet has released patches for a critical FortiSIEM vulnerability that allowed unauthenticated remote code execution. Exploitation could enable attackers to fully compromise monitoring systems, manipulate logs, and gain deep visibility into enterprise networks if left unpatched.
Certified Cyber Crime Investigator Course Launched by Centre for Police Technology
9. Hacker Claims Complete Breach of Russia’s Max Messaging Platform, Threatens Data Leak
A hacker has claimed to have fully breached Russia’s Max messaging platform, threatening to publicly release stolen data. Authorities have not confirmed the breach, while cybersecurity experts caution that leaked user data could pose serious privacy and national security risks if verified.
10. ‘PLUGGYAPE’ Malware Uses Signal and WhatsApp to Target Ukrainian Defense Forces
Cybersecurity researchers report that the PLUGGYAPE malware is leveraging Signal and WhatsApp for command-and-control operations targeting Ukrainian defense forces. The malware abuses trusted messaging platforms to evade detection, coordinate attacks, and exfiltrate sensitive military information.
