Thursday, June 13, 2024

Indian National Arrested for Stealing $150,000 via Computer Hacking

A cybercriminal from India was taken into custody for utilizing computer hacking to steal a sum of $150,000 from an elderly woman.

A computer hacker is an individual with exceptional proficiency in computer technology, who is highly skilled in discovering and exploiting vulnerabilities in software and computer systems.

They possess a deep understanding of programming languages, network protocols, and system architectures, and use their knowledge to uncover weaknesses in security measures.

Fraud Incident

Jane Doe fell victim to a fraud incident due to a pop-up notification that appeared on her computer screen. The pop-up claimed that her system had been hacked and instructed her to contact customer service at a provided phone number.

Following Jane Doe’s acceptance, she was directed by a group of fraudsters to withdraw money from her bank accounts and store it at the “Fed.” Jane Doe complied and transferred a sum of $150,000 to the fraudsters in cash.

The FBI devised a trap by having Jane Doe inform the criminals that she possessed $50,000 in cash, which led to their apprehension.

So, Sukhdev Vaid and co-defendant Eddly Joseph came to Montana to steal money from Jane, and the Department arrested both criminals by installing Ultraviewer on Jane’s computer.

According to court documents, the government alleged that a sizable Indian enterprise was complicit in stealing funds from senior citizens in the United States. 

Even though Vaid was found guilty of hacking, he could face serious consequences including up to 20 years in prison, a fine of $250,000, and three years of supervised release.

The U.S. Sentencing Guidelines and other legally required criteria will be considered by the court when determining the sentence. Sentencing is scheduled for February 14, 2024, and Vaid is currently detained in custody after being arrested.

Protect yourself from vulnerabilities using Patch Manager Plus to patch over 850 third-party applications quickly. Try a free trial to ensure 100% security.


Latest articles

Microsoft Windows Ntqueryinformationtoken Flaw Let Attackers Escalate Privileges

Microsoft has disclosed a critical vulnerability identified as CVE-2024-30088.With a CVSS score of 8.8, this flaw affects Microsoft...

256,000+ Publicly Exposed Windows Servers Vulnerable to MSMQ RCE Flaw

Cybersecurity watchdog Shadowserver has identified 256,000+ publicly exposed servers vulnerable to a critical Remote...

Indian National Jailed For Hacked Servers Of Company That Fired Him

An Indian national was sentenced to two years and eight months in jail for...

JetBrains Warns of GitHub Plugin that Exposes Access Tokens

A critical vulnerability (CVE-2024-37051) in the JetBrains GitHub plugin for IntelliJ-based IDEs (2023.1 and...

Critical Flaw In Apple Ecosystems Let Attackers Gain Unauthorized Access

Hackers go for Apple due to its massive user base along with rich customers,...

Hackers Exploiting Linux SSH Services to Deploy Malware

SSH and RDP provide remote access to server machines (Linux and Windows respectively) for...

Firefox 127 Released With patch for 15 Vulnerabilities

Mozilla has released Firefox 127, addressing 15 security vulnerabilities, some of which have been...

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles