Saturday, April 19, 2025
HomeCyber Security NewsIndian National Arrested for Stealing $150,000 via Computer Hacking

Indian National Arrested for Stealing $150,000 via Computer Hacking

Published on

SIEM as a Service

Follow Us on Google News

A cybercriminal from India was taken into custody for utilizing computer hacking to steal a sum of $150,000 from an elderly woman.

A computer hacker is an individual with exceptional proficiency in computer technology, who is highly skilled in discovering and exploiting vulnerabilities in software and computer systems.

They possess a deep understanding of programming languages, network protocols, and system architectures, and use their knowledge to uncover weaknesses in security measures.

- Advertisement - Google News

Fraud Incident

Jane Doe fell victim to a fraud incident due to a pop-up notification that appeared on her computer screen. The pop-up claimed that her system had been hacked and instructed her to contact customer service at a provided phone number.

Following Jane Doe’s acceptance, she was directed by a group of fraudsters to withdraw money from her bank accounts and store it at the “Fed.” Jane Doe complied and transferred a sum of $150,000 to the fraudsters in cash.

The FBI devised a trap by having Jane Doe inform the criminals that she possessed $50,000 in cash, which led to their apprehension.

So, Sukhdev Vaid and co-defendant Eddly Joseph came to Montana to steal money from Jane, and the Department arrested both criminals by installing Ultraviewer on Jane’s computer.

According to court documents, the government alleged that a sizable Indian enterprise was complicit in stealing funds from senior citizens in the United States. 

Even though Vaid was found guilty of hacking, he could face serious consequences including up to 20 years in prison, a fine of $250,000, and three years of supervised release.

The U.S. Sentencing Guidelines and other legally required criteria will be considered by the court when determining the sentence. Sentencing is scheduled for February 14, 2024, and Vaid is currently detained in custody after being arrested.

Protect yourself from vulnerabilities using Patch Manager Plus to patch over 850 third-party applications quickly. Try a free trial to ensure 100% security.

Latest articles

How To Detect Obfuscated Malware That Evades Static Analysis Tools

Obfuscated malware presents one of the most challenging threats in cybersecurity today. As static...

How Security Analysts Detect and Prevent DNS Tunneling Attack In Enterprise Networks

DNS tunneling represents one of the most sophisticated attack vectors targeting enterprise networks today,...

How to Conduct a Cloud Security Assessment

Cloud adoption has transformed organizations' operations but introduces complex security challenges that demand proactive...

U.S DOGE Allegedly Breached – Whistleblower Leaked Most Sensitive Documents

A federal whistleblower has accused the Department of Government Efficiency (DOGE) of orchestrating a...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

How To Detect Obfuscated Malware That Evades Static Analysis Tools

Obfuscated malware presents one of the most challenging threats in cybersecurity today. As static...

How Security Analysts Detect and Prevent DNS Tunneling Attack In Enterprise Networks

DNS tunneling represents one of the most sophisticated attack vectors targeting enterprise networks today,...

U.S DOGE Allegedly Breached – Whistleblower Leaked Most Sensitive Documents

A federal whistleblower has accused the Department of Government Efficiency (DOGE) of orchestrating a...