Wednesday, April 23, 2025
HomeAmazon AWSIndian Authorities Crackdown Microsoft and Amazon tech support scammers

Indian Authorities Crackdown Microsoft and Amazon tech support scammers

Published on

SIEM as a Service

Follow Us on Google News

Technical support fraud, also called tech and customer support fraud, is when someone pretends to be technical or customer support to trick people into giving them money.

Criminals may offer help to fix problems like updating the computer Antivirus or the need to update a software license.

Microsoft and Amazon supported CBI (Central Bureau of Investigation) and Federal enforcement agencies to raid multiple sectors in India on 19th  October.

- Advertisement - Google News
Document
FREE Webinar

CISO Panel Discussion on Application Security

Join us for a live webinar where we will discuss the major challenges that CISOs commonly face while setting up alerts, and ways to minimize them. In addition, the webinar will cover the most common threat vectors as well as the importance of API security.

Tech support fraud is a costly and significant issue. Every year, criminals operating illegal call centers prey on the vulnerable and scam thousands of victims. 

Tech Support Fraud resulted in more than 30 raids on call centers and more than 100 charges so far. By the Investigation, there are more than $1 billion in losses to victims.

The scammers targeted over 2,000 customers across Amazon and Microsoft, primarily based in the U.S., but also in Canada, Germany, Australia, Spain, and the UK.

The partnerships also support the importance of improving the internet and protecting more people. 

However, criminals will try to rebuild their businesses and open up new illegal call centers. 

The CBI, Amazon, and other international law enforcement agencies are committed to staying alert, sharing important information, and working closely with Indian law enforcement agencies and authorities from the countries attacked to help them with their investigations.

The CBI Tweeted that “CBI LAUNCHES OPERATION CHAKRA-II TO COMBAT AND DISMANTLE ORGANIZED CYBER ENABLED FINANCIAL CRIMES; DURING NATIONWIDE CRACKDOWN, SEARCHES CONDUCTED AT AROUND 76 LOCATIONS; LARGE NUMBER OF DIGITAL GADGETS INCLUDING LAPTOPs, HARD DISC ETC RECOVERED.”

The government requests to be aware of these scammers to protect our money and personal information.

Protect yourself from vulnerabilities using Patch Manager Plus to patch over 850 third-party applications quickly. Take advantage of the free trial to ensure 100% security.

Latest articles

Hackers Exploit NFC Technology to Steal Money from ATMs and POS Terminals

In a disturbing trend, cybercriminals, predominantly from Chinese underground networks, are exploiting Near Field...

Threat Actors Leverage TAG-124 Infrastructure to Deliver Malicious Payloads

In a concerning trend for cybersecurity, multiple threat actors, including ransomware groups and state-sponsored...

Ransomware Actors Ramp Up Attacks Organizations with Emerging Extortion Trends

Unit 42’s 2025 Global Incident Response Report, ransomware actors are intensifying their cyberattacks, with...

New SMS Phishing Attack Weaponizes Google AMP Links to Evade Detection

Group-IB’s High-Tech Crime Trends Report 2025 reveals a sharp 22% surge in phishing websites,...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Exploit NFC Technology to Steal Money from ATMs and POS Terminals

In a disturbing trend, cybercriminals, predominantly from Chinese underground networks, are exploiting Near Field...

Threat Actors Leverage TAG-124 Infrastructure to Deliver Malicious Payloads

In a concerning trend for cybersecurity, multiple threat actors, including ransomware groups and state-sponsored...

Ransomware Actors Ramp Up Attacks Organizations with Emerging Extortion Trends

Unit 42’s 2025 Global Incident Response Report, ransomware actors are intensifying their cyberattacks, with...